When it comes time to implement a new voice biometric identity verification solution in your enterprise, you don’t want to rush the process by investing in the wrong solution. End-user authentication is a process that you want to take seriously, as your security solution will be responsible for safeguarding all of your organization’s sensitive mobile data.
Here are five voice biometrics deployment tips to guide you across the enterprise:
Shop around: Not all voice biometrics solutions are created equal, as some are difficult to integrate into your system. Find a provider that you know will outfit your company with a reliable and flexible solution.
Educate your end users: Once you find a voice biometrics provider that you would like to work with, spend some time educating your end users about the new authentication changes that will be taking place. Have a meeting about the issue with your staff, and let your end users know that it’s time to start taking mobile security seriously. Let them know how voice biometrics will help.
Plan ahead: Assess your organization’s needs so that you have an idea of what investments to make and deploy across the enterprise. Come up with a firm number for how many end users the solution must support and how many devices each user brings into play. Once you know these figures, you will have a better idea of the type of solution that will be right for your business.
Test your solution: The last thing you want to do is enter into a binding contract with a security vendor only to find out afterward that it’s not a great fit. Find a vendor that will allow you to thoroughly vet your solution, such as with a free trial.
Encourage multifactor use: Let your employees know that voice biometrics can be used in conjunction with other multifactor security options like passwords and PINs. If you need to demonstrate the necessity of multifactor security, look no further than the recent data heist at the IRS for an example. Experts believe that if multifactor security had been deployed on IRS employee mobile devices, hackers would have been less able to break in and obtain access to hundreds of thousands of taxpayer accounts.
Are you feeling overwhelmed trying to thwart the multitude of digital threats facing your enterprise? With so much risk residing online today, the challenge of keeping your enterprise secure can seem like a never-ending process. In fact, it can be difficult to even know where to start.
While the challenge may be difficult, it’s not impossible; and one of the best ways of staying out of trouble is to build a foundation of security that starts at the application level. You can’t, in other words, trust that your employees will stay out of trouble online. Mobile security needs to be built directly into your mobile software.
Why? Your employees are using mobile devices to communicate, collaborate, and access corporate data and networks on a daily basis. These devices are great for convenience and productivity purposes, but they also represent a major cyber security risk if they are not fortified with the right type of mobile security authentication software. A stolen, lost, or compromised mobile device can spell disaster from a cyber security perspective if it isn’t protected with a proven security solution.
Voice biometric identity verification is one technology that you can use to build this foundation of trust. Voice biometric authentication will ensure that any device picked up by someone other than its rightful owner can’t be accessed. End users simply have to set up a unique voiceprint during registration, and then recite a short phrase during subsequent logins. It can serve as either a standalone mobile security solution, or it can be used to compliment other forms of authentication in multifactor form.
VoiceVault, a leading provider of mobile security identity verification software, can work with your team to build a voice biometrics engine directly into your application. Click here to learn more about how you can leverage VoiceVault’s expertise.
The banking industry is now at a major crossroads as it looks for ways to protect against costly cyberattacks apart from traditional methods like passwords and security questions. Right now, many people are asking what the future of customer authentication will look like in banking.
According to a new report from Goode Intelligence, you should look no further than voice biometric identity verification. By 2020, voice biometrics will be the primary authentication solution for financial consumers.
In an article from Biometric Update, the report’s author—and Goode Intelligence founder—Alan Goode explained that the banking industry is looking for authentication solutions that are not only secure but also convenient to use, and that voice biometric identity verification is the technology that can fill this need.
Why is voice biometrics convenient to use? First and foremost, it only requires the end user to speak a single short phrase into his or her mobile device. This brings up another point, too: There is no extra technology to purchase. Every customer with a smartphone can utilize the technology since every smartphone already has a built-in microphone.
All a bank has to do, therefore, is to partner with a voice biometrics provider like VoiceVault that can build a voice biometrics engine directly into a corporate application. Once the voice biometrics component is added to the application, it can be rolled out to end users directly through the cloud.
If you are interested in upgrading your bank’s end-user authentication platform to include voice biometrics, check out VoiceVault’s pressure-free, 45-day trial. Click here for more information about this exciting program.
