Identity Assurance: Addressing the Achilles Heel of Multi-Factor Authentication - transcript

hello uh good morning and welcome to today’s webinar um we’re excited to talk about um identity insurance assurance

0:13

and addressing the Achilles heel of multi-factor authentication uh we’ll get into that and much more today um I’m

0:19

Derek top i’m the research director with opus research and um and yeah we’re looking forward to a lively discussion

0:24

today uh looking at like how voice biometrics and identity assurance is

0:29

improving approaches to multi-factor authentication especially how it helps business businesses build

0:35

trust with their with their agents with their employees and also build better customer experiences so I’m excited to

0:40

have validsoft here joey O’Donnell is with us and we’ll do some intros here in a second but before we begin just a

0:45

few housekeeping notes this is a live interactive webinar so we do encourage all of you listening in to uh to engage

0:52

with us to ask questions make comments uh you know do uh you know plan this is meant to be conversational so we do have

0:58

a um have a planned q a at the end as well but we’re also happy to answer questions uh throughout the entire um

1:05

throughout the discussion so um what you’ll do is uh there’s a ask a question button i think it’s below the viewer

1:10

screen here uh type in your questions tap your comments and we’ll um and we’ll engage you as part of the webinar so um

1:18

with that I’m gonna actually go on video here hello um we’re gonna introduce and introduce ourselves um and

1:24

uh and then we’ll get into the agenda and today’s discussion so um real quick just i’m Derek top i’m

1:30

the research director and senior analyst with opus research and uh as many of you know opus is a third party analyst firm

1:35

we cover um you know what we like to call um you know abroad talks around conversational technologies including uh

1:42

intelligent systems conversational intelligence and for the purposes of this uh discussion uh intelligent

1:47

authentication um and we produce reports webinars like this and uh lots of other things um we’re also an advisory service

1:53

so um please reach out to other questions and with that I’ll pass it over to dan miller well thanks but when

1:59

the video comes out i’m always surprised it’s good to see everybody um so i’m Daniel i’m the lead analyst and

2:06

actually founder of opus research and as such we’ve been around since 1985 86 but

2:14

right around 2003 we started covering voice biometrics um voice biometrics as

2:20

essentially a mechanism for authenticating people over the phone and over that time um

2:27

we i think we’ve met just about every solution provider out there and um

2:34

valasoft has always stood out um just with sort of a forward looking approach

2:40

one that’s oriented towards privacy i know this isn’t an ad and we have some we have some substantive stuff uh to

2:46

talk about but i think my point is and I’ll introduce I’ll throw it over to joe to

2:52

talk a little bit about it but the um this this idea of um

2:57

identity assurance um is something that i think we all uncovered um you know going

3:05

back 12 years and you know have seen sort of evolve and that’s sort of the topic here you know

3:10

what its relevance is now how things have changed and with that I’ll turn over to joe to give some bona fides and

3:16

then we’re going to get into some pretty sensitive discussions i need to made up a word

3:23

substantive thank you thanks for having us appreciate it uh joe doll here chief growth officer for ValidSoft

3:29

growth to us just means big levers in the channel OEMs alliances and things like that can help the

3:34

business grow as well as it gives us a great voice of the community and the narrative it keeps us really close to that to

3:40

build on everything dan just said um been doing this for about 30 years started out in voice over IP actually

3:46

pulling cable and installing phone systems and now as a cyber security

3:51

executive um you know our mission is literally to

3:56

invert identity right up to now biometrics have been cute um they

4:02

haven’t been fast they haven’t been accurate they’ve been funky to use and they’ve been kind of third fourth class citizen to proxy factors right

4:08

possession and things like that so our mission is to flip that on its on its head um pandemic digitalization has

4:16

accelerated that need because now there’s a uh interest in identity guarantee versus

4:21

assurance that is the human being that they say they are not what their device says they are but there is that human

4:28

being that she or he says there and there’s many different business outcomes that we’ll talk about here with dan um

4:33

and Derek today so thanks for having us really appreciate it no problem

4:38

so once these slides appear you’ll see so here’s our agenda i I’ve already introduced opus research um

