Biometrics Continue to Show Prominence in the Future of Mobile Online Payments

Biometrics Continue to Show Prominence in the Future of Mobile Online Payments

Blog Posts
BLOG POSTS Biometrics Continue to Show Prominence in the Future of Mobile Payments Angelo Gajo | August 14, 2019 | 8 minutes As biometric technologies such as voice, facial and fingerprint technologies continue to be applied to various applications and use cases, the face of mobile payments could soon be heavily centred around biometrics and smartphones. This could provide better security and improved user experience while making tangible payment methods such as credit cards obsolete. The main trends that are currently causing the greatest influence are: mobile commerce, digital wallets and passwordless authentication. Mobile Commerce As covered in a previous blog post, mobile commerce is on the rise with many consumers purchasing goods and services and conducting money transactions online via their smartphones. In 2018, 40% of retail e-commerce sales…
Read More
Verifying Callers Using Voice Biometrics in Amazon Connect

Verifying Callers Using Voice Biometrics in Amazon Connect

Blog Posts
BLOG POSTS Verifying Callers Using Voice Biometrics in Amazon Connect Angelo Gajo | August 7, 2019 | 5 minutes EVA’s voice verification capabilities allow you to seamlessly and securely authenticate the identity of your customers when they call your contact centre or when they interact with your website or mobile app.Utilising the power of Auraya’s next-generation ArmorVox™ engine, EVA works seamlessly in Amazon Web Services’ Amazon Connect platform. This blog details how EVA operates in an existing system to provide a better understanding of how voice verification services are implemented. Caller Identification When a user calls the contact centre, EVA uses certain information such as calling line identification (CLI), spoken account number or spoken phone number to determine who the caller is claiming to be.If the caller has a voiceprint…
Read More
Difference Between Speech Recognition and Voice Recognition​

Difference Between Speech Recognition and Voice Recognition​

Blog Posts
BLOG POSTS Difference Between Speech Recognition and Voice Recognition Angelo Gajo | July 26, 2019 | 6 minutes According to Data Bridge Market Research, the global voice recognition and speech recognition market is set to grow at a CAGR rate of 25.7% from 2018 to 2025. The market is expected to reach a market value of USD 6,770.21 million by 2025.Market strengths include increased demand for voice and speech-based biometric systems, increasing demand for voice authentication in digital channels such as mobile applications and the implementation of artificial intelligence to improve voice and speech recognition accuracy.Present opportunities include the development of multi-linguistics and local languages and the implementation of voice and speech recognition in the automotive industry and service robots. However, research states that voice and speech technology limitations and…
Read More
Passwordless Authentication Gains Traction as Demand and Availability Increases

Passwordless Authentication Gains Traction as Demand and Availability Increases

Blog Posts
BLOG POSTS Passwordless Authentication Gains Traction as Demand and Availability Increases Angelo Gajo | July 24, 2019 | 5 minutes Gartner recently published an article listing the top 7 security risk and trends of 2019. The article is based on a presentation by a chief information security officer of a national transportation system. These security risks and trend are said to focus on the continuous “strategic shifts” in the security ecosystem that are yet to be recognized globally.As stated in the article, the trends are:Leading SRM leaders are creating pragmatic risk appetite statements linked to business outcomes to engage their stakeholders more effectively.There is renewed interest in implementing or maturing security operations centres (SOCs) with a focus on threat detection and response.Leading organizations are utilizing a data security governance framework…
Read More