Passive Detection. What is KIVOX Passive Detection? Product Datasheet. Key Benefits. 3 APIs in one product

Size: px
Start display at page:

Download "Passive Detection. What is KIVOX Passive Detection? Product Datasheet. Key Benefits. 3 APIs in one product"

Transcription

1 Passive Detection Product Datasheet KIVOX Passive Detection is part of the KIVOX 4.0 family of products. KIVOX 4.0 brings our partners the full potential of real voice biometrics technology by providing applications with capabilities that are far superior to those currently available in the market and that will also be useful and appealing to end users. What is KIVOX Passive Detection? KIVOX Passive Detection is an API engine that provides 1:1 and 1:M Speaker Identification capabilities both in real time and offline. This API enables your fraud or ID&V applications to implement passive authentication of your call center customers while they are speaking with an agent. It also enables comparisons against a blacklist of up to 1000 known fraudsters while a conversation is taking place, or as a batch process after the conversation has been completed. KIVOX Passive Detection offers the advantage of being fully text independent. Therefore, the authentication process and blacklist comparison can be conducted in a fully transparent manner, without disturbing the customer or interrupting the flow of conversation. 3 APIs in one product KIVOX Passive Detection is composed of 3 sets of APIs, each one optimized for a specific purpose: 1. Model Management API: Provides Enrolment capabilities (or model generation) enabling your application to generate biometric voiceprints (BVPs) for each one of your customers (or fraudsters), using previously recorded data. Once you provide our engine with an audio file, you will instantly receive the BVP for those recordings. Key Benefits Saves agents time during authentication process Improves user experience by avoiding security questions Works with free speech in any language No need for Enrolment process. Voiceprints can be created from historical data or a live call Detect fraud in real time, before it is too late Works with any channel and cross channel Used for Real Time Passive Customer Authentication, Real time Blacklist check, Offline Blacklist check, teleconference participant s verification

2 This module can handle both mono and stereo conversations as it can split the customer s voice from the agent s voice with extreme precision. It also allows for the enhancement of models as more conversations from the same customer become available. 2. Streaming API: Offers the capability of comparing a stream of audio in real time (from an ongoing live conversation) with one or more VBPs, enabling both transparent authentication and a blacklist comparison. This API provides responses every few seconds (this is configurable) which show the results of the comparison. 3. Voice Analytics API: Provides offline capabilities to match N number of recorded calls against M number of VBPs, providing NxM results. You can use the results of this speaker identification comparison to implement your fraudster s blacklist check in an offline mode. This API also provides gender identification information for every incoming audio file. [ ] Fraud detection is not only about securing authentication. The main tool to fight against sophisticated fraudsters is to analyse as many interactions as possible and generate an alert when suspicious activities are detected. KIVOX Passive Detection brings all of the advantages of passive surveillance to fraud detection. High Performance Engine KIVOX Passive Detection is designed to achieve an extremely high performance with average-cpu servers: For real-time operations (authentication or blacklist) a single CPU-core can handle up to 15 simultaneous authentications, enabling it to cover up to 100 agents. For offline operations, a single CPU-core can process up to 1000 hours of audio in 24h (this amounts to 42 times real time). Once these audio files have been processed, KIVOX Passive detection can produce up to 85k matches (identifications) per second. Kivox Passive Detection is fully scalable and therefore designed to grow as needed.