4:45

uh joe introduced valid soft but what we’re here to talk about today

4:50

is just the things we’ve seen involved over the past let’s say five years or so when opus started out you know

4:57

covering voice biometrics like I said it was a mechanism for authenticating people over the phone usually landlines

5:04

um in contact centers but these days what we’re really talking about is um

5:11

what opus calls intelligent authentication and it’s the fact that things like deep neural the same things

5:16

that make intelligent assistance smart the deep neural networking the pattern detection all that sort of stuff

5:23

can be implemented um across multiple channels in multiple

5:29

situations um and that it’s filling a role of not just authentication we’ll

5:34

get to the next step but authentication and fraud detection um I’ll turn it over a little bit we

5:41

used identity assurance in the title here it’s a term of art that evolved as having strong confidence

5:48

that an individual is whom he or she claimed to be but I think um as and as we’re going

5:56

to learn um it’s crossed a it’s crossed a river or whatever um into

6:02

you know especially with um solution providers like valid soft where you’re not just assuring

6:09

individual you know ensuring a company that the individual is whom he or she claims to be but vice versa but you can

6:16

almost guarantee it and we’ll talk about that and then what it leads to in terms of um

6:25

applications with an impact on customer experience with an impact on all

6:30

employees but primarily contact center agent experience and the latest dimension because one of the things we

6:36

see and I brought us up on the side here is that you know business process outsourcers are taking an increasingly

6:44

important role in making all of the technologies that need to match together

6:49

work and something like the solutions we’re talking about today

6:54

um become very important um for them as well any comment joe

7:01

yeah I’ll nail the one on the on the BPO piece what i’m seeing globally is a propensity not just to

7:07

take a step up authentication method such as us but using something that is

7:13

omnichannel passwordless and really easy to use like voice is imperceptible these ppos are doing it anyway they’re on the

7:19

phone talking and so what we’re seeing is a night a lot of opportunities where not only like a cell 2 opportunity but

7:27

more along lines of a competitive advantage opportunity that they’re taking it around you know instead of being just this super agent right where

7:34

there’s several definitions of super agent right some software ucas vendors

7:39

say superagent is an agent assist piece of software that’s true and then others in the bpo they have accreditation

7:46

programs where it’s a series of educational steps that makes that agent super right and so how can they be super

7:52

if they’re not trusted right if they’re not verified continuously that that agent is who she or he says they are and

8:00

they’re turning that around and making it a competitive advantage against other bpos so we’re seeing that dynamic in the marketplace then and we should clarify a

8:07

little here because guilty is charged three-letter abbreviation bpo business process outsourcer for some people you

8:15

know that that’s like almost any uh third party that um

8:20

that you know comes in and helps automate things for you or brings um

8:25

additional bodies to augment uh companies employees

8:30

in the e-commerce and contact center world they were you know there were particular ones that automated call

8:36

handling that brought more bodies to handle things during overflow periods but they but in in the world of

8:42

omni-channel commerce um it’s just there’s just a wide world of opportunity

8:48

and um just wanted to make sure for everybody attending that we weren’t

8:54

not defining a uh tla good great good save dan thanks exactly

9:01

okay so but when we talk about um identity assurance um I thought we’d

9:08

drill a little down in you know what it is but also why it’s taken on increased

9:14

importance now and i’m not into reading slides so i’m gonna just sort of zip through this really fast there’s

9:20

been a heavy impact um especially during the lockdown

9:26

on the gig of the gig economy there’s not just bpos that are people

9:32

that are doing work for companies um it could be all of their employees so there’s a lot of work from home anywhere

9:39

anytime um uh another issue and joe you brought this up on our planning call yesterday

9:45

it’s like um really when you think about it everybody’s a contact center agent i mean

9:51

all rational companies these days should think of all of their employees as doing

9:57

customer as bringing the greatest benefit when they’re doing customer facing and then the third thing I think we need

10:03

to talk about is we’re entering an era of quote zero trust and um

10:09

actually I’ll lean on you a little bit for all three here um

10:14

sure um you know work from home anywhere the one thing that we often hit get hit

10:19

up for is that there’s employees by the thousands or hundreds of thousands have never met their supervisor