Mobile applications can be a double-edged sword at the enterprise level. On one hand, mobile applications are a must for enhancing productivity. In fact, it’s hard to imagine what life would be like without access to applications.
On the other hand, mobile applications can be extremely dangerous for enterprise security. Research shows, for instance, that 97 percent of mobile applications can access private data yet lack appropriate security safeguards. Further, 75 percent of mobile applications don’t adhere to proper encryption protocols for data storage.
At this point, your company can’t abandon its mobile application; after all, it’s become too engrained in your business’s daily operations. A better approach is to improve your mobile identity verification strategy.
What options are available to improve mobile application security? There are many different solutions that you can choose from besides traditional passwords and PINs, such as requiring end users to draw a unique pattern on the screen or submit a fingerprint or photo.
The biggest problem with these solutions, however, besides being relatively insecure, is that they take time to complete. Picture your employee walking down a busy street with a coffee in his or her hand, for instance; that person will not want to stop, take a selfie (as is required with facial recognition software) or enter a lengthy security credential like a password. The solution needs to be quick and effortless in order for end users to adhere to embrace the technology.
Voice biometric authentication is one technology that your business can use to streamline mobile application security. An end user simply has to recite a phrase into the microphone of his or her device. The biometric engine will scan that person’s voiceprint and grant access only if it meets a variety of specific vocal requirements.
Want to learn more about mobile voice biometrics? Click here!
You go to great lengths to keep your team of expert developers happy. After all, these are the people responsible for building and deploying the first-class applications that keep your enterprise ticking. In your quest for the ideal mobile identity verification solution, therefore, you’ll want to find an option that is not only safe and user-friendly but developer-friendly (meaning easy to integrate, flexible, and free of bugs and vulnerabilities) too, like VoiceVault’s ViGo.
Here are three reasons why your developers will love working with VoiceVault’s voice-based mobile identity verification solution, ViGo:
It will save them time: ViGo is designed to take the hassle out of application security. Oftentimes, developers will build an amazing application only to have it hampered by cumbersome security architectures that slow down performance and create unnecessary barriers for end users. VoiceVault, however, will take care of the hard part for you by building a voice biometric engine directly into your existing application. The result will be a light-weight, easy-to-access security solution that your end users will love.
It comes with a flexible test environment: Using ViGo is pressure-free, as your team will have a free 45-day window to test the solution across your enterprise and determine whether it’s for you. Beyond this window, you can enroll in the Developer Test Environment which, in exchange for a fee, will grant you a three-month trial and the ability to scale your user base up to 1,000 employees.
VoiceVault provides plenty of in-house support: The VoiceVault support team is readily available to assist with any questions or issues that may arise during implementation. As we described in a recent mobile education case study, one of our customers spoke about how they encountered an issue while they were integrating the product, and emailed support at VoiceVault. Within 20 minutes, a comprehensive response was emailed back and the team was able to solve the problem. Your developers, in other words, won’t be on their own using this solution. It’s a team effort!
Your company is a mobile education provider that has the potential to be a major market disrupter in its industry. That’s because your application can streamline learning in a way that is highly convenient for active end users, and affordable too.
The only problem is that you’re lacking one critical element: a security solution capable of ensuring that customers are in fact who they claim to be when using your product. Since your business operates almost entirely online, and you don’t meet customers face to face, your company is highly susceptible to fraud.
Voice biometric identity verification is one technology that can streamline the end-user authentication process and ensure a high level of end-user integrity.
Here are three reasons why voice biometrics is a great fit for the mobile education industry:
Impossible to imitate: One major challenge that developers face when integrating security solutions into mobile education software is that it’s hard to prevent end users from imitating other identities. For instance, passwords and user names cannot prevent people from logging in and completing course work under someone else’s name. A voice biometrics engine, however, uses both behavioral and physiological characteristics to determine whether a voice print is accurate; in other words, it takes into account both a unique voice print and other factors such as tone and accent.
