Challenges we solve
Poor Login Experiences
Streamline your login process: enhance security without sacrificing user experience
Regulatory Compliance
Simplify regulatory compliance: discover tools and strategies to ensure your business stays ahead
All Types of Payment Fraud
Stop payment fraud in its tracks: discover how to secure your transactions and increase revenue
Access Breaches
Stop data breaches before they start
Operational Costs
Gain control of operational costs: make informed decisions with data-driven insights
We Specialize in Voice Biometrics. It's Our Sole Focus.
We are a leading provider of invisible, “context enabled” voice biometrics and multi-factor authentication security solutions.
20+
loading='lazy'
Expertise in voice tech
100%
loading='lazy'
Growth in usage
28
loading='lazy'
Countries served
60x
loading='lazy'
Real-time audio processing
20+
loading='lazy'
Expertise in voice tech
100%
loading='lazy'
Growth in usage
28
loading='lazy'
Countries served
48
loading='lazy'
Real-time audio processing
Our Products
Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution
See-Say®
A new and revolutionary digit-based voice authentication approach that guarantees an individual's identity – and therefore security – in enterprise remote access (PAM/IAM).
See More
VoiceID™
Voice Identity assurance for the Contact Center and Omnichannel Delivers Trusted Experiences using secure voice authentication with customers regardless of channel.
See More
Our Difference

Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

Compliance
100% compliance with EU (GDPR), USA (including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world
Omni-Channel Interoperability
All major Contact Centers; all major MFA solutions
Perfomance
Accuracy | Security | Speed
Deployment Capabilities
Public / Private Cloud; On-Premise; On-Device; On-Chip
Privacy by design
By designing and building around the core principles of data anonymity, obfuscation, encryption, and minimization.
Less Data Breaches
Public / Private Cloud; On-Premise; On-Device; On-Chip
Our Difference

Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

Compliance
100% compliance with EU (GDPR), USA (including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world
Omni-Channel Interoperability
All major Contact Centers; all major MFA solutions
Perfomance
Accuracy | Security | Speed
Deployment Capabilities
Public / Private Cloud; On-Premise; On-Device; On-Chip
Privacy by design
By designing and building around the core principles of data anonymity, obfuscation, encryption, and minimization.
Less Data Breaches
Public / Private Cloud; On-Premise; On-Device; On-Chip
The fastest most accurate voice biometrics technology for all devices
Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure
Net speech ~ 3 seconds elapsed

"Please authenticate me with my Voice"
"Please authenticate me with Access Code 123456"

Net speech ~ 6 seconds elapsed

"Hi, I'm calling about my checking account..."
"Hello, can you connect me with my manager?"

Net speech ~ 3 seconds elapsed

"Please authenticate me with my Voice"
"Please authenticate me with Access Code 123456"

Net speech ~ 6 seconds elapsed Net speech ~ 6 seconds elapsed

"Hi, I'm calling about my checking account..."
"Hello, can you connect me with my manager?"

The fastest most accurate voice biometrics technology for all devices
Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure
Net speech ~ 3 seconds elapsed

"Please authenticate me with my Voice"
"Please authenticate me with Access Code 123456"

Net speech ~ 6 seconds elapsed

"Hi, I'm calling about my checking account..."
"Hello, can you connect me with my manager?"

Net speech ~ 3 seconds elapsed

"Please authenticate me with my Voice"
"Please authenticate me with Access Code 123456"

Net speech ~ 6 seconds elapsed Net speech ~ 6 seconds elapsed

"Hi, I'm calling about my checking account..."
"Hello, can you connect me with my manager?"

Our Benefits no slider

Protect conversations and data from unauthorized access. Verify identity reliably, and easily,with a secure, friction-free voice solution

Better Customer Experience
Simplify regulatory compliance: discover tools and strategies to ensure your business stays ahead
Fraud Prevention
100% compliance with EU (GDPR), USA (including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world
Less Data Breaches
Our Benefits standard

Protect conversations and data from unauthorized access. Verify identity reliably, and easily,with a secure, friction-free voice solution

Better Customer Experience
Simplify regulatory compliance: discover tools and strategies to ensure your business stays ahead
Fraud Prevention
100% compliance with EU (GDPR), USA (including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world
Less Data Breaches
Our Benefits

Protect conversations and data from unauthorized access. Verify identity reliably, and easily,with a secure, friction-free voice solution

