TeleSign Verify & PhoneID Standard

Powered by SC Magazine
 

The concept of using a mobile phone as an authentication device is not new.

 

However, adding functionality that goes beyond simply calling a cell number is a new twist on what may seem like a simplistic approach. Multifactor authentication is the right way to authenticate something sensitive, such as a bank transaction, but multifactor can get pretty expensive - what with the cost of tokens, provisioning and other associated functions. If one could get the cost, ease of use and provisioning into a practical range - both financially and from the user perspective -  one could offer multifactor authentication to all users. That is exactly what Telesign does.

TeleSign services include a good range of authentication and forensic functions at a reasonable price. First, the simplest approach is the automated authentication call that goes out to the user's cell phone as a voice call or SMS text. But there is a lot more to Telesign than that. We looked at a suite of four products with Verify and PhoneID Standard being the flagships.

The whole idea behind this suite is knowing as much about the phone calling as possible. Verify can be used to secure e-business transactions, prevent bulk registrations and validate sales leads. Basically, Verify answers the question, "Is the entity performing a function on my e-commerce site a real person or a bot?" This is the classic phone authentication scheme. Verify captures as much traceable information as is available for future investigation if that becomes necessary.

The TeleSign products offer a complete multifactor authentication kit complete with the ability to monitor potential fraud activity and investigate attempts. This is a powerful weapon in the online fraud fight and worth your consideration.

 

 

Copyright © SC Magazine, US edition


TeleSign Verify & PhoneID Standard
 
Overall Rating
Product Info
Supplier:
 
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 433

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 209

Vote