With many organizations searching for the next best-of-breed data loss prevention solution, some companies have chosen voice authentication as their preferred method of endpoint security.
GigaOM stated that voice biometrics enable authentication up to 80 percent more rapidly than entering a password, PIN or other identification measure. Additionally, using such technology makes the recognition process more convenient and secure for both the employee or customer and the organization.
Furthermore, a new study by Opus Research found that voice authentication can be a strong security measure when part of a multi-factor identification system for endpoint security. Additionally, this type of individual recognition creates a low friction experience for employees and customers, which is an important factor in mobile protection, stated mobile security expert Pat Carroll.
“The market needs a security architecture that is custom designed for the mobile channel, yet sensitive to the needs of consumers in that channel: User-friendly, easy to use, intuitive – “no friction” where possible and low friction when we need to involve the customer.”
Utilization of voice biometrics: Contact centers
GigaOM contributor Bretislav Beranek stated that many contact centers have used voice authentication as part of their interactive voice response systems. Such technology has allowed call center agents to quickly and securely authenticate their customers to help with data loss prevention. They simply engage the customer in a brief conversation and identify that they are speaking with the correct person before sharing sensitive information. This prevents the need for callers to remember passwords or answer security questions.
Voice authentication is a secure way to protect information contained on mobile applications. Beranek also pointed out that many applications have limited space for on-screen items, and voice authentication can eliminate space dedicated to login credentials. Users can simply speak a pass phrase and gain access to the application.
Additionally, because each voice is unique to the speaker, this type of authentication is ideal for preventing data leakage of sensitive business information from mobile applications.
Protecting monetary transactions
Beranek also stated that voice authentication can be utilized when securing endpoints during a financial transaction, including for high risk purchases outside of an individual’s normal spending routines or locations. Instead of answering multiple questions from a bank’s contact center, a user can simply receive an automated call when such transactions take place and verify. For example, Beranek suggested cardholders use phrases like “My voice signature authorizes this transaction” to confirm the suspicious charges are not that of identity thieves.
A similar system could be used for online transactions as well, Beranek pointed out. During a first-time transaction or purchase over a certain amount, a user could approve a charge via voice recognition.
Because cybercriminals are finding new ways to steal sensitive data, security experts are highlighting different strategies to prevent data leakage. Voice authentication is a new way to conveniently protect sensitive information on endpoints. Nearly 35 million individuals utilize this form of technology for endpoint security, and that number increases every day.