Better Customer Experience
Fraud Prevention
Less Data Breaches
Compliance Ensured
Our Customers Are Saying
Icon
Having worked with voice biometric suppliers in the past, we were familiar with the technology. We were however delighted with the advanced technology as well as the ever present support from ValidSoft, both on a technical level as well as well as business and process level. ValidSoft’s reactivity and flexibility has been second to none and has given us the feeling that they are a true partner.
Saulo Mauricio Cano Ortiz
Arquitecto Técnico
Icon
Our relationship with ValidSoft initially began as a straightforward supplier arrangement. However, as our needs evolved and diverged from their standard offerings, ValidSoft showcased great flexibility and collaboration. They not only addressed our immediate requirements but also committed to continuous innovation, providing regular updates and enhancements. This proactive approach has elevated our relationship into a true partnership, where both Invoca and ValidSoft are mutually benefiting from the leading edge biometrics solution now in place.
Beatrice Casanova
Vice President Product Management
Icon
ValidSoft stands out as one of the forward leaders in our voice biometrics category thanks to proven accuracy, speed and flexible deployment options spanning multiple channels and modalities.....in addition to their compliance with tough European privacy seal standards. Our rating is reinforced by their market momentum, including significant Fortune 50 wins, many of which were accomplished through a strong partner ecosystem.
Dan Miller
Lead Analyst & Founder
Frequently asked questions
The world's most secure, accurate, precise, and fastest speaker identification engine, trusted by leading businesses across the globe
Does it work? Does it always work?

Voice biometric systems are highly accurate but, like all biometrics, they can’t guarantee 100% success in every scenario. ValidSoft’s voice biometrics engine typically achieves 98-99% accuracy for GSM or landline transmissions, and near 100% with high-definition (wideband) data channels, such as those used on WIFI, 4G, or 5G.

Our system also integrates advanced features like Grey Zone Logic to minimize false positives and false negatives, ensuring reliability across various devices like smartphones and laptops.

What is the difference between Passive and Active enrollment?

Passive Enrollment happens naturally during regular interactions, such as conversations with a call center agent or an IVR system. The user doesn’t need to take any specific action to be enrolled.

Active Enrollment requires the user to repeat specific phrases or digits, typically associated with text-dependent voice biometrics.

ValidSoft supports both passive and active enrollment models, ensuring flexibility based on the application.

Can a recording of a person’s voice fool a voice biometric system?

Using a voice recording device to playback another person’s voice is known as a Replay Attack. In many cases voice biometric engines can identify recording devices, using several techniques including detecting the absence of the highest and lowest frequencies which, though not audible to humans, are detectible to VB engines.

Additionally, the process of replaying creates distortion to audio, and, in many cases, this is detectable by ValidSoft’s replay detection algorithms. Another technique that can be applied is Identical Utterance Checking, where the VB engine checks previous authentications for being too identical to the one being analyzed. The most foolproof method is liveness checking, where a random element must be spoken, such as random digits. Recording another person’s static phrase or random phrase will not be sufficient to pass given the random nature of the challenge.

It should be noted, however, that the chances of obtaining a recording of a person’s authentication phrase for fraudulent purposes are small and not a common technique used in mass attacks, more for targeted attacks. ValidSoft’s production deployment has never been compromised by a replay attack that we have been made aware of.

What is the difference between Text-Dependent, Text-Independent, and Spoken Digit systems?

Text-Dependent voice biometrics requires users to repeat specific phrases or words, often the same ones used during enrollment. This approach is ideal for secure authentication scenarios like mobile banking, where the phrase acts as a consistent identifier.

Text-Independent (also known as conversational) voice biometrics, on the other hand, does not rely on specific phrases. The system can authenticate users based on natural conversation, making it suitable for scenarios like call centers or virtual assistants, where authentication happens passively without interrupting the user experience.

Spoken Digit systems, like ValidSoft’s See-Say®, add an additional layer of security by requiring users to repeat a unique sequence of digits tied to a specific transaction. This ensures not only user identity verification but also the integrity of individual transactions, making it ideal for use cases where a high degree of security is required.

How does Voice Biometrics work?

Voice biometric systems extract unique speaker-specific features from audio samples to create a “voiceprint” or “voice signature.” When a new voice sample is provided, the system compares it to the enrolled voiceprint using pattern-matching techniques to authenticate the speaker.

Voice biometrics leverages a range of features from speech. Low-level features are short segments of sound—like the unique way air flows through a speaker’s vocal tract—captured in as little as 20 milliseconds. High-level features, such as speech habits or language patterns, are derived from longer stretches of speech. While both are useful, research shows low-level features are more efficient for voice biometrics as they closely relate to the speaker’s physical attributes.