3 Agnitio s unique voice biometrics technology KIVOX utilizes the same unique voice biometrics technology that our customers in law enforcement, military and intelligence are using around the world today. The vast experience acquired by meeting the standards of this demanding market has driven us to achieve the best of breed voice biometric engine for speaker authentication. The technology used has been developed by using Joint Factor Analysis (JFA); which is a paradigm that models channel and speaker variability. Just as your fingerprints are unique to you, your vocal tract contains distinctive characteristics that make it unique and different to that of other people. Furthermore, since this technology is intrinsically language independent, you can deploy KIVOX in any language without the need for adaptation, changes or configuration. KIVOX can also be used on any communication channel, such as a landline telephone, mobile, VoIP, microphone, satellite, etc., at a very high level of accuracy. KIVOX is also very robust against cross-channel authentication. It can create a BVP in a specific channel (a landline for instance) and then complete authentications from other, different channels (mobile or VoIP for instance). KIVOX Passive Detection offers a successful verification rate of more than 99%, with a false acceptance rate of less than 1%. These values are just a general example, since KIVOX can be customized to meet your security needs. For instance, if the main priority of your application is to lower the amount of false acceptances, KIVOX can be configured to guarantee a false acceptance rate lower than 0.1%, with an associated detection rate higher than 90%. When conducting blacklist comparisons in real time, KIVOX Passive Detection can be configured to detect more than 85% of fraudulent calls simply by increasing the amount of false alarms to 1.9%. As a reminder, these thresholds are fully configurable, so if you are willing to accept a higher number of false alarms in the system, the number of fraudsters that can be detected will also rise. These figures have been computed using a fraudster blacklist of 100 targets, however, depending on the number of targets in the blacklist, these results may vary.

4 KIVOX Passive Detection features & functionalities Since KIVOX Passive Detection does not require a customer enrolment process, there is no disruption to the normal contact centre workflow. No additional agent time = no extra cost. Customers voiceprints are simply created by using a live call or historical data. Feature Feature API interfaces Platforms High Availability Data Encryption Simultaneous Real Time Authentications/Blacklist matching Offline audio processing Offline matching Authentication response time Blacklist match response time Scalable Database restrictions CTI/recorder restrictions Language restrictions Channels supported Cross-channel supported Gender Identification Multi-user account BVP enhancement BVP size Blacklist size Authentication / Blacklist match type Enrolment type Enrolment length FAR, FRR Security Threshold Audio files accepted *Example of accuracy obtained with customer s data Description Description Java Windows 64 bits, Linux 64 bits 15 per CPU-core 1000h of audio in 24h per CPU-core (42 times RT) Up to 85k matches per second/cpu-core 7s 7s Yes None None Fully language Independent Landline, mobile, VoIP, satellite, microphone & more! Yes Available for offline operations 1.8 KiB Up to 1000 simultaneous targets Fully transparent with free conversational speech No enrolment process needed. Enrolment is done with existing recordings or a live conversation 30s (1%, 1%) = 1% EER (Equal Error Rate)* Configurable Linear PCM (>8KHz, 16, mono), A-law, mu-law

5 Modular and scalable architecture (1/2) KIVOX Passive Detection presents a modular architecture which can be easily integrated into any fraud detection or ID&V application. There are two very distinct integration options depending on whether a RT or offline solution is required. The following schema presents the typical integration of KIVOX Passive Detection for an offline blacklist solution. Modules in blue are offered by Agnitio, while modules in orange and red represent part of your development or existing components:

6 Modular and scalable architecture (2/2) This second schema presents the typical integration of KIVOX Passive Detection for real time passive speaker authentication or a real time blacklist matching solution. Modules in blue are offered by Agnitio, while modules in orange and red represent part of your development or existing components KIVOX is run by Agnitio. Agnitio is the world leader in voice biometrics in the homeland security sector and has successfully adapted its robust technology for suitable corporate authentication solutions. Today, AGNITIO s technology is used in over 30 countries by military organizations, law enforcement agencies and forensic experts. For more details contact us on: corp.com info@agnitio- corp.com

How accurate is AGNITIO KIVOX Voice ID?

