Brands across industries and around the world are establishing conversational engagement models with both customers and prospects. Large banks, financial services companies, e-retailers, wireless carriers and other global giants urge their best customers to download and use their mobile apps, add them to the contacts on their favorite messaging platform or engage through “chatbots” on their websites.
Opus Research, a technology analysis and marketing firm that specializes in conversational technologies, has long seen zero-effort authentication as a necessity for creating trusted links between brands and their customers. This requires a balancing act between security and convenience, which is why biometrics, specifically voice biometrics, is used by enterprises as the foundation for simple assertion and authentication of a claimed identity in the context of a call to a customer care contact center.
In this report, Opus Research provides enterprise executives competitive context for 13 firms offering authentication solutions that include voice biometrics. In recent years, dramatic changes have taken place in both technology capabilities and market dynamics for voice biometrics solution providers. The firms under study in this report have enrolled roughly 600 million voiceprints that are put in service for over 2 billion authentications each year and reduced phone-based fraud losses by $300 billion.
This document, authored by Opus Research Lead Analyst & Founder Dan Miller, includes an appendix with a comprehensive list of company dossiers and provides a single point of reference to understand the competitive differences for companies offering software, services or platforms for voice-based authentication.
Featured Research Reports are available to registered users only.
Click Here to View the Report Summary
For more information on becoming an Opus Research client or to purchase the report ($1999), please contact Pete Headrick ([email protected], +1-415-904-7666).
Categories: Featured Research, Reports, Conversational Intelligence, Intelligent Authentication, Articles