Frequently asked questions
The world's most secure, accurate, precise, and fastest speaker identification engine, trusted by leading businesses across the globe
Does it work? Does it always work?

Voice biometric systems are highly accurate but, like all biometrics, they can’t guarantee 100% success in every scenario. ValidSoft’s voice biometrics engine typically achieves 98-99% accuracy for GSM or landline transmissions, and near 100% with high-definition (wideband) data channels, such as those used on WIFI, 4G, or 5G.

Our system also integrates advanced features like Grey Zone Logic to minimize false positives and false negatives, ensuring reliability across various devices like smartphones and laptops.

What is the difference between Passive and Active enrollment?

Passive Enrollment happens naturally during regular interactions, such as conversations with a call center agent or an IVR system. The user doesn’t need to take any specific action to be enrolled.

Active Enrollment requires the user to repeat specific phrases or digits, typically associated with text-dependent voice biometrics.

ValidSoft supports both passive and active enrollment models, ensuring flexibility based on the application.

What is Voice Biometrics?

Voice biometrics (VB) is the technology that enables the recognition of people from their voice characteristics by measuring the distortion their physical make-up (physiology) creates on sound. It is identifying individuals based on their physical makeup by extracting information from their voices.

How does Voice Biometrics work?

Voice biometric systems extract unique speaker-specific features from audio samples to create a “voiceprint” or “voice signature.” When a new voice sample is provided, the system compares it to the enrolled voiceprint using pattern-matching techniques to authenticate the speaker.

Voice biometrics leverages a range of features from speech. Low-level features are short segments of sound—like the unique way air flows through a speaker’s vocal tract—captured in as little as 20 milliseconds. High-level features, such as speech habits or language patterns, are derived from longer stretches of speech. While both are useful, research shows low-level features are more efficient for voice biometrics as they closely relate to the speaker’s physical attributes.

Can a recording of a person’s voice fool a voice biometric system?

Using a voice recording device to playback another person’s voice is known as a Replay Attack. In many cases voice biometric engines can identify recording devices, using several techniques including detecting the absence of the highest and lowest frequencies which, though not audible to humans, are detectible to VB engines.

Additionally, the process of replaying creates distortion to audio, and, in many cases, this is detectable by ValidSoft’s replay detection algorithms. Another technique that can be applied is Identical Utterance Checking, where the VB engine checks previous authentications for being too identical to the one being analyzed. The most foolproof method is liveness checking, where a random element must be spoken, such as random digits. Recording another person’s static phrase or random phrase will not be sufficient to pass given the random nature of the challenge.

It should be noted, however, that the chances of obtaining a recording of a person’s authentication phrase for fraudulent purposes are small and not a common technique used in mass attacks, more for targeted attacks. ValidSoft’s production deployment has never been compromised by a replay attack that we have been made aware of.

Your soft with us
Patents in jurisdictions
Better Customer Experience
Encrypted biometric data can be stored in your site, our secure cloud, or user's device
DEEPFAKE detection
VoiceID
VoiceVerity for all you app
Identity Assurance
See How ValidSoft Can Move Your Business Beyond Passwords

Get access to Validsoft demo portal

Request Demo
Decor Decor
Level Up Your Skills: Become a Part of the Club

Sign up now for our newsletter

    Subscribe
    Decor
    Let's talk about your new project

    Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

      Please fill in the field
      Please fill in the field
      Incorrect email format
      Please fill in the field
      Please fill in the field
      Please fill in the field
      Please fill in the field
      Send message
      Interested in a partnership?

      Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        Please fill in the field
        Please fill in the field
        Incorrect email format
        Please fill in the field
        Please fill in the field
        Send message
        Table section

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        Compare product
        Choose your workspace plan according to your organisational plan
        Number of Users
        Users Per Page
        Includes essential features to get started
        More advanced features for increased productivity
        Designing & Development
        Customizable options to meet your specific needs
        Secure data storage
        Email Support
        24/7 customer support
        Analytics and reporting
        Account Management
        VoiceVerity
        20 Pages
        5 Pages
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        See-Say®
        600 Pages
        50 Pages
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Voice Biometrics for Call Centers
        Unlimited
        Unlimited
        Icon
        Protect conversations and data from unauthorized access. Verify identity reliably
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Icon
        Left Right sectio