How accurate is AGNITIO KIVOX Voice ID? How accurate is AGNITIO KIVOX Voice ID? Overview Using natural speech, KIVOX can work with error rates below 1%. When optimized for short utterances, where the same phrase is used for enrolment and authentication,

More information

Guide to Speaker Verification & Voice Biometrics

Guide to Speaker Verification & Voice Biometrics Guide to Speaker Verification & Voice Biometrics ICR Speech Solutions & Services The Engine House Ashley Lane, Saltaire West Yorkshire BD17 7DB Tel: 01274 821111 e-mail: info@icr3s.co.uk www.icr3s.co.uk

More information

Complex Identification Decision Based on Several Independent Speaker Recognition Methods. Ilya Oparin Speech Technology Center

Complex Identification Decision Based on Several Independent Speaker Recognition Methods. Ilya Oparin Speech Technology Center Complex Identification Decision Based on Several Independent Speaker Recognition Methods Ilya Oparin Speech Technology Center Corporate Overview Global provider of voice biometric solutions Company name:

More information

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by The US Contact Center Decision-Makers Guide 2013 Contact Center Performance sponsored by INTRODUCTION AND METHODOLOGY The "US Contact Center Decision-Makers' Guide (2013-6 th edition)" is the major annual

More information

VOICE BIOMETRICS. estilo de subtítulo del patrón Solutions

VOICE BIOMETRICS. estilo de subtítulo del patrón Solutions VOICE BIOMETRICS Haga clic Vicorp para modificar Speech el Biometric estilo de subtítulo del patrón Solutions VICORP SPEECH TECHNOLOGY UK based since 1989 with international partners - Specialising in

More information

Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching

Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching Against the backdrop of budget constraints, threats from terrorism, organised

More information

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI Adaptive Authentication in IBM Tivoli Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client

Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client Version 4.00 2017 Title Short name of product Version 4.00 Manual operations of GritTec s Speaker-ID: The Mobile

More information

Voice and Speech Recognition

Voice and Speech Recognition Voice and Speech Recognition Consumer, Call Center, Healthcare, Enterprise, Finance, Retail, Government, Law Enforcement, and Defense Applications: Market Analysis and Forecasts Speech and voice recognition,

More information

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief Adaptive Authentication Adapter for Juniper SSL VPNs Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

Cardholder Fraud Alerts Frequently Asked Questions

Cardholder Fraud Alerts Frequently Asked Questions Cardholder Fraud Alerts Frequently Asked Questions Get answers to your questions and learn the ins and outs of cardholder fraud alerts. 1. What are cardholder fraud alerts Cardholder fraud alerts are one

More information

Voice, Face and Behavioural Biometrics

Voice, Face and Behavioural Biometrics Voice, Face and Behavioural Biometrics Authentication & Fraud Prevention in the age of Virtual Assistants Brett Beranek, Director Product Strategy, Biometrics, Security & Fraud 2016 Nuance Communications,

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

MeetingKaro Audio Conference Solution

MeetingKaro Audio Conference Solution MeetingKaro Audio Conference Solution Feature-rich audio conferencing solution Agenda Features Special Features Meeting karo Interface Set up Screen Shots - Reports Benefits Company Profile 2 Do you often

More information

Axis IP-Surveillance. Endless possibilities for video surveillance.

Axis IP-Surveillance. Endless possibilities for video surveillance. Axis IP-Surveillance. Endless possibilities for video surveillance. Meeting today s video surveillance challenges The video surveillance market is booming, driven by increased public and private security

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Digital Voice Services Residential User Guide

Digital Voice Services Residential User Guide Digital Voice Services Residential User Guide 2 P a g e * Feature Access Codes *11 Broadworks Anywhere (pulling call to alternate phone) *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call

More information

Your First Defense in Building Security. EcoStruxure Security Expert. se.com/ecostruxure-security-expert

Your First Defense in Building Security. EcoStruxure Security Expert. se.com/ecostruxure-security-expert Your First Defense in Building Security EcoStruxure Security Expert Global trends drive demand for better building security A rapidly changing world is making it more challenging and more important than

More information

Biometric identity verification for large-scale high-security apps. Face Verification SDK

Biometric identity verification for large-scale high-security apps. Face Verification SDK Biometric identity verification for large-scale high-security apps Face Verification SDK Face Verification SDK Biometric identity verification for large-scale high-security applications Document updated

More information

T3main. Powering comprehensive unified communications solutions.

