pindrop-logo-2.svg
Search
Close this search box.
Search
Close this search box.

Discover the Future of Voice Security

Gain unparalleled knowledge into topics like audio fraud prevention, authentication, deepfakes, and more with our expert-curated collection of informative webinars, insightful blogs, and comprehensive reports.

Pulse | Blog

ANI Validation: Fixing the Game of Telephone


November 1, 2021

ANI Validation has the potential to transform both phases of a call, The Set Up and The Action. Because it is a passive tool that can be implemented using an API, it can deliver the capabilities your business needs to help minimize The Set Up from the caller’s perspective, help protect the call operation from spoofing, and help add efficiency to IVR and Agent interactions.

Read Here
Pulse | Blog

Preparing Regional Banks & Credit Union Contact Centers to Cash in on New Waves of Customers


November 1, 2021

Perhaps eager to make up for lost time, consumers might also be actively shopping for the financial institutions that can best enable their plans. And with so many choices, they may not be likely to compromise. Thus, an opportunity is forming for community banks and local credit unions to stand out in an otherwise crowded field. Earning business can hinge on delivering a personalized, frictionless experience–and every phone call is a new first impression.

Read Here
Pulse | Blog

Measuring STIR/SHAKEN Attestations Against Ani Validation


October 29, 2021

This report is an analysis conducted of SIP Header and STIR/SHAKEN attestation information by its VeriCall® Technology spanning approximately 109.5 million telephone calls from April 2021 through September 2021. The report serves as a preliminary case study to discuss the (un)availability and (in)efficacy of STIR/SHAKEN Attestations, as well as the relationship between STIR/SHAKEN Attestation level and VeriCall risk scoring for the purposes of call authentication in the contact center.

Read Here
Pulse | Blog

"Free": The True Cost of Knowledge Based Authentication Questions


October 19, 2021

Despite the customer dissatisfaction, delays, longer wait times, and ongoing data breaches, KBAs do continue to persist and are still one of the more prevalent forms of consumer identity and verification. Why is this so? What are companies losing out on by sticking to KBAs? How much value can be unlocked by removing KBAs from the ID&V process?

Read Here
Pulse | Blog

Deepfake: The New Fraud Tool On The Block?


October 5, 2021

Deepfakes are generative media in which a person in an existing image or video is replaced with someone else's likeness. Deepfakes leverage powerful techniques from machine learning and artificial intelligence to manipulate or generate visual and audio content with a high potential to deceive.

Read Here
Pulse | Blog

Things You Can Do To Improve Your Contact Center's CX


August 24, 2021

A call center generally deals with thousands of callers on any given day, so adding a personalized touch in every call might at first seem like a daunting task. But, it is crucial to avoid the discouraging sound of indifference in an automated menu or in an agent’s voice.

Read Here
Pulse | Blog

The Caller Authentication Guide for 2021 and Beyond


July 1, 2021

Applying the right caller authentication practices will improve your customers’ experience, increase your performance in customer experience metrics and give a boost to your brand’s power and the overall loyalty around it.

Read Here
Pulse | Blog

The Contact Center's Guide to Account Risk


August 9, 2021

Taking an account centric approach takes the fight against fraud to another “front”. Account risk allows you to see which accounts are at risk, building on the knowledge of fraudsters using the phone channel to extract information and take over accounts.

Read Here
Pulse | Blog

How to Make KBA's Work for Your Contact Center


August 17, 2021

Regardless of the authentication needs of any particular call, the use of KBA to satisfy them will result in added time and cost that could be avoided by using Passive authentication methods instead.

Read Here