10:25

right i mean and they might have gone through the hr process they might have been onboarded

10:31

in you know some authentication program what have you and they’ve never really

10:36

you know shaken anybody’s hand we’re seeing a very interesting complement to the mfa market in in

10:44

enrollment right which is typically the weakest component of uh authentication is when people are

10:49

getting onboarded because you have to get it right the first time and so we’re seeing that added you know we want this

10:55

quote unquote identity guarantee throughout the whole process um that it is joe um so

11:02

and again the pandemic unfortunately spawned a lot of that but we’re seeing a lot of post pandemic depending on whatever your

11:08

thought process is on the pandemic over not we’re seeing that it’s not going away right there’s a lot of value that

11:14

people got out of it so that’s kind of in concert with everybody’s become a contact center

11:19

agent doctors nurses teachers politicians sales people right we’re

11:25

you know inside sales has most likely been you know call center like for a long time but really a lot of different professions

11:32

have become you know a victim of uh or yeah a victim of the microphone on

11:38

the ear and some sort of call center suite um as for zero trust i mean

11:45

you see a lot of vendors and rightfully so talk about you know cybers about humans and things like that well

11:52

how can you have zero trust least privilege defense and depth if you’re not i if you’re not sure that

11:58

that’s actually human at the end of those proxy factors and or devices what have you so we’re just like adding

12:04

that layer to that and again trying to raise you know voice biometrics based

12:09

on many different items that you know it’s mathematically superior it’s multimodal or omni-channel

12:16

you know um and it’s multi-dimensional both behavior and physical by just talking we’re trying to elevate you know the

12:23

presence of that factor uh in identity us you know assurance as well as

12:28

identity guarantee and we’re finding really good success at that yeah and just to clarify a little bit

12:34

more about zero trust um one of the sets of use cases we’re seeing is um where

12:40

in um in in the contact center once again a lot of the sales of solutions had been

12:48

to high volume high um uh value sort of interactions and

12:55

transactions as um voice file metrics among other intelligent authentication mechanisms

13:02

expand um they’re gonna move down market there’s going to be applications that are not high volume

13:08

and this sort of addresses you know if you engineer things with zero trust

13:14

you know that you know here’s somebody i haven’t encountered uh we’re hearing more and more questions

13:20

about hey what solutions attacked that that particular issue and i think you know

13:26

we’re finding that you know solutions like yours are orchestrated to

13:33

do the right thing with these people um but it does get to this this um

13:41

idea that biometrics aren’t are not just sort of a nice to have add-on layer

13:47

but as you do this they are indeed a must and we’re seeing specifically

13:52

in the you know work from homework anywhere um applications where

13:58

you know part of the onboarding process is to enroll face or voice and face and other

14:05

behavioral i found our first typo traits at trains um

14:11

and then there’s um in once enrolled uh we’ve seen chicheneri

14:18

of the work from home people where somebody might log in at the beginning of the shift um and then leave for their

14:24

next job so you want to sort of know who’s there so that that’s part of a um

14:31

of a solution that is continuous and sort of addresses that um human nature

14:37

of you know trying to do all you can to um you know have as many jobs as

14:43

possible generating revenue and not always being honest about it yeah dan you know what’s really interesting on

14:48

that to that point you know we’re getting we’re we’ve gotten out of self proclamation around you know our

14:54

implementation of voice biometric is x y and z uh we’re seeing a really good partnership uptake from the top mfa

14:59

players right now where we’re a primary or secondary idp identity provider

15:05

for them name the top five and we’re partnering with them so um there’s no real

15:10

the headwinds are kind of letting up right because we’ve developed something that is faster more accurate multimodal

15:17

omnichannel what have you and it and it complements their passwordless push because you’re now your voice or your

15:22

voice print is now your password and it’s only good for you right it’s data points they’re

15:28

encrypted in a one-way hash to a database that means nothing to anybody you can’t put them deduct back together

15:34

again it has no use unless i’m comparing one-to-one and so that speed and

15:39

accuracy really complements the existing mfa player so we’re getting zero friction from that community actually