T3main. Powering comprehensive unified communications solutions. T3main Powering comprehensive unified communications solutions. MANAGE COMMUNICATIONS THE SMART WAY T3 Telecom Software designs innovative voice messaging, unified messaging and call routing environments

More information

A revolutionary visual security and analytics solution

A revolutionary visual security and analytics solution A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing

More information

CISCO SHIELDED OPTICAL NETWORKING

CISCO SHIELDED OPTICAL NETWORKING CISCO SHIELDED OPTICAL NETWORKING Dr. Gaurav Kumar Jain Regional College For Education, Research and Technology Email: gaurav.rinkujain.jain@gmail.com Tarun Kumawat JECRC,UDML,College of Engineering Purabi

More information

Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation

Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract The Indian Unique ID (UID) is an extremely-large-scale system that attempts to

More information

Intelligent Access Terminal

Intelligent Access Terminal Intelligent Access Terminal A world of possibilities at your fingertips emerald is a multi functional touch screen access terminal with fully integrated biometric* that is revolutionizing the security

More information

TRBONET PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS

TRBONET PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS TRBONET PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS OVERVIEW PREMIUM CONTROL ROOM SOLUTION FEATURE-RICH, ROBUST AND

More information

The Future of Campus Video Surveillance

The Future of Campus Video Surveillance The Future of Campus Video Surveillance Thursday, Dec. 6, 2018 08:30 a.m. 09:30 a.m. Mark Bonde Parallel Technologies Mark Bonde Publisher IPVS Magazine Publication Focused on the transition from Analog

More information

Cisco Crosswork Network Automation

Cisco Crosswork Network Automation Cisco Crosswork Network Introduction Communication Service Providers (CSPs) are at an inflexion point. Digitization and virtualization continue to disrupt the way services are configured and delivered.

More information

VocalPassword : voice biometrics authentication.

VocalPassword : voice biometrics authentication. VocalPassword : authentication. Friendly voice authentication across web, IVR, call center, or mobile. 1 VocalPassword for easy and secure authentication. VocalPassword, the world s most widely deployed

More information

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories

More information

UltraMatch. Standalone Iris Recognition System

UltraMatch. Standalone Iris Recognition System UltraMatch Standalone Iris Recognition System Smart LED Utilizes the most accurate biometric recognition technology Color LED shows the proper verification distance Mobile management enabled by wireless

More information

Passive surveillance in support of LI. André Scholtz

Passive surveillance in support of LI. André Scholtz Passive surveillance in support of LI André Scholtz a.scholtz@vastech.co.za VASTech! Created 1999! Development and system contractor house in Passive Surveillance! Core focus: Zebra Passive Surveillance

More information

SMARTPTT PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS

SMARTPTT PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS SMARTPTT PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS OVERVIEW PREMIUM CONTROL ROOM SOLUTION FEATURE-RICH, ROBUST

More information

6 facts about GenKey s ABIS

6 facts about GenKey s ABIS 6 facts about GenKey s ABIS Lightning fast deduplication 6 facts about ABIS 2 3 What is ABIS? 3 Core Functions For any biometric identity to be reliable, it s essential there s only one unique ID for every

More information

State of Call Center Authentication

State of Call Center Authentication SURVEY 2018 State of Call Center Authentication The decline of knowledge-based authentication accelerates as contact centers seek new ways to improve operational efficiency, customer experience, and fraud-fighting

More information

Communicate anywhere, anytime, on any device

Communicate anywhere, anytime, on any device Hosted Voice Hosted Voice is a VoIP, cloud based phone system that routes your calls through your Internet connection, but you can also do much more than just make calls. Phone calls, instant messaging,

More information

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems Watermark-Based Authentication and Key Exchange in Teleconferencing Systems Ulrich Rührmair a, Stefan Katzenbeisser b, Martin Steinebach c, and Sascha Zmudzinski c a Technische Universität München, Department

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK

HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK Handbook HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK Part 3: Network Traffic Monitoring or Packet Analysis? by Pavel Minarik, Chief Technology Officer at Flowmon Networks www.flowmon.com In previous two

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Microsoft Lync FAQ. Getting Started with Lync Features on the Lync Client Screen Contacts Instant Messaging Audio...

