Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsLogical Security

Using biometrics to reinvent customer authentication

By Simon Marchand
reimagining biometric access for customer authentication
July 14, 2021

Fraudsters have long been taking advantage of customer service representatives, pretending to be someone they aren’t on the phone, over email, or over to chat to access accounts, information, and money. As the pandemic took hold and online engagements became even more frequent with people staying home over the last year, the number of fraud attempts began to rise as bad actors looked to take advantage of the fully digital environment. In fact, the Federal Trade Commission (FTC) estimates that—between stimulus checks and unemployment benefits—Americans have lost more than $3.3 billion in COVID-19 related fraud.

Even through the onslaught, organizations continue to rely on outdated authentication methods to determine identities—which not only leaves them susceptible to fraud, but also creates frustrating, time-consuming experiences for consumers. The customer service representative is required to ask countless questions used to confirm identity, including pins, passwords, contact information, account number, SSN, and answers to pre-set challenge questions. Forgetting an answer to just one of the questions can delay the process event further, as the agent won’t be able to authenticate the customer’s identity and, thus, cannot help them with their inquiry. And unfortunately, these methods aren’t the most effective in protecting against fraud; most—if not all—of this information can be sought after by fraudsters on the dark web and can be used to hack into an account regardless of the precautions.

While this interrogation process may prevent, or discourage, a fraudulent attack, it can also cause a lot of frustration with a legitimate customer who is unable to access their account. Enter AI-enabled biometrics, which has become a key combatant in the fight against deception for its ability to authenticate customers securely and accurately over the phone before they even reach a live agent. Not only can biometrics fight fraud, but the tool is also reinventing the customer experience. Here’s how.

Defining biometrics

Biometric authentication uses voice, conversation, and behavioral modalities to allow consumers to create their own virtual fingerprint. Examples of modalities include patterns in speech, the choice of words used, how a person types, or the way someone holds their cellphone. Biometrics compare the voice and behavior modalities to the customer’s existing voiceprint and can confirm whether someone is who they say they are within a half-second of speaking time, versus the 90 seconds or more it would take to ask and answer the identifying questions. Biometrics provide businesses with a frictionless, faster, and more secure way to authenticate identification than the traditional Q&A methods.

How biometrics can improve experience and security

With biometrics, the authentication solution will automatically analyze a customer’s unique features and characteristics against a pre-established profile to verify their identity. The company associate can be assured that the caller is who they say they are quickly and can proceed with resolving the account issue, leading to better customer experiences in a time of instant gratification and high customer expectations. No longer do customers have to go through the frustrating process of digging for a password or repeating the same information to several people and robots. This quick interaction also has an impact on hold times for other callers in the queue, speeding up the process for all.

In addition, the human voice is one of the safest and fastest ways to validate a person’s identity. Voiceprints are created from more than 1,000 voice characteristics; it is language agnostic, device agnostic, and channel agnostic. The artificial intelligence that powers a biometric solution can analyze those distinct voice characteristics, cross-checking the speaker’s unique device, channel identification, and speech patterns. The intelligence can also verify that the speaker is a live human being and not a recording or other artificial creation such as a deepfake. Biometrics stops takeover attempts in their tracks, giving customers and employees a peace of mind.

In addition to streamlining and securing the customer experience, biometrics can also improve employee experience, leading to lower stress levels and fewer burnout numbers. One study from PwC found that organizations with satisfied employees are also 82% more likely to provide a better customer experience. It’s a win-win situation for the customer and employee.

Biometrics in practice

Fraudsters have targeted one specific, vulnerable group of individuals more than others over this last year: seniors. According to a pre-COVID-19 analysis by the U.S. Consumer Financial Protection Bureau, people impacted greatest by fraudulent activity were ages 70 to 79—averaging a loss of $45,300.  

Recognizing that senior citizens were particularly defenseless to fraud efforts, Telefónica, a global telecommunications firm, implemented AI-enabled intelligent age detection capabilities in its biometrics solution to help prioritize seniors who were more likely to call in with requests during strict lockdowns. The human ear typically cannot differentiate between a 50-year-old and a 70-year-old with any reasonable degree of precision. Working with Nuance, Telefonica implemented AI voice algorithms able to detect over 1,000 characteristics of the human voice, far more than a human could. The deep neural network-based AI algorithms were honed-in on a subset of these characteristics that are affected in a predictable way as humans age.

Within weeks, Telefónica’s senior customers were transferred immediately to a live agent, able to get faster, more personalized service, and could rest assured knowing their account information was secure. In a time of increased confusion and fraud attempts, this level of security and customer dedication helped the global telecommunications firm standout from competitors. This new factor is also a key factor in preventing fraud and elder abuse.

Fraudsters are getting smarter, and they’re working harder now that the world is predominantly digital thanks to remote work and stay-at-home orders. To combat those attacks while simultaneously creating frictionless experiences for customers, organizations need to update their security methods to invest in AI-enable biometrics. The result is not only enhanced security, but happier customers and employees.

KEYWORDS: authentication biometric access management biometric authentication cyber security data privacy data security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Simon Marchand, CFE, Chief Fraud Prevention Officer at Nuance Communications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • behavioral biometrics

    How biometrics are shaping the future of authentication

    See More
  • two-factor authentication

    Individuals use two-factor authentication, biometrics to protect information

    See More
  • TSA credentials

    TSA using new credential authentication technology to improve checkpoint screening capabilities

    See More

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!