pindrop-logo-2.svg
Search
Close this search box.
Search
Close this search box.

Discover the Future of Voice Security

Gain unparalleled knowledge into topics like audio fraud prevention, authentication, deepfakes, and more with our expert-curated collection of informative webinars, insightful blogs, and comprehensive reports.

Pulse | Video

5 Best Practices for Contact Center Authentication

Watch Now
Pulse | Webinar

Supercharging the IVR to Win Customers for Small to Medium-Sized Banks

5 Insights in 15 Minutes


June 24, 2021 @ 1:00 pm - 1:30 pm EST
Sam Espinosa (Next Caller, a Pindrop Company)

Watch Now
Pulse | Webinar

AI Playbook for Financial Leaders

5 insights in 15 minutes


June 10, 2021 @ 1:00 pm - 1:30 pm EST
Jay Hart & Dave Dalebroux

Watch Now
Pulse | Video

3 Problems Pindrop Helps Customers Solve Everyday

Watch Now
Pulse | Blog

#WFH: 3 Ways to Ensure Customer Experience in Restructured Call Centers


June 1, 2021

Getting rid of KBAs, attacking your metrics and empowering your customers are the most recommended tactics.

Read Here
Pulse | Blog

How to: Optimize Enrollment for Enhanced Authentication Right Now


June 1, 2021

Leveraging ANI as a factor in the ID claim, leveraging a unique identifier, avoiding clunky active enrollment, keeping things simple with API integration whenever possible and engaging experts are key actions to take.

Read Here
Pulse | Report

Contact Center Authentication: A Mystery Shopper’s Authentication Journey

Analyst Report by Aite Group


Having the ability to consistently authenticate callers and identify a potential fraudster can enable financial institutions to offer more products and services either through the IVR or through contact center agents

Download
Pulse | Webinar

Contact Center Authentication: A Mystery Shopper’s Authentication Journey

Pindrop Featuring Aite Group


May 27, 2021 @ 1:00 pm - 2:00 pm EST
Mark Horne & Shirley Inscoe (Aite Group)

Watch Now
Pulse | Blog

Fraudsters are Exploiting Cash Sharing Apps


May 26, 2021

Fraudsters are now exploiting the past trustworthiness of the phone channel to their advantage. They are using it as an entry point for compromising online services by requesting password resets for accounts over the phone to undermine web authentication.

Read Here