SlideShare ist ein Scribd-Unternehmen logo
1 von 28
WHY SPEECH
RECOGNITION
TECHNOLOGY IS
THE NEW
WATCHWORD
FOR ENTERPRISE
CYBERSECURITY
A CS Approach By
Uniphore Software Systems
Global cybersecurity market
to post searing growth, says
Cybersecurity Ventures
India to outpace global market
on CAGR basis, says Data
Security Council of India
$3.5B
$120B
$209B
2017 2021
Global
cybersecurity
market
$4B
India
cybersecurity
market
2004 2017
$35B
2025
Hackers today not only attempt to breach enterprise
data but also target individual users
Speech Recognition and Voice Biometrics, if deployed
by enterprises, can add a second layer of
security against fraud and data theft
Online
fraud
decoded
Frauds committed using technological tools over the
internet come under the ambit of Online Fraud.
Online Fraud
Online frauds refer to any fraudulent plan
or scheme that uses…
Websites, Social media, chat rooms, email,
or any other internet-based means
… to defraud an individual or organization via fraudulent
solicitations or fraudulent transactions.
Types and
characteristics
of online
fraud
Online frauds are not
only real, they come
in various forms.
TYPES OF
ONLINE
FRAUDS
Spam: Emails from unidentified sources that offer fake
offerings and install a virus or bug in the system when
opened
Identity theft: Situations where scammers or fraudsters
try to steal your digital information and impersonate you
Phishing: Attacks where emails seek sensitive personal
information like credit card details or banking passwords
posing as a genuine communique from your bank
Vishing: Attacks that involve a phone call from crooks
seeking financial details by tricking unsuspecting users
Online frauds: Attacks via web links, URL redirects, pop-
ups, email links, IP spoofing, etc. which are usually
lottery frauds or “friend in distress” frauds
Technological
advances
driving
online fraud
Technology has redefined
communications almost
irreversibly.
Data has gone digital in an
unprecedented way.
This has a flipside
– cyber attacks.
Technology is as much a foe as it’s a friend
Scammers and
fraudsters
Cyber attacks and
illegal activities
Loopholes in
the system
TO
MISUSE
TO CARRY
OUT
Potent
tools
USE
Pagejacking to
develop illegal
clones
Tricking internet
engines to list
fake websites
Malware to overrule
security layers and
perform fraudulent
transactionsTracking online trail of
individuals to detect
physical location
Social media security
breaches to conduct
data / identity theft
How fraudsters are misusing technology
In the digital world
The impact of
online fraud:
Financial losses
and beyond
ONLINE
FRAUD
LOSS OF
CREDIBILITY
FINANCIAL
LOSS
DENT IN
BRAND VALUE
ENTERPRISES
CANNOT
IGNORE
ONLINE
FRAUD
1
TRUST
EROSION
Insecure online
transactions
Inability to build
Consumer trust
Loss of
credibility
Adopt new
technology
Add new
Security layers
Build long term
consumer trust
Barclays one of the first multinational
banks to launch a TV ad campaign on fraud
awareness to boost trust in its brand.
IMPACT
Unauthorised
access to
consumer data
Legal
complications
Brand
devaluation
Post unearthing of a financial fraud where
2 million false accounts were opened in
real customers’ names over 5 years, Wells
Fargo not only had to pay a $185 million
fine for its inaction but also saw its brand
value hit an all-time low.
2
BRAND
DEVALUATION
IMPACT
Importance of
statutory and
in-house
compliance
Statutory and in-house
compliance process can
safeguard enterprises from
legal complications.
For example, a bank
spreading consumer
awareness about its legal
obligations can help
avoid legal hassles.
Compliance essential for any major
call center operation
For example, if a contact center of a financial
organization is seeking financial details like credit
or debit card payments over the phone, it needs
to be compliant with Payment Card Industry
Data Security Standards (PCI-DSS).
Speech Recognition
Technology: Providing
a secure and compliant
business landscape
With contact center fraud on the rise, enterprises are using
smarter preventive solutions like Speech Recognition and Voice
Biometrics technology to bolster their security layers.
Public
information
Unauthorised
access to
customers’
accounts
Agents
TO GAIN
Stolen
information
MANI-
PULATE
Contact
centers Scammers
LEVE-
RAGE
FOCUSED
TARGET FOR
Speech Recognition and Voice Biometrics use a consumer's
voice pattern to uniquely identify each consumer.
Basic Voice
Biometrics
Secure and
compliant
agent-
customer
communication
Early
Warning
Signals
USE
USE
DETECTS
Advanced
Voice Analytics
Consumer’s
voice prints
Individual
characteristics
TO CARRY
OUT
TO ASCER-
TAIN
Speaker
identification
True identity
of individual
ENSURES
Uniphore’s auMina
and amVoice:
Security and compliance
in customer interactions
auMina:
A NEXT
GENERATION
SPEECH
ANALYTICS
SOLUTION
Solution to multiple business problems by
harnessing insights from customer interactions
100% coverage of both inbound and outbound
calls in 80 global languages with multiple
dialects
customer sentiment analysis using keyword
spotting and speech analysis
check for adherence to script for regulatory
compliance with its advanced keyword
recognition technology
amVoice:
A PREMIUM
VOICE
BIOMETRICS
SOLUTION
Reduction of costs and risks associated with
authentication
Remote authentication by consumers using their
unique voice print in less than 15 seconds
compared to 60+ seconds done manually
Inbuilt fraudster detection capabilities,
eliminating all unauthorized access
High accuracy levels and language
independence, easy integration using an
enterprise or cloud-based Web API
To know more about how your organization can ensure
compliance & prevent fraud by implementing Speech
Analytics & Voice Biometrics using auMina or amVoice,
please write in at: susheel_ext@uniphore.com
To download your copy
of the whitepaper on this subject,
please click here.
Uniphore Software Systems is a frontrunner in the
Speech Recognition Technology and Virtual Assistant
domains. It partners with over 70 enterprise clients and
has over 4 million end users.
Uniphore Software Systems is headquartered in IIT
Madras Research Park, Chennai. Uniphore was incubated
in IIT Chennai, India in 2008 and currently has offices in
India, Singapore, and U.A.E with about 100 employees
spread across all locations. Uniphore’s investors include
Kris Gopalakrishnan, IDG Ventures India, India Angel
Network, YourNest Angel Fund, and Ray Stata.
Uniphore was recognized by Deloitte as a “Technology
Fast 500 company” in Asia Pacific in 2014 and was also
ranked as the 10th fastest growing technology company
in India by “Deloitte Fast 50” in 2015. Uniphore’s Co-
Founder & CEO, Umesh Sachdev was recognized by the
TIME Magazine list of 2016 amongst “10 Millennials
Changing The World”, and with India’s edition of MIT
Technology Review’s ‘Innovators Under 35′ for the year
2016. www.uniphore.com.