Works quickly: Developers know that they cannot sacrifice speed and efficiency in their mobile applications, as these two critical factors are what typically drive customers to mobile education in the first place; simply put, users don’t have the time or patience to waste entering security credentials every time they access an application. Using voice biometric authentication only takes a few seconds at a time, and does not require typing any information or answering any questions; all an end user has to do is recite a simple phrase.
Mobile-friendly: Voice biometrics is mobile-friendly in that it can work over just about any smartphone or tablet, using a device’s built-in microphone. It’s capable of being built directly into an application, too. This was a major selling point for one company, Aceable of Texas, that decided to partner with VoiceVault to secure its mobile drivers’ education and defensive driving solutions. Aceable needed a solution that could integrate directly with its mobile application so that customers did not have to use a standard Web browser to access their service.
By partnering with VoiceVault, Aceable was able to achieve its goals and realize its advanced security needs while still maintaining its mobile-first mentality.
Integrating a new mobile identity verification solution across your enterprise is a big decision. It requires a great deal of planning and testing, as you want to make sure that the solution is the right fit for your enterprise before making an investment.
For this reason, VoiceVault makes it easy to test the waters and evaluate its ViGo voice recognition software. If you’re looking to test ViGo, you can sign up for a free 45-day, non-recurring self-registration period. During this time, you can register up to 200 users across your enterprise.
But what happens if you still need more time to evaluate the product after the free 45-day window ends? If you’re still not ready to commit to using ViGo, you can enter the next phase of the integration cycle which is the Developer Test Environment. Using the Developer Test Environment is not free, as it costs $750 to sign up. In doing so, however, you’ll gain access to a three month trial period as well as the ability to register up to 1,000 users.
The Developer Test Environment will also grant you access to the following features:
Limited custom configuration/ phrases: Enjoy a preview of some of the customizable features that you will receive when using the full ViGo product.
No maintenance downtime: Unlike the initial 45-day window, you can avoid scheduled maintenance periods and ensure a greater amount of uptime.
High availability API: VoiceVault’s high-available API protects your application in the event of system failure.
Guaranteed data retention: Gain detailed records of your usage data for compliance purposes.
The great part about the Developer Test Environment is that it’s recurring, which means you can use it until you’re ready to migrate to a larger package, which is billed on a per-user basis and does not come with a maximum number of registered users.
As a developer, finding a simple and efficient security solution for your mobile application can be a tough task. It’s hard enough creating an application that is user friendly before having to worry about keeping it safe from unauthorized third parties. But mobile application security should not be taken lightly. Corporations are increasingly relying on mobile applications to store sensitive data, but mobile threats are intensifying as well. Creating an application that is secure could mean the difference in preventing a costly security breach from occurring.
Recently, we here at VoiceVault sat down with our CTO Tim Furnell, who spoke about why incorporating mobile security into technology is so difficult.
“It’s complex in terms of the development process and because there are so many different types of solutions,” he said, referencing Apple’s new Touch ID sensor as an example. “On the Apple iOS platform, for instance, there are more standardized solutions. But then you are restricted to using the different types of security modes that they want you to use.”
This creates problems for developers when trying to incorporate a security solution that will work over different types of mobile operating systems. That is, unless you are talking about voice biometrics, explained Furnell, which utilize a very important and undervalued part of a mobile device: its microphone.
“Every device by nature has a microphone,” said Furnell. “It’s all you need in terms of implementing a voice biometric solution. There is no need to make allowances for devices that don’t have finger print sensors or cameras for facial recognition. Therefore, it’s much easier than having to worry about forward or rear-facing cameras. It’s also easier to recite a phrase than to remember a 12-digit PIN number. People are generally comfortable about talking.”
It’s this level of comfort that makes VoiceVault’s ViGo, a mobile voice biometric identity verification solution, so enticing.
“ViGo enables people to remember a simple phrase that is easy to say,” he said. “It’s very short and highly accurate. And it’s convenient, too.”
As Furnell went on to explain, VoiceVault is efficient because it is asynchronous. There appears no delay, and no latency to the end user. What’s more, the solution boasts a subsecond response time. And since ViGo is a cloud-based software-as-a-service, there is no infrastructure required on behalf of the company that utilizes it.
“We manage all of the heavy lifting in our data centers,” said Furnell.
