Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsLogical Security

Using biometrics to reinvent customer authentication

By Simon Marchand
reimagining biometric access for customer authentication
July 14, 2021

Fraudsters have long been taking advantage of customer service representatives, pretending to be someone they aren’t on the phone, over email, or over to chat to access accounts, information, and money. As the pandemic took hold and online engagements became even more frequent with people staying home over the last year, the number of fraud attempts began to rise as bad actors looked to take advantage of the fully digital environment. In fact, the Federal Trade Commission (FTC) estimates that—between stimulus checks and unemployment benefits—Americans have lost more than $3.3 billion in COVID-19 related fraud.

Even through the onslaught, organizations continue to rely on outdated authentication methods to determine identities—which not only leaves them susceptible to fraud, but also creates frustrating, time-consuming experiences for consumers. The customer service representative is required to ask countless questions used to confirm identity, including pins, passwords, contact information, account number, SSN, and answers to pre-set challenge questions. Forgetting an answer to just one of the questions can delay the process event further, as the agent won’t be able to authenticate the customer’s identity and, thus, cannot help them with their inquiry. And unfortunately, these methods aren’t the most effective in protecting against fraud; most—if not all—of this information can be sought after by fraudsters on the dark web and can be used to hack into an account regardless of the precautions.

While this interrogation process may prevent, or discourage, a fraudulent attack, it can also cause a lot of frustration with a legitimate customer who is unable to access their account. Enter AI-enabled biometrics, which has become a key combatant in the fight against deception for its ability to authenticate customers securely and accurately over the phone before they even reach a live agent. Not only can biometrics fight fraud, but the tool is also reinventing the customer experience. Here’s how.

Defining biometrics

Biometric authentication uses voice, conversation, and behavioral modalities to allow consumers to create their own virtual fingerprint. Examples of modalities include patterns in speech, the choice of words used, how a person types, or the way someone holds their cellphone. Biometrics compare the voice and behavior modalities to the customer’s existing voiceprint and can confirm whether someone is who they say they are within a half-second of speaking time, versus the 90 seconds or more it would take to ask and answer the identifying questions. Biometrics provide businesses with a frictionless, faster, and more secure way to authenticate identification than the traditional Q&A methods.

How biometrics can improve experience and security

With biometrics, the authentication solution will automatically analyze a customer’s unique features and characteristics against a pre-established profile to verify their identity. The company associate can be assured that the caller is who they say they are quickly and can proceed with resolving the account issue, leading to better customer experiences in a time of instant gratification and high customer expectations. No longer do customers have to go through the frustrating process of digging for a password or repeating the same information to several people and robots. This quick interaction also has an impact on hold times for other callers in the queue, speeding up the process for all.

In addition, the human voice is one of the safest and fastest ways to validate a person’s identity. Voiceprints are created from more than 1,000 voice characteristics; it is language agnostic, device agnostic, and channel agnostic. The artificial intelligence that powers a biometric solution can analyze those distinct voice characteristics, cross-checking the speaker’s unique device, channel identification, and speech patterns. The intelligence can also verify that the speaker is a live human being and not a recording or other artificial creation such as a deepfake. Biometrics stops takeover attempts in their tracks, giving customers and employees a peace of mind.

In addition to streamlining and securing the customer experience, biometrics can also improve employee experience, leading to lower stress levels and fewer burnout numbers. One study from PwC found that organizations with satisfied employees are also 82% more likely to provide a better customer experience. It’s a win-win situation for the customer and employee.

Biometrics in practice

Fraudsters have targeted one specific, vulnerable group of individuals more than others over this last year: seniors. According to a pre-COVID-19 analysis by the U.S. Consumer Financial Protection Bureau, people impacted greatest by fraudulent activity were ages 70 to 79—averaging a loss of $45,300.  

Recognizing that senior citizens were particularly defenseless to fraud efforts, Telefónica, a global telecommunications firm, implemented AI-enabled intelligent age detection capabilities in its biometrics solution to help prioritize seniors who were more likely to call in with requests during strict lockdowns. The human ear typically cannot differentiate between a 50-year-old and a 70-year-old with any reasonable degree of precision. Working with Nuance, Telefonica implemented AI voice algorithms able to detect over 1,000 characteristics of the human voice, far more than a human could. The deep neural network-based AI algorithms were honed-in on a subset of these characteristics that are affected in a predictable way as humans age.

Within weeks, Telefónica’s senior customers were transferred immediately to a live agent, able to get faster, more personalized service, and could rest assured knowing their account information was secure. In a time of increased confusion and fraud attempts, this level of security and customer dedication helped the global telecommunications firm standout from competitors. This new factor is also a key factor in preventing fraud and elder abuse.

Fraudsters are getting smarter, and they’re working harder now that the world is predominantly digital thanks to remote work and stay-at-home orders. To combat those attacks while simultaneously creating frictionless experiences for customers, organizations need to update their security methods to invest in AI-enable biometrics. The result is not only enhanced security, but happier customers and employees.

KEYWORDS: authentication biometric access management biometric authentication cyber security data privacy data security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Simon Marchand, CFE, Chief Fraud Prevention Officer at Nuance Communications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • behavioral biometrics

    How biometrics are shaping the future of authentication

    See More
  • two-factor authentication

    Individuals use two-factor authentication, biometrics to protect information

    See More
  • TSA credentials

    TSA using new credential authentication technology to improve checkpoint screening capabilities

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing