the future of voice authentication from rsa conference 2016
TRANSCRIPT
![Page 1: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/1.jpg)
2016 Pindrop™.
THE FUTURE OF
RSA Conference 2016
VOICE AUTHENTICATION
![Page 2: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/2.jpg)
2016 Pindrop™.
VOICE IS THE NEW INTERFACE
![Page 3: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/3.jpg)
2016 Pindrop™.
THE CALL CENTER IS THE WEAKEST LINK
PHYSICALHighly Defended
6+ Layers of Security
ONLINEHighly Defended
6+ Layers of Security
PHONELightly Defended
1-2 Layers of Security*
ANI CheckKnowledge-based Authentication
LoginIP Address
Device FingerprintOut of Band
KBA’sSession / Behavior
Perimeter Surveillance
Physical PaymentIdentificationPIN Number
Access Controls
Marking Two Factor
![Page 4: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/4.jpg)
2016 Pindrop™.
FINDING THE TRUTH
“Achieving absolute certainty about an identity's legitimacy is
impossible. Focus instead on assessing the probability that an
identity claim is legitimate.”
Gartner: “Absolute Identity Proofing Is Dead; Use Dynamic Identity Assessment Instead”, November 16, 2015
![Page 5: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/5.jpg)
2016 Pindrop™.
HOW DO YOU VERIFY A CALLER?
Phone Number• Easily found
• Easily spoofed
Knowledge-based Authentication• Widely available (Facebook, Ancestry,
criminal databases, etc.)• Guessable
Voice Biometrics• Difficult to fake (currently)
• Easier to make fail
![Page 6: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/6.jpg)
2016 Pindrop™.
PINDROP IN PRACTICE
Pindrop analyzes all inbound calls
Easy to read scores allow better call handling so call centers can
save time and money
Low risk – fast authentication
14
5
22
19
3167
89
5
67Medium risk – agent proceed with additional authentication
89ESCALATE – transfer call to fraud-trained call agent
Tier II/Fraud
Case Manager
Call: High RiskCaller ID Spoofing PresentKnow Fraud ANI404-505-6060
89
![Page 7: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/7.jpg)
2016 Pindrop™.
PHONEPRINTING™ AUDIO ANALYSIS
Pindrop’s Patented Phoneprint™
147 factors analyzedon every call
Risk ScoreEvery call, every time
Initial call
Geo-Location
Call Type
Risk Factors
Unique Phone
LossPacket loss, Robotization, Dropped frames
SpectrumQuantization, Frequency filters, Codec artifacts
NoiseClarity, Correlation, Signal-to-noise ratio
80%+ detection rate of ALL fraud calls <1% false positives
![Page 8: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/8.jpg)
2016 Pindrop™.
PHONE TRAFFIC ANI
CallData
Reputation Consortium
Geography
Phone Type
Phoneprint
Voiceprint
Multifactor Analysis
Continuous Scoring for IVR Analytics and 30 Seconds for Audio analysis
Network
Behavior
Call Statistics
Pre-
call
IVR
Cal
l Cen
ter
Audio
Quick verification of good calls reduces call time and saves money
Suspicious callers are flagged, routed or “Step up Authenticated”. Additional investigation further reduces losses
Bad callers and high risk accounts are flagged and losses stopped
Cal
l Pro
gres
sion
CONTINUOUS CALL SCORING ANALYTICS
![Page 9: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/9.jpg)
2016 Pindrop™.
VERIFYING A CALLER WITH PINDROP
Phone Number
Phone Reputation
IVR Behavior
Call Behavior
Phoneprint
Voiceprint
Location
Device Type
Knowledge-based Authentication
![Page 10: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/10.jpg)
2016 Pindrop™.
THE PINDROP DIFFERENCE
CollaborativeShare info across organizations
Every CallFunction in adverse conditions, on all or most calls
Anomaly DetectionDetect fraud on the first call
TransparentFast, behind the scenes
MultifactorExamine multiple aspects of call for accuracy
PredictiveDetect attacks early in the Kill Chain
![Page 11: The Future of Voice Authentication from RSA Conference 2016](https://reader035.vdocuments.mx/reader035/viewer/2022062821/58a3b8221a28ab62218b53b1/html5/thumbnails/11.jpg)
2016 Pindrop™.
PINDROPPhone Fraud Stops Here.