Besides usability, VoiceVault’s ViGo is also very easy to deploy. There is no training necessary other than a short enrollment process where end users need to recite phrases three or four times. On top of that, figuring out how to use ViGo is fairly intuitive.
So, why should you invest in VoiceVault? According to Furnell, it’s because the software is designed with developers in mind.
“What VoiceVault has focused on with ViGo is the developer experience,” he said. “It’s really about allowing a company and a developer to quickly incorporate voice biometrics into a new or existing application. From that point of view, we supply a library for two major platforms: iOS, and Android. A developer can add a library to its application and then use very simple calls in order to build in voice biometrics.”
VoiceVault also provides sample code to allow an application to be built within minutes of registering and downloading software. And it supports Xcode, too.
In order to get started, simply register for a ViGo account using a quick online process. Then, use your account details to download our library and our source code. From there, you can build your own sample application. A developer with mobile experience will have no trouble at all setting up a sample application within an hour of starting the registration process.
“The whole process moves very quickly,” explained Furnell. “It takes the pain out of building and worrying about your biometrics solution. You really get everything you need to start with our library and our sample application that comes with the library download.”
There is also an incentive to get started. Upon registering, all developers get a 45-day period with full access to the ViGo’s cloud-based system. This is more than enough time to learn how to make the system run, which will save time, money and more work.
As an IT manager, you have the responsibility to secure company information that end users may download onto their mobile devices. This is one of the most important responsibilities of running a successful bring your own device (BYOD) program. Unfortunately, security is still a major barrier to implementing mobility for many organizations, both public and private. For instance, 73 percent of federal IT executives claim that security is their greatest obstacle to utilizing mobility.
In the past, the majority of IT managers ensured BYOD safety with the use of mobile device management (MDM) software. This software is typically deployed from an on-premises server and distributed to remote end-user devices for monitoring and managing purposes. But MDM software was not designed to secure data, just the devices. Due to the growing threat of mobile malware attacks, which increased by 27.6 percent last year, and the ease with which a mobile device can contract malware, IT managers need to change their approach and focus on protecting sensitive company information instead of end-user devices. Managers need to ask who is accessing company data, where the data is being stored, and what security measures are in place to prevent unauthorized users from gaining access to it.
Right now, the best option that IT managers have for protecting mobile endpoints is to store sensitive company information in the cloud and provision it to end users from a remote location. The information should then be protected using multifactor security elements, which can include a combination of features like voice biometric identity verification, passwords and security questions. By taking this approach, if a mobile device is hacked or stolen, an unauthorized user would not be able to gain access to sensitive information. For added security, IT managers can also suspend access to a user account from a cloud-based API.
If you are looking for a smarter, more cost-effective way to secure your mobile end users using cloud technology, consider VoiceVault—a leading provider of voice-based mobile identity verification solutions. For more information about how VoiceVault can provide your company with the latest in voice biometric technology, click here.
According to the report, the U.S. was named the top developer of risky apps. In fact, 42 percent of applications deemed to be dangerous stemmed from publishers and developers located on American soil.
Why is application security such a big problem? It can be attributed to a lack of quality control in application hubs like the App Store and Google Play. Many companies that sell applications in these digital storefronts store sensitive information on unsecure third-party servers, which often leave the door wide open for unauthorized third parties to hack in and steal consumer information. While Apple and Google maintain that they regularly scan for security purposes, the fact is that both companies contain applications with malware.
“This [data] came as a surprise to Marble’s analysts, who before examining the data would have bet that most malicious apps originated from publishers in Eastern Europe or Asia,” a spokesperson explained. “While China, Korea, India and Taiwan generate a great number of malicious and risky apps, their combined total doesn’t amount to that of the United States.”
Though troubling, the report could actually be beneficial if it drives development of stronger application security standards in America. Right now, the U.S. has no overarching security mandates apart from those enforced by industry watchdogs like the FIDO alliance. The fact is that there needs to be a stronger method of ensuring that U.S. applications and software solutions are safe for use before they are made available for sale on the open market.
Mobile identity verification provider VoiceVault is a member of the FIDO alliance. You can learn more by clicking here.