Weitere ähnliche Inhalte

Was ist angesagt?

BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
Purna Bhat
 
MeetMe Uses TeleSign to Secure Its User Community and Reduce Threat of Fraud
MeetMe Uses TeleSign to Secure Its User Community and Reduce Threat of FraudMeetMe Uses TeleSign to Secure Its User Community and Reduce Threat of Fraud
MeetMe Uses TeleSign to Secure Its User Community and Reduce Threat of Fraud
TeleSign Corporation
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
IJSRED
 

Was ist angesagt? (17)

Android mobile platform security and malware
Android mobile platform security and malwareAndroid mobile platform security and malware
Android mobile platform security and malware
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Linas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometricsLinas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometrics
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
MeetMe Uses TeleSign to Secure Its User Community and Reduce Threat of Fraud
MeetMe Uses TeleSign to Secure Its User Community and Reduce Threat of FraudMeetMe Uses TeleSign to Secure Its User Community and Reduce Threat of Fraud
MeetMe Uses TeleSign to Secure Its User Community and Reduce Threat of Fraud
 
ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 

Ähnlich wie Why Speech Recognition Technology is the New Watchword for Enterprise Cyber Security

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 

Ähnlich wie Why Speech Recognition Technology is the New Watchword for Enterprise Cyber Security (20)

5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Our Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesOur Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprises
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Bp Corp Pres Short
Bp Corp Pres ShortBp Corp Pres Short
Bp Corp Pres Short
 
The Spotight is On Passwordless Authentication
The Spotight is On Passwordless AuthenticationThe Spotight is On Passwordless Authentication
The Spotight is On Passwordless Authentication
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 

Mehr von Uniphore

Mehr von Uniphore (15)

Path Towards Conversational Service Automation
Path Towards Conversational Service AutomationPath Towards Conversational Service Automation
Path Towards Conversational Service Automation
 
Harness the Power of Speech Analytics for Benefits across Functions
Harness the Power of Speech Analytics for Benefits across FunctionsHarness the Power of Speech Analytics for Benefits across Functions
Harness the Power of Speech Analytics for Benefits across Functions
 