Microsoft Lync FAQ. Getting Started with Lync Features on the Lync Client Screen Contacts Instant Messaging Audio... Microsoft Lync 2010 - FAQ Getting Started with Lync... 3 What is Microsoft Lync?... 3 Lync Client Requirements?... 3 How do I get a headset for my computer?... 3 How do I log into Lync?... 3 Do I have

More information

Audio over IP devices System description Ed 2.0

Audio over IP devices System description Ed 2.0 Equitel Network Audio Audio over IP devices System description Ed 2.0 This document contains the description and some application notes for the ENA devices. Equipos De Telecomunicación Optoelectrónicos,

More information

The secure remote support, remote access and online meeting software that the world relies on.

The secure remote support, remote access and online meeting software that the world relies on. The secure remote support, remote access and online meeting software that the world relies on. TeamViewer, the market leader activated by users on 1.3 billion devices worldwide. The Right Solution for

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

VIDEO CALLING SYSTEM USING BIOMETRIC REMOTE AUTHENTICATION

VIDEO CALLING SYSTEM USING BIOMETRIC REMOTE AUTHENTICATION International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 5, Sep-Oct 2016, pp. 47 57, Article ID: IJECET_07_05_006 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=5

More information

An Introduction to a Unique Safeguard Technology for Headset Users

An Introduction to a Unique Safeguard Technology for Headset Users An Introduction to a Unique Safeguard Technology for Headset Users MWN March 2004 Sennheiser Communications A/S 6 Langager, 2680 Solrød Strand, Denmark Phone: +45 56180000, Fax: +45 56180099 www.sennheisercommunications.com

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

Skype for Business Mobile Client Comparison Guide

Skype for Business Mobile Client Comparison Guide Mobile Client Introduction can be used on a personal mobile device through the mobile application (app). The mobile app allows users to view presence information, send and receive instant messages and

More information

How to choose a Voice Biometrics Engine

How to choose a Voice Biometrics Engine Emilio Mar*nez emar%nez@agni%o- corp.com How to choose a Voice Biometrics Engine Voice Biometrics Engines Authen*ca*on solu*on vs. Voice Biometrics Engine 2 Selec2ng a VB Engine Voice Biometrics End Users

More information

DigitalPersona Altus. Solution Guide

DigitalPersona Altus. Solution Guide DigitalPersona Altus Solution Guide Contents DigitalPersona... 1 DigitalPersona Altus Solution... 4 MODULAR SOLUTION CREATE-CONFIRM-CONTROL... 4 EXPERT SERVICES ASSESS-DESIGN-DEPLOY-SUPPORT... 5 DigitalPersona

More information

Comparative Biometric Testing. Round 7 Public Report V1.0. September Copyright International Biometric Group

Comparative Biometric Testing. Round 7 Public Report V1.0. September Copyright International Biometric Group Comparative Biometric Testing Round 7 Public Report V1.0 Copyright 2009 All brands, company names, and product names are trademarks or registered trademarks of their respective holder(s). Copyright 2009

More information

Inmarsat FleetBroadband For U.S. Government Maritime Operations. U.S. Government > Services > FleetBroadband

Inmarsat FleetBroadband For U.S. Government Maritime Operations. U.S. Government > Services > FleetBroadband Inmarsat FleetBroadband For U.S. Government Maritime Operations U.S. Government > Services > FleetBroadband Secure, reliable, worldwide operations Designed for mobility, Inmarsat FleetBroadband enables

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

Authors Martin Eckert Ingmar Kliche Deutsche Telekom Laboratories.