15:46

the uptake’s been pretty cool yeah all right sorry i mean but just i mean

15:51

like let’s amplify it in some of the research we’ve done too we saw we had some we did a survey earlier in the year about intelligent authentication and

15:57

fraud prevention and really yeah there is a strong update around biometrics i mean certainly possession and knowledge

16:02

you know those types of typical identity and authentication factors are being used by the

16:09

vast majority of enterprises out there but there is a growing interest in biometrics voice having its specific

16:14

uh traits that are that are helpful we also have seen growth and behavioral and network authentication as well so yeah i

16:19

just wanted to emphasize that point yeah and then with the whole point being that this is it’s a business value right and so

16:26

like what why you know is that i think as we move to the next slide um i don’t know dan as far as when you think

16:33

mfa another tla we’re talking multi-factor authentication

16:39

i know that you know a lot of people use it every day and often they’ll get solicitations from

16:46

their banks or their mobile providers to add a second factor so you often see

16:52

2fa which i would argue is kind of weird the you know the text

16:57

messaging to text messaging a number to you that you can put in because you know it is a

17:04

little weird um so there are um among providers of multi-factor

17:10

authentication the recognition that a biometric solves a lot of

17:15

problems that are created by you know sort of going that simple route which has been around which said hey i need to

17:21

get rid of passwords nobody remembers them to then texting them uh

17:27

shortcodes which hey works around but it does get to before we go to the next slide

17:33

the um you know that we have crossed a um a chasm of sorts you know from

17:40

this identity assurance to you know you’re willing to make the bold step of you know guaranteed identity and i think

17:46

I’d like you know joe to put a little color on that as well sure because there’s a couple things

17:51

right so you’ve got you’ve got factors of authentication that are useful you know you’ve got a lot of things from

17:57

proxy and location all kinds of different possession factors that are very useful um on top of that providing

18:04

you know a layer of human identity a proof of life live means whatever you want to call it um really allows us to

18:10

take the next step to say yes it’s the underlying factor can be spoofed

18:16

stolen and sold right uh adding on the fact that we’re identifying an exact

18:21

human being right what we’ll do is we’ll grab you know and we’re getting the distortion out of the human body which

18:26

is different by every human might sound like you and i might sound alike my you know my brother i might sound alike but

18:32

to a mathematical equation we’re totally different because it’s above and beyond the hearing range of the human being so

18:38

we’re capturing that picture so to speak and we’re taking that back in secure means and really you can’t use it for anything

18:45

else than a one-to-one comparison even if you knew where that was there was nothing you can really do with it so

18:50

combined with the underlying factors combined with a biometric such as voice which again is mathematically

18:57

superior multimodal yada it’s it really allows us to go for that bold claim

19:03

and um it’s trying to spoof that or trying to you know fake

19:11

that it used to be one of the reasons why people didn’t buy it but now the chance of that i won’t do the math for

19:17

you here today but we could take it offline but the mathematical probabilities of getting it wrong versus

19:23

getting it right really favor the defenders and what we’re really trying to do is

19:28

advance the security maturity models of customers or security postures whatever add to their defense in depth add to

19:35

their zero trust add to their least things and we’re finding a really good uptake with that um just alone with

19:41

voice biometrics but on top of a solid uh multi-factor authentication

19:46

deployment um you can get now the confidence and start talking guarantees versus assurance

19:53

and that segues nicely into the slide that i accidentally brought up in the middle of your talk but you know it

19:58

it does tie directly to certain business outcomes um and i can let you

20:04

march through these because i was just taking notes when we were when we were um you know

20:09

rehearsing yesterday there’s a couple that we talked a little about proof of employment we kind of beat that one up um it pretty common

20:17

sense right that it could add to your process of some sort of identity program that you have underway uh the

20:24

big one for me especially in the contact center and in the great resignation period you know being an agent is tough

20:30

right you’re it’s an oxymoron right you’re supposed to delight people right but yet you end up playing cyber cop

20:36

and you interrogate them for three to six minutes on things like that right um and so

