Voice Authentication On-Demand: Your Voice as Your Key

Similar documents
How Innovation Can Change the Contact Center Business. Thais Marca Managing Director, South America Convergys

Effective Call Center Automation and Agent Support

Customer Experience in a Relationship Economy. Frank Sherlock Senior Vice President and Managing Director Convergys

Voice biometrics. Advait Deshpande Nuance Communications, Inc. All rights reserved. Page 1

FFIEC CONSUMER GUIDANCE

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

Guide to Evaluating Multi-Factor Authentication Solutions

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Shared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy

5Ways. to Put Your CRM Data to Work. for You and Your Customers

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Building Secure Multi-Factor Authentication

Multi-Factor Authentication of Online Transactions

WHITE PAPER Usher Mobile Identity Platform

ADDING STRONGER AUTHENTICATION for VPN Access Control

ACI Response to FFIEC Guidance

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper

Agenda. Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication

STRONGER AUTHENTICATION for CA SiteMinder

Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper

A strategic approach to fraud

How To Choose An Authentication Solution From The Rsa Decision Tree

Beyond passwords: Protect the mobile enterprise with smarter security solutions

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Intelligent Contact Management with. Flexible cloud services from VoltDelta. Contact centre Self service Customer insight

Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

How To Comply With Ffiec

FrontRange Voice. Password Reset via Self-Service. Presented by: Mark Hodgen

Improving Online Security with Strong, Personalized User Authentication

Business Banking Customer Login Experience for Enhanced Login Security

KEY BENEFITS OF CONTACT CENTER AUTOMATION

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Buying Guide: On-Demand vs. On-Premise IVR Systems

Online Cash Management Security: Beyond the User Login

A brief on Two-Factor Authentication

The Convergence of IT Security and Physical Access Control

Adding Stronger Authentication to your Portal and Cloud Apps

The Convergence of IT Security and Physical Access Control

product flyer Single, full-featured solution flexible, personalized experience Highly extensible and secure

Application of Biometric Technology Solutions to Enhance Security

Intralinks Best Practices in Security: Risk-Based Multi-Factor Authentication

How can Identity and Access Management help me to improve compliance and drive business performance?

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

FFIEC CONSUMER GUIDANCE

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Outbound Solutions Product and Market Report

The Rising Cost of Customer Service:

Entrust IdentityGuard

Multi-Factor Authentication Core User Policy and Procedures

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

User Behaviour Analytics

Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality

ImageWare Systems, Inc.

Customer contact solutions from Genesys and IBM: Improve your customers experience and reduce costs

ACI SELF-SERVICE BANKING

The Leading Provider of Identity Solutions and Services in the U.S.

Supplement to Authentication in an Internet Banking Environment

IDENTITY SOLUTIONS FOR A BETTER WORLD

Mobile Wallet Platform. Next generation mobile wallet solution

Business Process Services. White Paper. Managing Customer Experience: Strategies for Success

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

IP CONTACT CENTERS: INTRO TO IPCC TECHNOLOGIES, CONCEPTS, AND TERMINOLOGY

customer care solutions

customer care solutions

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

TECHNOLOGY WHITEPAPER

NEC Contact Centres (Genesys)

Avaya Media Processing Server 500

Partnership for Value

Hitachi ID Password Manager Telephony Integration

Moving to Multi-factor Authentication. Kevin Unthank

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Biometrics in Identity as a Service

Security Best Practices

IP Contact Center: Realize the Full Business Potential of IP Contact Centers

Transcription:

Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009

Convergys Corporation A Global Leader in Relationship Management Worldwide Capabilities 75,000 employees 85 customer and employee contact, service and data centers worldwide; focused on optimizing employee and customer experience Clients in 70+ countries speaking nearly 35 languages A Leading Public Company $2.8 billion in revenues Listed on NYSE, S&P 500, Fortune 1000 A Fortune Most Admired Company for eight consecutive years Serve more than half of the Fortune 50 as clients Key Facts About Convergys Host more than 1 billion customer interactions annually Support more than 3 million employees and retirees worldwide Billing for 350+ million communications subscribers worldwide Named to the Top 10 for Innovative Use of Technology by InformationWeek (2007) 2

On-Demand Voice Authentication - Agenda Market Overview: Needs & Dynamics Voice Authentication Flash Demo Business Drivers: security, cost, revenue On-Demand Voice Authentication Infrastructure Live Demo Conclusion 3