Authors Martin Eckert Ingmar Kliche Deutsche Telekom Laboratories. Workshop on speaker biometrics and VoiceXML 3.0 March 5-6, 2009, Menlo Park, CA, US Proposal of an SIV architecture and requirements Authors Martin Eckert (martin.eckert@telekom.de), Ingmar Kliche (ingmar.kliche@telekom.de),

More information

Watson Developer Cloud Security Overview

Watson Developer Cloud Security Overview Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for

More information

Nuno Pestana, WeDo Technologies

Nuno Pestana, WeDo Technologies Nuno Pestana, WeDo Technologies SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud FRAUD THE IMPACT

More information

AXIS Camera Station. Efficient surveillance and more.

AXIS Camera Station. Efficient surveillance and more. AXIS Camera Station Efficient surveillance and more. 2 AXIS Camera Station Easy and efficient surveillance Stay safe and secure A solution using AXIS Camera Station is easy to use and maintain, which allows

More information

Polycom SoundStructure

Polycom SoundStructure Polycom SoundStructure Frequently Asked Questions What are the SoundStructure products? The SoundStructure products are Polycom s next generation installed voice products. They are rack mounted audio products

More information

Talkative Engage Mitel Architecture Guide. Version 1.0

Talkative Engage Mitel Architecture Guide. Version 1.0 Talkative Engage Mitel Architecture Guide Version 1.0 This document contains confidential information that is proprietary to Talkative. No part of its contents may be used, disclosed or conveyed to any

More information

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

NEXT KEYLESS GENERATION. NOW. The finest in keyless security

NEXT KEYLESS GENERATION. NOW. The finest in keyless security 01 NEXT KEYLESS GENERATION. NOW. AX.Advanced Xchange New application 2018 The finest in keyless security 02 THE NEXT KEYLESS GENERATION. NOW. Our digital locking solutions have been replacing mechanical

More information

Integrating Metascan and CyberArk

Integrating Metascan and CyberArk Integrating Metascan and CyberArk Tony Berning Senior Product Manager aberning@opswat.com Yoav Melamed Bulwarx Co-Founder and CTO yoav@bulwarx.com 3 April2014 Agenda Metascan Overview CyberArk Overview

More information

Introduction. ISNR Abu Dhabi 2020 Program. Participation & Partnership Opportunities

Introduction. ISNR Abu Dhabi 2020 Program. Participation & Partnership Opportunities Event brochure Introduction ISNR Abu Dhabi 2020 Program Participation & Partnership Opportunities ISNR ABU DHABI 2018 was under the Patronage of H.H Sheikh Hazza bin Zayed Al Nahyan, Deputy Chairman of

More information

User Guide: Sprint Direct Connect Plus Application Kyocera DuraXTP. User Guide. Sprint Direct Connect Plus Kyocera DuraXTP. Release 8.

User Guide: Sprint Direct Connect Plus Application Kyocera DuraXTP. User Guide. Sprint Direct Connect Plus Kyocera DuraXTP. Release 8. User Guide Sprint Direct Connect Plus Kyocera DuraXTP Release 8.1 December 2017 Table of Contents 1. Introduction and Key Features... 5 2. Application Installation & Getting Started... 6 Prerequisites...