20:43

it’s not a fair fight of making call center agents the first line of cyber defense many of these breaches of

20:49

late as well as in the past um start with imposter and they start with social engineering they start with deep fakes

20:55

and then they move into the traditional you know attack cycle or kill chain whatever you want to use um

21:00

if we could be if we can help those agents out right because it’s not really a fair fight against nation shapes

21:06

nation states machines hackers groups and things like that they’re supposed to balance delighting a customer from

21:11

customer sat and protecting you know the threat surface which i think the

21:17

numbers between 60 and 70 of breaches in the enterprise begin with social engineering and impostering in a

21:24

contact center right so again not a fair fight and why would i want to keep that job

21:29

right it’s just such an oxymoron so if we could add to the vendors

21:34

you know agent assist super agent programs why not right because we’ll give them a fighting

21:40

chance where we’re going to do the dirty work to make sure that inbound caller is who she or he says they are we’ll

21:46

also do the compliance checks box that that agent is continuing with the continuously authenticated so the

21:52

corporation that hired that business process outsourcer agent can check that box but literally allow them to do their

21:59

job and be happy about doing their job versus you know losing an agent after

22:04

age because if you’ve got someone on a say a genesis call center right that knows health care really well as an

22:09

outsourcer that’s a competitive advantage for that process outsourcer you don’t want to lose her or him right

22:16

and so we’re trying to add to that whole agent assist um flare by adding a cyber assist to the

22:23

agents based on the fact that it’s very fragile their employment’s very fragile they can go anywhere in a phone call

22:29

and uh we can also enforce the fact that they can be super agents because they’re trusted agents right i don’t think you

22:34

can be super if you’re not trusted so um that that sorry get a little bit bent

22:40

around the retention axle but we run into that a lot and we think we have a lot of value uh for that that individual

22:48

that is that is making money for the outsourcer and or the company right and from the business point of

22:54

view or the bottom line point of view the cost of agent churn is huge

22:59

and the idea and you know what you what you were just saying is that you know asking them to do

23:04

mundane awful things like authenticate has been documented to be unpleasant

23:09

and at least part of the cause of you know job dissatisfaction so there’s retention of the agent

23:16

um uh related directly to improving you know these seamless authentication

23:21

methods the other thing that we talked a little bit about um you know so that that’s the

23:27

mating of dot two retention with dot three creation of super agents but the other aspect of

23:34

retention is um customer experience and you know the flip side being um

23:41

you know the marketing costs of uh that are associated if you’ve lost a customer and you have to regain

23:48

um or get new customers um it’s the same sort of things and

23:53

um there’s probably equally valid sets of data that would show that an unpleasant

24:01

um authentication experience a false rejection those sorts of things have a direct

24:06

negative impact on customer experience which here again impacts the bottom line as well

24:12

and then we had already talked a bit about the competitive advantage for the business process of sources so

24:18

we can probably eschew that so moving on to the next one um

24:25

i feel like the visions of the future get more and more vivid when

24:31

we find these we opus find these solutions that are bringing together mfa that are that are applying voice

24:37

biometrics uh in a way that actually that takes a leap in terms of the

24:43

frequently asked questions about you know accuracy and efficacy and that sort of thing but um yesterday you

24:50

brought up a couple of things that i think deserve a deeper dive by you um this is transparency and also the

24:58

word that that you brought up on the last slide which is um hey trust so you know maybe chat a little bit

25:05

about you know how we you know opens called it you know sort of seamless and friction free i

25:12

like the idea of transparent but I’d like to hear how you describe that

25:17

yeah so you know as we as we we’re already experiencing right now with you know ibas you know the interactive voice

25:23

assistants and bots and things like that that that a lot of people are speaking into microphones and at the other end it’s

25:29

coming out with something diff their eyes are you know obscured they’re an avatar you

25:34

know there’s something that they’re not their faces aren’t the same and we’re fine as there’s continuity in the in the human voice

25:40

right because it’s in a microphone whether it’s in-app whether it’s browser whether it’s in a phone what have you um

25:47

the ingress point for the voices is a point of capture where you can literally create a print and then at some day or