Voice Authentication Market Dynamics Consumers are experiencing increasing concern about security and identity theft Governing agencies are providing guidelines and requirements for multi-factor authentication Banking (FFIEC) Medical (HIPAA) Voice Authentication Adoption Hurdles Voice authentication technology is ready, but traditional deployment: takes too long, requires capital expenditure, and has required a speech IVR. Voice authentication can now be leveraged in IVR, web, and agent transactions. 4

Increase in Phone-based Fraud Mail and phone-based incidents rose dramatically, from 3% of ID fraud in 2006 to 40% in 2007 As consumers shift more financial transactions to secure online arenas, fraudsters have become more creative in utilizing land and wireless telephones to access information Address changes are among the most popular methods of attack. A criminal may call and claim he wants to change the address on an account. Using stolen data to verify his identity, he may gain access without ever possessing a card. 2008 Identity Fraud Survey Report: Identity Fraud Continues to Decline, But Criminals More Effective at Using All Channels February 2008 5

Voice Authentication Market Gartner & OPUS OPUS Key Findings Voice biometric solutions are maturing $80M in 2006 ~$800M in 2011 Factors propelling growth Evolution of technology products Integration with existing infrastructure Multiple pricing and delivery options Password reset proves its value Enrollment has not been a problem Mandates for strong authentication Gov t will drive large deployments Mobile users to drive next apps Gartner Key Findings 60% of banks plan to strengthen authentication >50% of online banking consumers consider extra security features "extremely" important. 23% of online banking consumers think answering challenge questions is a waste of time. Recommendations Implement non-pc-based user authentication for high-risk, online transactions. Implementing secret questions to verify callers significantly adds to call center costs. Consider voice biometrics for stronger caller authentication. 6

Value for you and your Customers Why should you Use VA? Meet Industry Guidelines Regulatory support for technology FFIEC Multifactor Authentication Guideline VA is a fit for 2 nd factor Contact center cost savings Reduce AHT Automate PIN/PW reset Employee Applications Ensures security for company sensitive information Lower cost for secure transactions Why will customers adopt VA? Security Belief that identity theft is a threat Perception that biometrics work Acceptance of voice over other biometrics User Experience Voice authentication reduces or the need to remember a PIN/password VA saves time compared to answering challenge questions. Contributes to greater mobility PINs 7

Voice Biometrics Ready for Prime Time Pros : Equivalent in accuracy to Eye Scans and Fingerprints Low cost implementation; incremental to pre-existing IVR investment Non-invasive: uses a familiar mode of interaction speech Easy to integrate with IVR apps; supports both phone or POS use Can be utilized across channels (Live-agent, IVR, Web and Mobile) Can combine with behavioral data to improve overall performance Cons : Must deal with channel & device distortions Must manage user performance and perception, anywhere, on any phone Sources : ) 1. Bell Canada presentation, VioceBioCon, 2008 8

Drivers for On-Demand Voice Authentication Card Issuer: Reduce Fraud Pain Points Customer Fraud; e.g., change of address, funds transfer Agent time for authenticating callers Use Case Profile Enroll customer at card activation Include VA for some/all call transactions Business Case Drivers Reduce existing fraud: 90%+ Reduce agent AHT: 10+ sec. ROI: <6 months Health Insurer: Gain Revenue Pain Points Only 10% of new enrollees sign/mail policy. Use Case Profile Allow policyholders to enroll & use voice signature Use for HIPAA-compliant transactions Business Case Drivers Increase sales rate closure Saves 9:1 in processing Accelerates policy renewal anniversary 9

Client Benefits of an On-Demand VA Solution Software as a Service No capital expenditures; pay-as-you-go pricing No speech or biometric software for client to install High-availability web services-oriented architecture Fast Implementation for Customers Allows seamless interface from IVR and Agent applications & platform Customer Authentication Infrastructure Phone Mic Device DTMF or Speech IVR Any Web Based Application Multi-Modal Device Applications Convergys On-Demand Voice Authentication Infrastructure Voice Authentication Application Intelligence 10

Convergys Value Prop Deployment Benefits Make it easy and fast to implement From any IVR or Web app Apply CVG s expertise in large-scale hosting Quick to market and low cost Offer Voice Authentication Service On-Demand High-available, scalable Technology Benefits Core technology is robust, but need applications Differences are in: Business rules on top of Voice Authentication Ease of integration and deployment User interface design and sophistication CVG Labs has vetted vendor products and services over the past four years 11