More information

White paper. Axis and Intelligent Video (IV)

White paper. Axis and Intelligent Video (IV) White paper Axis and Intelligent Video (IV) Table of contents 1. What is intelligent video? 3 2. Why is it an important development? 3 3. System design strategies for intelligent video 4 4. Axis and intelligent

More information

Background Search & People Search Data

Background Search & People Search Data Ultimate Background Search & People Search Data The Finest Due Diligence & Investigative Data Solutions Available! - Find People - Verify Identities - Prevent Fraud FOR A NO RISK TRIAL Call Trent Martin

More information

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques

More information

1. Rich video conference control. Video Conferencing. System Solutions. Video Conferencing System

1. Rich video conference control. Video Conferencing. System Solutions. Video Conferencing System Video Conferencing System Solutions SparkleConference-Video Supports single node video conferencing for 100 people Supports multi-node overlay Support standard SIP rfc-4579 conference control protocol

More information

Dragon TV Overview. TIF Workshop 24. Sept Reimund Schmald mob:

Dragon TV Overview. TIF Workshop 24. Sept Reimund Schmald mob: Dragon TV Overview TIF Workshop 24. Sept. 2013 Reimund Schmald reimund.schmald@nuance.com mob: +49 171 5591906 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Reinventing the relationship

More information

The World s Premier Measurement Company

The World s Premier Measurement Company AGILENT TECHNOLOGIES The World s Premier Measurement Company Agilent s Mission in Aerospace Defense: Freeing you to focus on your mission. AFCEA Roma 7.10.2010 Vincenzo Marano AD Account Mngr Page 1 Aerospace

More information

Getting Started with Lync 2010 for iphone

Getting Started with Lync 2010 for iphone Getting Started with Lync 2010 for iphone Getting started with Lync 2010 on the iphone» Requirements» Installing Lync» Removing Lync» Signing in to Lync» Signing out of Lync Requirements iphone 3GS, iphone

More information

The most powerful professional headset on the market is also the most secure * Jabra Engage

The most powerful professional headset on the market is also the most secure * Jabra Engage Whitepaper Jabra Engage The most powerful professional headset on the market is also the most secure * Taking in wireless calls to the next level: 56-bit ES encryption. 8-bit authentication. * Relates

More information

The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility

The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility Table of content On-site Wireless telephony on your IP Network 3 Key Applications 6 10 reasons for Business Mobility

More information

XProtect Go 2016 R2. Specification Sheet

XProtect Go 2016 R2. Specification Sheet XProtect Go 2016 R2 Specification Sheet Contents Feature Overview... 3 XProtect Go server modules... 3 XProtect Go client modules... 3 Detailed Product Features... 4 XProtect Go server modules... 4 XProtect

More information

Net-Log Network Audio Logger

Net-Log Network Audio Logger Net-Log Network Audio Logger August 2008 www.sonifex.co.uk t: +44 (0)1933 650 700 f: +44 (0)1933 650 726 sales@sonifex.co.uk Net-log - Network Audio Logger The Net-Log is a new way to record and play audio.

More information

The Spoofing/Authentication Threat

The Spoofing/Authentication Threat The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally

More information

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time

More information

Introducing IBM Lotus Sametime 7.5 software.

Introducing IBM Lotus Sametime 7.5 software. Real-time collaboration solutions March 2006 Introducing IBM Lotus Sametime 7.5 software. Adam Gartenberg Offering Manager, Real-time and Team Collaboration Page 2 Contents 2 Introduction 3 Enhanced instant

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

WebEx Audio. Features

WebEx Audio. Features WebEx Integrated Audio provides a high-performance, feature-rich, telephony-based audio conference service. This service can be used in a stand-alone mode or fully integrated within a WebEx meeting. s,

More information

CALL FEATURES USER GUIDE. Houston Dallas Austin San Antonio Oklahoma City

CALL FEATURES USER GUIDE. Houston Dallas Austin San Antonio Oklahoma City CALL FEATURES USER GUIDE Houston Dallas Austin San Antonio Oklahoma City Table of Contents Account / Authorization Codes.... 3 Advanced Hunting.... 4 Anonymous Call Rejection... 4 Anywhere.... 5 Auto Attendant...

More information

Battle Command Radio Net User Guide Historical Software Corporation - Copyright 2011, HSC. All rights reserved.