25:53

some future day you can you can compare against that print it’s very difficult almost impossible with the way things

25:59

are going to 3.0 and everything like that that people aren’t necessarily who they say

26:04

they are or they don’t appear on who they are but you can get the biometric from the

26:10

spoken voice and we’re seeing a lot of conversations in what we call metavoice

26:15

um which is which is our trademark around as we move into 3.0 and decentralized

26:21

autonomous organizations and different chat groups and things like that that there’s a distillation and a common

26:28

ground where voice uh is very useful in the identification

26:33

process unlike other biometrics and unlike other compute factors which can be

26:39

and are by its very nature altered and so a lot of emphasis on that in the

26:44

company and in the marketplace on how do we create some sort of identity assurance and it’s not just us it’s the

26:50

whole market is perplexed by this because uh if you look at it it’s pretty scary right the movies are coming true

26:57

so yeah it’s been true for a while right but how do we do it in a in a way

27:03

where we can rely on a biometric and or some other factors and how can people use

27:09

it in in imperceptible fashion right without having to do go to a key go to a

27:15

and one time password you know put these knowledge base factors in go back to a key to get like eight

27:22

different steps of authentication people just won’t use it and unused security is the worst security so

27:28

our goal is to make it imperceptible so people can actually use it and still get that omni channel stepped stepped-up

27:33

feeling right yeah i think i mean that we didn’t we didn’t mention it here but

27:40

this that ties directly into what we talked about when we talk about the conversational cloud in terms of having the these self-service these kind of

27:45

different channels the omni-channel approach that come in doesn’t matter how the customer gets the enterprise or gets to the brand you know through voice

27:51

or through assistant um having that that level of authentication that creates a personalized secure experience that can

27:57

can then that that conversational cloud you know infrastructure includes tapping into you know crms and really kind of

28:04

like you know back-end knowledge and kind of creating you know having that seamless experience

28:09

of i am here calling about my cable order or my package or whatever and that’s all

28:14

authenticated within that experience just it reinforces the same business impact

28:19

we’ve talked about from both at the age standpoint and also from just a customer standpoint knowing that i’m getting when i get done is truly a big

28:26

part of authentication conversational cloud and i went a different direction with the meta

28:32

you know thinking web 3 thinking of virtual worlds and the idea that you know we’ve been totally preoccupied with

28:38

security when you think of sort of an environment where individuals are

28:45

encountering each other without meeting that that’s you know what a call to a contact center had been but in a virtual

28:51

world um you sort of want to have confidence that the individuals you’re interacting with

28:57

are the are the people so it that they claim to be so it’s establishing trust in in a world where

29:04

we’re distanced but you know virtually together and that’s what gets kind

29:10

of interesting especially as you move to sort of the trust comment here that okay you know

29:16

here’s a technology that’s helping me be me and do the things i want to do um there’s going to be increased

29:23

exposure to the fact that some of these people are fake by design they’re you know they’re the robots um yeah and that

29:30

you know what’s needed is this technology with persistence so yeah dan to dog pile on that is that

29:37

you know it allows the service providers of these services to create service level agreements right like say

29:44

there’s a there might be a social uh or some decentralized site or group

29:50

that they want to cater to children right but right now they can’t

29:56

because there’s adults pretending to be children and vice versa right so they can create different service level

30:02

agreements to say based on some truthful biometric that okay they can securely

30:07

create this thing uh different lines of business possibly right um

30:12

you know you look at twitter wanting to get rid of bots right all those things you can learn things with

30:19

the technology and then the whole voice commerce component we can probably have a whole separate session on that but

30:24

yeah um you know people working with ibas and intelligent voice assistants

30:29

putting things in their shopping cart and all these things and it’s not me somebody else so there’s all kinds of

30:35

different things that uh are both exciting and scary uh as we move to the next horizon of this stuff

30:42

and we asked for it there are q a actually i want to cut to the chase here it said can you help me

30:47

understand what is meant by meta voice um this this is a great opening here

30:55

I’ll jump on that so basically you know with the forethought of looking out and saying um there are different types of