Speech Analytics Solutions for the Insurance Industry
Speech Analytics Solutions for the Insurance IndustrySpeech Analytics Solutions for the Insurance Industry
Speech Analytics Solutions for the Insurance Industry
 
Speech Analytics for Banking and Financial Services
Speech Analytics for Banking and Financial ServicesSpeech Analytics for Banking and Financial Services
Speech Analytics for Banking and Financial Services
 
Virtual Assistants - The technology that is disrupting customer service in t...
 Virtual Assistants - The technology that is disrupting customer service in t... Virtual Assistants - The technology that is disrupting customer service in t...
Virtual Assistants - The technology that is disrupting customer service in t...
 
How to Deploy Speech Analytics for Enhanced Customer Experience
How to Deploy Speech Analytics for Enhanced Customer ExperienceHow to Deploy Speech Analytics for Enhanced Customer Experience
How to Deploy Speech Analytics for Enhanced Customer Experience
 
How Speech Analytics Helps Serve Customers Better
How Speech Analytics Helps Serve Customers BetterHow Speech Analytics Helps Serve Customers Better
How Speech Analytics Helps Serve Customers Better
 
The Evolution and Future of Contact Centre Technology
The Evolution and Future of Contact Centre TechnologyThe Evolution and Future of Contact Centre Technology
The Evolution and Future of Contact Centre Technology
 
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The RescueIncrease Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
Increase Revenue by Boosting Collection Efforts: Speech Analytics To The Rescue
 
The Use of Artificial Intelligence and Machine Learning in Speech Recognition
The Use of Artificial Intelligence and Machine Learning in Speech RecognitionThe Use of Artificial Intelligence and Machine Learning in Speech Recognition
The Use of Artificial Intelligence and Machine Learning in Speech Recognition
 
How Speech Mining During Customer Interactions Can Unearth Gold
How Speech Mining During Customer Interactions Can Unearth GoldHow Speech Mining During Customer Interactions Can Unearth Gold
How Speech Mining During Customer Interactions Can Unearth Gold
 
Customer Support Techniques: The Classic Versus The Cutting Edge
Customer Support Techniques: The Classic Versus The Cutting EdgeCustomer Support Techniques: The Classic Versus The Cutting Edge
Customer Support Techniques: The Classic Versus The Cutting Edge
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
 
Real-Time Speech Analytics
Real-Time Speech AnalyticsReal-Time Speech Analytics
Real-Time Speech Analytics
 
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Why Speech Recognition Technology is the New Watchword for Enterprise Cyber Security