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solut

        Voice Biometrics for Call Centers

        Secure Call Centers from remote unauthorized proxy agents with continuous Agent Identity Assurance

        loading='lazy'
        Voice Biometrics for Call Centers

        Secure Call Centers from remote unauthorized proxy agents with continuous Agent Identity Assuran

        Left Right sectio

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solut

        loading='lazy'
        Voice Biometrics for Call Centers

        Secure Call Centers from remote unauthorized proxy agents with continuous Agent Identity Assuran

        Voice Biometrics for Call Centers

        Secure Call Centers from remote unauthorized proxy agents with continuous Agent Identity Assurance

        Our Technology
        • Multi-dimensional: It measures both the behavioral traits of an individual as well
          as the impact their physical body creates on sound.
        • Spoof-Proof Voiceprint: Creates a unique spoof-proof ‘Voiceprint’ of the individual,
          by combining their sound, voice pattern and rhythm.

        ValidSoft is the only security company in the world with 4 European
        Data Protection and Privacy Seals, including a Seal for VIP Voice (EuroPriSe®).

        More in Media Hub
        Our Technology
        • Multi-dimensional: It measures both the behavioral traits of an individual as well
          as the impact their physical body creates on sound.
        • Spoof-Proof Voiceprint: Creates a unique spoof-proof ‘Voiceprint’ of the individual,
          by combining their sound, voice pattern and rhythm.

        ValidSoft is the only security company in the world with 4 European
        Data Protection and Privacy Seals, including a Seal for VIP Voice (EuroPriSe®).

        More in Media Hub
        Horizontal tabs

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        Trusted Agent
        Trusted Employee
        Trusted eXperience
        Our Technology
        • Multi-dimensional: It measures both the behavioral traits of an individual as
          well as the impact their physical body creates on sound.
        • Spoof-Proof Voiceprint: Creates a unique spoof-proof ‘Voiceprint’ of the
          individual, by combining their sound, voice pattern and rhythm.

        ValidSoft is the only security company in the world with 4
        European Data Protection and Privacy Seals, including a Seal for VIP Voice
        (EuroPriSe®).

        loading='lazy'
        Our Technology
        • Multi-dimensional: It measures both the behavioral traits of an individual as
          well as the impact their physical body creates on sound.
        • Spoof-Proof Voiceprint: Creates a unique spoof-proof ‘Voiceprint’ of the
          individual, by combining their sound, voice pattern and rhythm.

        ValidSoft is the only security company in the world with 4
        European Data Protection and Privacy Seals, including a Seal for VIP Voice
        (EuroPriSe®).

        loading='lazy'
        Our Technology
        • Multi-dimensional: It measures both the behavioral traits of an individual as
          well as the impact their physical body creates on sound.
        • Spoof-Proof Voiceprint: Creates a unique spoof-proof ‘Voiceprint’ of the
          individual, by combining their sound, voice pattern and rhythm.

        ValidSoft is the only security company in the world with 4
        European Data Protection and Privacy Seals, including a Seal for VIP Voice
        (EuroPriSe®).

        loading='lazy'
        Vertical tabs

        Protect conversations and data from unauthorized access.

        Detail More
        Compliance
        100% compliance with EU (GDPR), USA (including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world
        Privacy by design
        By designing and building around the core principles of data anonymity, obfuscation, encryption, and minimization.
        Deployment Capabilities
        Public / Private Cloud; On-Premise; On-Device; On-Chip
        loading='lazy'
        loading='lazy'
        loading='lazy'
        Vertical tabs

        Protect conversations and data from unauthorized access.

        Detail More
        Compliance
        100% compliance with EU (GDPR), USA (including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world
        Privacy by design
        By designing and building around the core principles of data anonymity, obfuscation, encryption, and minimization.
        Deployment Capabilities
        Public / Private Cloud; On-Premise; On-Device; On-Chip
        loading='lazy'
        loading='lazy'
        loading='lazy'
        Our Patents

        20+ patents granted. More on the way. ValidSoft owns all of its intellectual property

        Anonymous Correlation System

        Simplify regulatory compliance: discover tools and strategies to ensure your business stays ahead

        VALid

        100% compliance with EU (GDPR), USA (including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world

        Dual-SSID

        By designing and building around the core principles of data anonymity, obfuscation, encryption, and minimization.