Voice Authentication Business Value Drivers Operational Cost Savings Reduce AHT via automated authentication Fraud Reduce fraudulent transactions Retention Increase customer satisfaction Retain higher percentage of customers Marketing Grow customer base via promotional marketing you re secure with us Sales Increase close rate by offering immediate contract Drive wallet share to increase card usage and revenue 12

Voice Authentication Use Case Demos Demo 1 (Flash) : Two factor Authentication userid/password + Voice Three modes of user interaction Outbound phone call to user Inbound phone call from user Access from PC Demo 2 (Flash) : Multi-modal and Multi-channel interface Voice authentication from a multimodal PDA Out-of-band voice authentication voice unlocks access to web Demo 3 (Live) : Control access to secure financial transactions with VA Seamless Integration with IVR application 13

On-Demand Voice Authentication: Ready for Launch The Market appears poised to consume voice authentication Convergys brings agent, multi-channel, and large-scale hosting Convergys Advantages: One Stop Voice Authentication solution Complementary Customer Service solutions Automated Self-Service Complementary business decisioning software Live agents 14

Questions, Comments, Insights?

Appendix Voice Authentication: Performance Metrics

Voice Authentication Market Gartner - June 2008 Key Findings To authenticate online banking customers, most U.S. banks rely on desktop cookies, and secret questions and answers. However, these recently deployed methods are already obsolete in the face of malware-based attacks. Most U.S. banks use weak methods to authenticate call center callers, but nearly 60% of surveyed banks plan to strengthen their authentication methods during the next two years. More than half of U.S. consumers consider extra security features "extremely" important in influencing their decision to bank online. Of the consumers who have to answer secret questions to bank online, 77% say they don't mind answering the questions, but the other 23% do, or they think the questions are a waste of time because they believe the questions provide little added security. Recommendations Recognize that using secret questions and desktop cookies to authenticate online consumers raises the "security" bar, but those methods can be easily defeated by determined criminals. Start implementing non-pc-based user authentication and transaction verification for high-risk, online transactions. These methods can stop the damage from attacks launched from user browsers and desktops. Be cautious about implementing secret questions to identify call center callers they may significantly add to call center operational costs. Consider automated PIN entry and/or voice biometrics for stronger caller authentication, although voice biometrics is still largely unproven in call centers with millions of customers. 17

Voice Authentication Market - OPUS Research 2008 Key Findings: The market for voice biometric-based solutions is maturing, having generated nearly $80 million in licensing and application revenue in 2006. The market will grow modestly in the coming year, then grow to approach $800 million in revenue by 2011. Factors propelling growth include: The evolution from technology to products For selected applications (like password reset) in specific enterprise settings (like contact centers and Help Desks ) voice biometric-based authentication has proven value as a solution to well-defined problems. Better interconnection and interaction with existing security infrastructure The product of greater acceptance by corporate security officers, as well as general IT implementers. Support from larger integrators and resellers Larger firms, such as EMC s RSA Security division and IBM Global Services, have added speaker verification to their range of products and services Multiple pricing and delivery options Solutions have moved beyond premises-based solutions (with pricing based on ports, servers or seats) to include hosted delivery of services driven by enrolled users and, ultimately, transactions. Password reset (PWR) proves its value Deployments of this mainstay of speaker verification continue to grow as a result of more mainstay of speaker verification continue to grow as a result of more stringent security policy and the availability of mature solutions. Enrollment has not been a problem Several firms that installed voice-based verification customer care contact centers have been pleased to find the large majority of callers choose to enroll. Mandates for hardened authentication for financial services Largely driven by regulatory bodies in North America and Western Europe. Largest deployments will be government-driven Consensus is building that voice biometrics will play an important role in making e-government services accessible and for hardening authentication where transfer payments are involved. Mobile users to drive next wave of applications Access control for both employees and customers using mobile phones create readymade opportunities for speaker verification solutions. 18

Voice Authentication Performance Metrics Equal Error Rate Simple measure of performance ~1% indicates high performance Acceptance Rate Impostor High convenience EER High Security Type I (FR), Type II (FA) errors Tradeoffs determine operating point Good target: type I : 0.5 1.0 % type II : 1.0 3.0 % Enrollability rate : True Speaker Rejection Rate % of users who can be enrolled successfully ~ 95% is an achievable goal Verifiability rate : % of users who can use the service with consistent success ~95% is an achievable goal ~5% of users may need alternate means (agent?) 19

Operational Analysis: Call Center Impact Voice Authentication can reduce current fraudulent calls by 98.9% Leverage authentication by alternative means in other 1.1% of calls Additional questions built into the Voice User Interface Live operators Web-based questions for online applications 20