Making the Case for Voice Biometrics in the Contact Centre

“I know I am who I say I am so why don’t you?” —  Every customer who ever failed your authentication process

Even if you’ve only been paying scant attention to what’s going on in the contact centre industry over the last few months, you will have noticed an increasing tempo of stories from a whole string of the world’s leading organisations implementing voice biometrics for their customers in the IVR, when speaking to contact centre colleagues, and even in their mobile channels. In the U.K. alone, half of the country’s largest banks have already announced their intentions to deploy the technology and new market entrants even see it as a competitive advantage. In nearly every region where I spend time, there are dozens more organisations fully committed to implementing voice biometrics who have yet to go public.

Making every call easier, quicker and more secure
Whilst nearly all of theses implementations are shaped by the unique nature of the customers and organisations they serve they are almost universally driven by three promises:

  • Increasing the number of customers successfully authenticated, thereby removing the need for them to remember a 12-digit number, their inside leg measurement, the model of their dog’s uncle’s first car or similar.
  • Reducing the time spent by front-line colleagues supporting those customers who fail automated authentication methods or subjecting every customer to an interrogation before they actually meet their needs.
  • Dramatically increasing the required effort from bad actors to infiltrate customer accounts, as well as increasing the confidence of customers in the security of their personal data, services and accounts.

Through using the unique nature of every customer’s voice that is inherent in every voice channel interaction, voice authentication is gaining steam.

It’s different this time
I know that many of you will have been here before with high hopes, missed expectations and, in some cases, hundreds of man hours spent on proofs of concepts with oversold silver-bullet solutions to all of your voice channel authentication challenges. So whilst there remains nothing fundamentally new about the science behind this technology there are a number of reasons why we have now reached a tipping point (if not gone past it in some industries and countries) where the rational case for change has caught up with the emotional one.

Increased authentication costs and losses increasing demand
On the demand side as customers move more of their day-to-day interactions to web and mobile, they are simply forgetting the steps to our security dances often at the point of greatest emotional need, whilst fraudsters are moving in the opposite direction as our online defenses become more and more effective. These trends are only likely to accelerate as a new wave of mobile propositions hit the app stores and billions are spent shoring up cyber security.

Increasing product maturity and track record reducing cost and risk of delivery
Whilst on the supply side increasing vendor product maturity from several years of diverse early adopter deployments, an increasing body of delivery experience and general contact centre modernisation is reducing both the cost and time to build and run, as well as risks associated with implementation. Likewise, this will only accelerate over the next few years as products become increasingly mature, commoditised, bundled and integrated with core platforms.

Greater customer awareness of their own security as a result of high profile data breaches and frustrations with increasingly complex mechanisms to mitigate risks with existing authentication approaches are also dramatically increasing acceptance with some astounding figures being quoted by some organisations who approach it in the right way.

Greater cultural acceptance
At the same time, organisations, often as a result of their experience countering cyber threats, are becoming more culturally accepting of solutions. Whilst these solutions are significantly better, though not always perfect, companies are adopting a more in-depth defense (through transaction screening and other methods) rather than a front door posture that makes them more acceptable. Previous requirements that there be no chance whatsoever of a bad actor getting through are being replaced by an acceptance that existing authentication methods susceptible to attack and provide executives with no ability to tune or react to changing circumstances.

Making your case
Of course every organisation is different because we all start from different places. Your authentication practices have probably evolved over many years to reflect the needs of your customers, changing commercial imperatives and fraudulent activity. So we can’t assume that the same cookie cutter implementation is going to work for you and we can’t assume that in your own unique situation you have reached or passed the metaphorical tipping point.

First step
That’s why we are running a Master Class in partnership with Opus Research in conjunction with their Intelligent Authentication Conference in San Francisco this September. We bring together a vendor agnostic delivery perspective from some of the world’s most high-profile deployments alongside more than 25 years of industry experience. Designed for qualified potential end users attending the conference, the Master Class will use a fictitious example of XYZ Bank to work in small peer groups to identify and understand key dimensions of the rational and emotional case for voice biometrics implementations, giving you the tools to build change within your own organisations.

Join our Master Class in San Francisco on September 12–13 at the Intelligent Authentication (IAuth) Conference.

Matt Smallman gave up his day job as a senior executive designing the transformation of some of the UK’s largest financial services organisations to evangelise for and help organisations deliver next generation customer contact experiences. Feel free to connect with Matt via LinkedIn and Twitter.



Categories: Conversational Intelligence, Intelligent Authentication, Articles

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.