Battle Command Radio Net User Guide Historical Software Corporation -  Copyright 2011, HSC. All rights reserved. Battle Command Radio Net User Guide Historical Software Corporation - www.historicalsoftware.com Copyright 2011, HSC. All rights reserved. 1.0 Introduction The Battle Command Radio Net (BCRN) programs

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

PHONE CHANNEL SECURITY & IDENTITY ASSESSMENT IN THE PUBLIC SECTOR WHITE PAPER

PHONE CHANNEL SECURITY & IDENTITY ASSESSMENT IN THE PUBLIC SECTOR WHITE PAPER PHONE CHANNEL SECURITY & IDENTITY ASSESSMENT IN THE PUBLIC SECTOR WHITE PAPER TABLE OF CONTENTS Introduction... 3 Phone Channel Vulnerabilities The Phone Channel: What Is At Risk? 3 4 Phone Channel Attacks...

More information

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used

More information

A New Authentication Paradigm:

A New Authentication Paradigm: A New Authentication Paradigm: Call Center Security without Compromising Customer Experience Financial institutions can reap significant financial gains by using voiceprints to authenticate through the

More information

Messaging Service Management and Analysis

Messaging Service Management and Analysis Messaging Service Management and Analysis Hypersoft OmniAnalyser delivers to enterprise customers detailed and comprehensive information on the quality of service, workload, usage and performance of their

More information

PROFILE: ACCESS DATA

PROFILE: ACCESS DATA COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies

More information

IT TRENDS REPORT 2016:

IT TRENDS REPORT 2016: IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION NORTH AMERICA WHAT WE COVER IN THE REPORT IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION Introduction Key Findings Recommendations Full Survey Results INTRODUCTION

More information

Atmosphere Fax Network Architecture Whitepaper

Atmosphere Fax Network Architecture Whitepaper Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11

More information

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 Agenda E-Signature Overview Legality, Authentication & Best Practices Role of authentication in e-signing Options and applications

More information

Streamlining Lawful Intercept for WiMAX Networks

Streamlining Lawful Intercept for WiMAX Networks White Paper Streamlining Lawful Intercept for WiMAX Networks f f Meet stringent lawful intercept requirements for monitoring WiMAX IP-based voice, data and multimedia traffic f f Comply with lawful intercept

More information

Defence, Intelligence and Secure Communications Solutions

Defence, Intelligence and Secure Communications Solutions Defence, Intelligence and Secure Communications Solutions Ensuring mission critical application performance Allot XXXXXXXXX Date Copyright 2013 Allot Communications Ltd. All rights reserved. Allot Communications,

More information

Axis Megapixel Network Cameras. See what you ve been missing

Axis Megapixel Network Cameras. See what you ve been missing Axis Megapixel Network Cameras See what you ve been missing Megapixel network cameras Megapixel network cameras have an important role to play in video surveillance applications. They are obviously more

More information

PALLADION Feature Set

PALLADION Feature Set PALLADION Feature Set FEATURE SET Introduction: PALLADION makes the job of running SIP based network infrastructure much more straightforward, resulting in much more reliable and predictable SIP based

More information

KantanMT.com. Security & Infra-Structure Overview

KantanMT.com. Security & Infra-Structure Overview KantanMT.com Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions...

More information

COMMAND CENTRAL. Command Central ADMINISTRATOR QUICK START GUIDE

COMMAND CENTRAL. Command Central ADMINISTRATOR QUICK START GUIDE COMMAND CENTRAL Command Central ADMINISTRATOR QUICK START GUIDE CONTENTS QUICK START GUIDE Your Start Up configuration... 3 Command Central Requirements... 5 How to log into your account... 6 The Command

More information

User Guide. Business Hosted Voice

User Guide. Business Hosted Voice User Guide Business Hosted Voice 1 This User Guide explains how you can benefit from this service. If you have questions about your service, call our customer service team 24 hours a day 7 days a week

More information