WEBINAR Fight Fraud And Offer A Better Customer Experience With Voice Biometrics May 18, Call in at 1:55 p.m. Eastern time Andras Cser, Vice President,

Slides:



Advertisements
Similar presentations
IBM WebSphere Everyplace Access for Multiplatforms Managing the e-business Customer Experience.
Advertisements

© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
SATO Label Gallery ™ Standard Series Overview
Tony Lorentzen Vice President Consulting Services August 20, 2007 Defining a Voice Channel Strategy.
1 Best Practices for Voice Authentication Charles R. Jankowski Jr., Ph. D. SpeechTek West 2007 February 21, 2007.
Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Charles James Director Microsoft Alliance EMEA Polycom Microsoft UC Innovation Partner of the Year.
Microsoft SQL Server x 46% 900+ For Hosting Service Providers
Axis Intelligent Video Intelligence where you need it.
Speech Technology Center Solutions for Mobile Phones.
Speaker Recognition By Afshan Hina.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
© 2012 Forrester Research, Inc. Reproduction Prohibited 1 © 2009 Forrester Research, Inc. Reproduction Prohibited January 25, Call in at 12:55 p.m.
Context Service Overview
© 2015 Avaya Inc. All rights reserved Introduction Transition + Transform addresses the urgent unified communication and collaboration (UC&C) needs.
MARKETING AUTOMATION: HOW CMOs CAN MAKE A DIFFERENCE TO THEIR BOTTOM LINE? Webinar - December 18, 2015 at 11:00am – 11:45am IST Veer Bothra Chief Innovation.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Multi-tenant HR Benefits Management Solution.  Headquartered in US, our customer is a global service provider of HR and Benefits Management services.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
WEB API AND CLOUD DEVELOPMENT BY TRAWEX TECHNOLOGIES.
July 16, Call in at 12:55 p.m. Eastern time WEBINAR Passwords: The Good, The Bad, And The Ugly Merritt Maxim, Senior Analyst.
Webinar How To Choose The Right Technology To Make Your Website More Social Kim Celestre, Senior Analyst September 19, Call in at 12:55 p.m. Eastern.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
WEBINAR Introducing The Forrester Wave™: Real-Time Interaction Management Rusty Warner, Principal Analyst September 22, Call in at 10:55 a.m. Eastern.
Webinar Behind The Scenes Of The Forrester Wave: GRC Platforms, Q Chris McClean, Principal Analyst and Research Director Renee Murphy, Senior Analyst.
Learn ETL tools for Accurate loading of data. ETL testing is very interesting and informative among the software testing tools. ETL is a process to testing.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Identity Management Overview
Mastercard Identity Check Mobile
Network customization
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Can Business Process Management (BPM) and Master Data Management (MDM) work together Author - Ramesh Dontha *Riversand is recognized as a leader in The.
Amadeus Open Profile Suite
Cloud SaaS Integrates with Office 365 to Meet the Needs for Business Contact Management “Pobuca combined with Microsoft Office 365 and Azure Active Directory.
Andras Cser, Principal Analyst Eve Maler, Principal Analyst
SaaS Application Deep Dive
6/17/2018 3:45 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Kate Leggett, Vice President, Principal Analyst
Manage mobile productivity with Enterprise Mobility + Security (EMS)
Speech Technology Center Solutions
Webinar Optimize Your Business Applications Strategy
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
Speaker’s Name, SAP Month 00, 2017
Cloud Computing.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Company Overview & Strategy
Continuous Automated Chatbot Testing
Wavestore Integrates…
Wavestore Integrates… Paxton Net2 Access Control
11/22/2018 1:43 PM THR3005 How to provide business insight from your data using Azure Analysis Services Peter Myers Bitwise Solutions © Microsoft Corporation.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Azure Enables Mobility, Easy Sync and Share, and Allows Companies to Retain Data Control MINI-CASE STUDY “Azure provides the full stack of technology that.
Telecom Software & VoIP Communication Platforms Provider.
Technical Capabilities
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Automating Profitable Growth™
WHY VIDEO SURVELLIANCE
Giovanni Carnovale – Regional Sales Manager Central & Eastern Europe
WHY VIDEO SURVELLIANCE
Stallion Systems & Solution Pvt Ltd
Network customization
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Microsoft Virtual Academy
Presentation transcript:

WEBINAR Fight Fraud And Offer A Better Customer Experience With Voice Biometrics May 18, Call in at 1:55 p.m. Eastern time Andras Cser, Vice President, Principal Analyst Heidi Shey, Analyst

© 2015 Forrester Research, Inc. Reproduction Prohibited3 We work with business and technology leaders to develop customer-obsessed strategies that drive growth.

© 2015 Forrester Research, Inc. Reproduction Prohibited4 Agenda › Voice biometrics 101: why now, expected benefits, and how it works › Active versus passive voice biometrics › Voice biometrics vendor landscape

© 2015 Forrester Research, Inc. Reproduction Prohibited5 Voice biometrics today › Authenticates identity › Detects fraudsters › Streamlines automation › Creates differentiated customer experiences My voice is my password.

© 2015 Forrester Research, Inc. Reproduction Prohibited6 Voice biometrics today › Authenticates identity › Detects fraudsters › Streamlines automation › Creates differentiated customer experiences My voice is my password. Speech recognition Active and passive and text- dependent and text-independent authentication Known fraudster identification

© 2015 Forrester Research, Inc. Reproduction Prohibited7 Why now? › Password frustrations at a tipping point › Mobile: out-of-band authentication › Mobile: built-in, inexpensive VB reader (microphone!) › FIDO Alliance’s UAF and U2F specifications › Password frustrations at a tipping point › Mobile: out-of-band authentication › Mobile: built-in, inexpensive VB reader (microphone!) › FIDO Alliance’s UAF and U2F specifications

© 2015 Forrester Research, Inc. Reproduction Prohibited8 Voice stands out among 2FA options 1.Easy to centralize and no special endpoint reader required 2.Passive VB is non-intrusive. 3.Revocable, re-recordable post breach 4.VB is what you are, do, and know. 5.Deploys easily at scale 6.Adapts to a variety of compliance and privacy requirements

© 2015 Forrester Research, Inc. Reproduction Prohibited9 Voice biometrics: a variety of uses Voice authentication Verifying identity Convenience Security Cost saving

© 2015 Forrester Research, Inc. Reproduction Prohibited10 Two major ways on how VB works for authentication Text- dependent, or active, VB authentication requires users to use one or more passphrases. Text- independent, or passive, VB authentication uses freeform audio to identify the user.

© 2015 Forrester Research, Inc. Reproduction Prohibited11 Passive VB works best with authentication › Shares the known fraudster and authentication voiceprint sample databases › Bypasses the known fraudster lookup if the user has already authenticated him- or herself › Integrates easily and naturally with speech recognition

Step 1: Tagging fraudsters’ voice recordings as “known fraudster” samples Step 2: Comparing every phone conversation’s customer sample to known fraudster samples How VB works for identifying known fraudsters

© 2015 Forrester Research, Inc. Reproduction Prohibited13 Active versus passive voice biometrics Pros and cons of each approach

© 2015 Forrester Research, Inc. Reproduction Prohibited14 Active (text-dependent) VB Small audio Mobile use Explicit verification High accuracy Explicit enrollment Obtrusive No fraudster ID ProsCons

© 2015 Forrester Research, Inc. Reproduction Prohibited15 Passive (text-independent) VB No passphrase Lower friction Fraudster detection Larger audio Lower scalability Less suitable for mobile Lower accuracy ProsCons

© 2015 Forrester Research, Inc. Reproduction Prohibited16 Two options for where to store the enrollment samples Server (centralized storage) Endpoint (PC, in a mobile application, or trusted execution environment)

© 2015 Forrester Research, Inc. Reproduction Prohibited17 Server-based voice print storage Cross-channel One enrollment High security Privacy challenges Slow performance No offline capability ProsCons

© 2015 Forrester Research, Inc. Reproduction Prohibited18 Endpoint-based voice-print storage Privacy Offline uses are possible. Added vulnerabilities Requires separate enrollment per device ProsCons

© 2015 Forrester Research, Inc. Reproduction Prohibited19 Voice biometrics market landscape Key vendors

© 2015 Forrester Research, Inc. Reproduction Prohibited20 Nine voice biometrics vendors to watch (Auraya Systems)

© 2015 Forrester Research, Inc. Reproduction Prohibited21 › Spoofing detection › Active and passive VB › Innovation plans for mobile, call center, and fraud detection

© 2015 Forrester Research, Inc. Reproduction Prohibited22 › Active and passive VB › Self-tuning and adaptation › Web API for integration

© 2015 Forrester Research, Inc. Reproduction Prohibited23 › Synchronizes web and phone sessions in a SaaS solution › Outbound call allows for analytics and data mining. › Plans to fuse with other types of biometrics and to improve cross-channel support

© 2015 Forrester Research, Inc. Reproduction Prohibited24 › Offers a software development kit (SDK) › Combined and integrated VB and facial recognition › Focuses on text-independent solutions that have low power and low memory requirements

© 2015 Forrester Research, Inc. Reproduction Prohibited25 › Unified VB platforms (mobile, Web, IVR, and call center) › Active and passive VB › Plans to develop new antispoofing algorithms and add device verification technologies

© 2015 Forrester Research, Inc. Reproduction Prohibited26 › Focuses on real-time tuning and high-definition audio processing › Workflow engine for integration with other authentication factors and biometrics

© 2015 Forrester Research, Inc. Reproduction Prohibited27 › Passive VB, allows en masse enrollments from historical call recordings › Augments scoring with predictive analytics › Can combine known fraudster ID with authentication

© 2015 Forrester Research, Inc. Reproduction Prohibited28 › Active and passive VB › Ability to add additional VB engines, integrates with other 2FA and biometrics › Mobile SDKs are available.

© 2015 Forrester Research, Inc. Reproduction Prohibited29 › On-premises and SaaS option available › SaaS solution available in English, Spanish, and Chinese › Very scalable solution and proven up to 1 billion calls per year and passes OWASP standards

© 2015 Forrester Research, Inc. Reproduction Prohibited30 Best practices for voice biometrics 1.Don’t initially mandate for all, but for accuracy, implement for at least 400 users. 2.Ensure easy enrollment from all channels; check privacy requirements about audio. 3.Enable mobile VB for authentication on multiple channels. 4.Make sure you have a live customer on the line.

Thank you forrester.com Andras Cser Heidi Shey