  • 1. WHY SPEECH RECOGNITION TECHNOLOGY IS THE NEW WATCHWORD FOR ENTERPRISE CYBERSECURITY A CS Approach By Uniphore Software Systems
  • 2. Global cybersecurity market to post searing growth, says Cybersecurity Ventures India to outpace global market on CAGR basis, says Data Security Council of India $3.5B $120B $209B 2017 2021 Global cybersecurity market $4B India cybersecurity market 2004 2017 $35B 2025
  • 3. Hackers today not only attempt to breach enterprise data but also target individual users Speech Recognition and Voice Biometrics, if deployed by enterprises, can add a second layer of security against fraud and data theft
  • 5. Frauds committed using technological tools over the internet come under the ambit of Online Fraud. Online Fraud
  • 6. Online frauds refer to any fraudulent plan or scheme that uses… Websites, Social media, chat rooms, email, or any other internet-based means … to defraud an individual or organization via fraudulent solicitations or fraudulent transactions.
  • 8. Online frauds are not only real, they come in various forms.
  • 9. TYPES OF ONLINE FRAUDS Spam: Emails from unidentified sources that offer fake offerings and install a virus or bug in the system when opened Identity theft: Situations where scammers or fraudsters try to steal your digital information and impersonate you Phishing: Attacks where emails seek sensitive personal information like credit card details or banking passwords posing as a genuine communique from your bank Vishing: Attacks that involve a phone call from crooks seeking financial details by tricking unsuspecting users Online frauds: Attacks via web links, URL redirects, pop- ups, email links, IP spoofing, etc. which are usually lottery frauds or “friend in distress” frauds
  • 11. Technology has redefined communications almost irreversibly. Data has gone digital in an unprecedented way. This has a flipside – cyber attacks.
  • 12. Technology is as much a foe as it’s a friend Scammers and fraudsters Cyber attacks and illegal activities Loopholes in the system TO MISUSE TO CARRY OUT Potent tools USE
  • 13. Pagejacking to develop illegal clones Tricking internet engines to list fake websites Malware to overrule security layers and perform fraudulent transactionsTracking online trail of individuals to detect physical location Social media security breaches to conduct data / identity theft How fraudsters are misusing technology In the digital world
  • 14. The impact of online fraud: Financial losses and beyond
  • 15. ONLINE FRAUD LOSS OF CREDIBILITY FINANCIAL LOSS DENT IN BRAND VALUE ENTERPRISES CANNOT IGNORE ONLINE FRAUD
  • 16. 1 TRUST EROSION Insecure online transactions Inability to build Consumer trust Loss of credibility Adopt new technology Add new Security layers Build long term consumer trust Barclays one of the first multinational banks to launch a TV ad campaign on fraud awareness to boost trust in its brand. IMPACT
  • 17. Unauthorised access to consumer data Legal complications Brand devaluation Post unearthing of a financial fraud where 2 million false accounts were opened in real customers’ names over 5 years, Wells Fargo not only had to pay a $185 million fine for its inaction but also saw its brand value hit an all-time low. 2 BRAND DEVALUATION IMPACT
  • 19. Statutory and in-house compliance process can safeguard enterprises from legal complications. For example, a bank spreading consumer awareness about its legal obligations can help avoid legal hassles.
  • 20. Compliance essential for any major call center operation For example, if a contact center of a financial organization is seeking financial details like credit or debit card payments over the phone, it needs to be compliant with Payment Card Industry Data Security Standards (PCI-DSS).
  • 21. Speech Recognition Technology: Providing a secure and compliant business landscape
  • 22. With contact center fraud on the rise, enterprises are using smarter preventive solutions like Speech Recognition and Voice Biometrics technology to bolster their security layers. Public information Unauthorised access to customers’ accounts Agents TO GAIN Stolen information MANI- PULATE Contact centers Scammers LEVE- RAGE FOCUSED TARGET FOR
  • 23. Speech Recognition and Voice Biometrics use a consumer's voice pattern to uniquely identify each consumer. Basic Voice Biometrics Secure and compliant agent- customer communication Early Warning Signals USE USE DETECTS Advanced Voice Analytics Consumer’s voice prints Individual characteristics TO CARRY OUT TO ASCER- TAIN Speaker identification True identity of individual ENSURES
  • 24. Uniphore’s auMina and amVoice: Security and compliance in customer interactions
  • 25. auMina: A NEXT GENERATION SPEECH ANALYTICS SOLUTION Solution to multiple business problems by harnessing insights from customer interactions 100% coverage of both inbound and outbound calls in 80 global languages with multiple dialects customer sentiment analysis using keyword spotting and speech analysis check for adherence to script for regulatory compliance with its advanced keyword recognition technology
  • 26. amVoice: A PREMIUM VOICE BIOMETRICS SOLUTION Reduction of costs and risks associated with authentication Remote authentication by consumers using their unique voice print in less than 15 seconds compared to 60+ seconds done manually Inbuilt fraudster detection capabilities, eliminating all unauthorized access High accuracy levels and language independence, easy integration using an enterprise or cloud-based Web API
  • 27. To know more about how your organization can ensure compliance & prevent fraud by implementing Speech Analytics & Voice Biometrics using auMina or amVoice, please write in at: susheel_ext@uniphore.com To download your copy of the whitepaper on this subject, please click here.
  • 28. Uniphore Software Systems is a frontrunner in the Speech Recognition Technology and Virtual Assistant domains. It partners with over 70 enterprise clients and has over 4 million end users. Uniphore Software Systems is headquartered in IIT Madras Research Park, Chennai. Uniphore was incubated in IIT Chennai, India in 2008 and currently has offices in India, Singapore, and U.A.E with about 100 employees spread across all locations. Uniphore’s investors include Kris Gopalakrishnan, IDG Ventures India, India Angel Network, YourNest Angel Fund, and Ray Stata. Uniphore was recognized by Deloitte as a “Technology Fast 500 company” in Asia Pacific in 2014 and was also ranked as the 10th fastest growing technology company in India by “Deloitte Fast 50” in 2015. Uniphore’s Co- Founder & CEO, Umesh Sachdev was recognized by the TIME Magazine list of 2016 amongst “10 Millennials Changing The World”, and with India’s edition of MIT Technology Review’s ‘Innovators Under 35′ for the year 2016. www.uniphore.com.