        VALid-POS

        All major Contact Centers; all major MFA solutions

        Incremental Contextual Enrollment

        Simplify regulatory compliance: discover tools and strategies to ensure your business stays ahead

        Nemesis-PDT

        100% compliance with EU (GDPR), USA (including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world

        Articles - blog section

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        Our solution

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        loading='lazy'
        Workforce Identity Assurance
        By designing and building around the core principles of data anonymity, obfuscation, encryption, and minimization.
        Detail More
        Extensive Ecosystem

        ValidSoft has spent years developing a rich ecosystem of partners, deployment options, and omni-channel modalities to support the needs of enterprises: from agile to large global organizations with complex requirements.

        The Inherent Challenges of Regulatory bans on Deepfakes

        Deepfakes, sophisticated audio and visual manipulations, have become alarmingly accessible,
        thanks to open-source models and tools readily available in model marketplaces. This
        accessibility has democratized the ability to create convincing fake content, exacerbating the
        challenge of distinguishing authentic from fabricated. The proliferation of deepfakes through
        platforms that offer end-to-end encryption, like Telegram, further complicates traceability,
        allowing harmful content to circulate unchecked.

        This scenario underscores a critical flaw in our current approach to regulation — it fails to
        address every actor in the deepfake pipeline, leaving significant vulnerabilities unaddressed.

        loading='lazy'
        We've got you covered in over 30 countries

        Check the map to see where we are from

        Our gallery

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        Content - fixed right img

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        Compliance

        100% compliance with EU (GDPR), USA including CCPA/CPRA (California); BIPA (Illinois), and many other jurisdictions around the world

        See our solution
        Privacy by design

        By designing and building around the core principles of data anonymity, obfuscation, encryption, and minimization.

        See our solution
        Privacy by design

        By designing and building around the core principles of data anonymity, obfuscation, encryption, and minimization.

        See our solution
        Analyzing AI Voice for Voice Alterations

        We created our own synthetic speech samples and tested them using our AI Voice detection tool. Check out the table below for a glimpse of the samples we created, along with the likelihood of them being identified as AI-generated voices by our tool.

        Deepfake Probability
        Announcer
        00:00
        00:00
        85
        Donald Trump
        00:00
        00:00
        92
        Rod Serling
        00:00
        00:00
        87
        Barack Obama
        00:00
        00:00
        97
        Our history

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        2002
        Shedule a demo

        Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et.

        2005
        Google form

        Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et.

        2009
        Free call

        Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et. Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et.

        2018
        Go to the office

        Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et.

        Our history

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        2002
        Shedule a demo

        Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et.

        2005
        Google form

        Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et.

        2009
        Free call

        Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et. Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et.

        2018
        Go to the office

        Eget faucibus tortor odio dignissim hendrerit velit felis. Amet, donec eu sit id non dictumst. Diam lectus egestas faucibus turpis et.

        Meet our team

        Protect conversations and data from unauthorized access. Verify identity reliably, and easily, with a secure, friction-free voice solution

        Alexander Korff
        Executive Chairman, CEO
        Pat is the founder, Executive Chairman and CEO of ValidSoft. He has over 25 years of experience in Information Technology and Financial Markets, where he has been an industry thought leader, and domain expert in security 25 years of experience in Information Technology and Financial Markets, where he has been an industry thought leader, and domain expert in security
        loading='lazy'
        Dr. Marcel Kockmann
        Chief Technology Officer
        Dr. Marcel Kockmann is the founder, Executive Chairman and CEO of ValidSoft. He has over 25 years of experience in Information Technology and Financial Markets, where he has been an industry thought leader, and domain expert in security
        loading='lazy'
        Matt Weekes
        Chief Information Officer
        Pat is the founder, Executive Chairman and CEO of ValidSoft. He has over 25 years of experience in Information Technology and Financial Markets, where he has been an industry thought leader, and domain expert in security
        loading='lazy'
        Pat Carroll
        Executive Chairman, CEO
        Pat is the founder, Executive Chairman and CEO of ValidSoft. He has over 25 years of experience in Information Technology and Financial Markets, where he has been an industry thought leader, and domain expert in security, strong authentication and voice biometrics. At ValidSoft, he leads our endeavors in commercializing the results of our extensive research and development. Prior to founding ValidSoft, Pat was the European Head of Electronic Trading Technology, co-head of the European Equities Technology and a technical advisor to the Investment Banking Division for Goldman Sachs. Pat has further extensive Financial Services & technical experience, having worked in senior roles with J.P Morgan, Credit Suisse Financial Products and Bankers Trust Company.
        Simon Rich
        Chief Financial Officer
        Pat is the founder, Executive Chairman and CEO of ValidSoft. He has over 25 years of experience in Information Technology and Financial Markets, where he has been an industry thought leader, and domain expert in security
        loading='lazy'