31:02

communications in in the metaverse if you will right there are avatars there are texting there is

31:08

typing but one thing that is in there it whether it be virtual virtually real or not is there is a voice

31:16

component of things so we categorize that as metavoice and we’ll build

31:22

applications and use cases around the whether you call it 3.0 whether you call

31:27

it decentralized stuff voice commerce uh you guys are doing

31:33

cloud i mean yeah you guys are well ahead that’s what we’ve kind of taken to shine you all is because you know you’re

31:39

well ahead of all the other analysts around you know deeming this thing as conversational cloud which is happening

31:44

right now you know i consider that part of metavoice as well so looking at all these different communication methods

31:51

that are changing so rapidly based on digitalization how do we create security mechanisms that improves postures maybe

31:58

create new lines of business and accelerate commerce that’s what we mean by my meta voice it’ll have a big impact

32:04

as a um attribute of the metaverse love it is the voice

32:12

it’s the role of voice in the metaverse and the metaverse is um

32:17

sort of self-defining or differs depending on who you talk to and what what’s neat is his voice will turn

32:24

out to be universal um just as it is in in in in real life

32:29

irl and um yeah it’s important to have this concept of

32:35

not just that hey it’s what you say in the meaning of what you say it it’s a big identifier as well so see there

32:41

Derek dan can even drop three letter acronyms he can exactly yeah he’s dropped one right there i can see him

32:47

texting that to his daughter or something like that yeah to my dog

32:52

how do you know yeah so and speaking of well we have a

32:58

couple comments i don’t know dan if you wanted to talk about those i thought you were going to um yeah oh i wanted to go right to that to that uh well in the

33:04

interest of time i cut to the to the big question um but so we do have the

33:11

evergreen question we get asked um you know whether it’s metavoice or whether it’s your voice print or

33:16

whatever um is it pii and is there pii did it again

33:23

personally identifiable information um that you know that has become the crux

33:28

of sort of or the bane of many companies that are investigating whether they want to

33:34

include voice biometrics in their you know their authentication or customer experience strategy yeah um

33:41

what are your thoughts there it’s near and dear to our hearts we’ve looked at the landscape right

33:47

building it out with privacy in mind and people talk a good game around that but they tend to hook the audio keep

33:53

the audio store the audio and guess what they’re in court right so right and again no one you know whether

33:59

i don’t think anybody’s maliciously doing anything but the fact that you need to innovate and build a technology

34:04

based on your specialty around taking what you need from a minimal perspective again we’re not a voice

34:11

recording system right we’re not a dictation system we’re not a system of record we’re a security tool and we need

34:17

x y and z and we get out right so hook the audio take what you need discard the audio

34:24

don’t transport it don’t store it don’t encrypt it we get what we need we get out and that’s why we

34:30

we advocate a lot of privacy programs and we can get teams that have projects

34:36

underway through that rigor based on the techniques that we use

34:41

we’re authenticating and verifying right we’re yes we can route smartly yes we can make

34:46

some we can deflect to you know other technologies no doubt about it but we’re not maintaining the

34:52

audio as a system of record which allows us to claim you know privacy if you will

34:58

we’ve got a lot of things for European privacy seals to back that up and if you if you implement the solution

35:04

set based on those our methodologies the customer or partner get to escrow those seals in their implementation so there’s

35:11

a lot of ways to do it um i think a lot of people are a victim of where they begin right being a security tool so we can move

35:18

quickly others started out as a voice tool and then they have to kind of

35:23

create a way to get pii or privacy uh into their dna by either building

35:30

something or acquiring something yeah makes sense

35:37

good well i think i think we’re on up on time here so we had a couple comments that came in really appreciate those and we can know kind of keep

35:43

conversation going after in um and you know our various social channels so um but yeah i do want to wrap up here and

35:50

um yeah i want to thank joe and dan and definitely all of you that were

35:55

listening in uh for today if you have any questions that qr code did come up if you’re able chance to zap that you’ll get more information

36:02

about validsoft um and of course feel free to reach out to any of us here at opus to learn more um so with that

36:08

thanks everyone yeah

36:14

thank you thank you