TeleSign Verify & PhoneID Standard

Powered by SC Magazine
 

The concept of using a mobile phone as an authentication device is not new.

 

However, adding functionality that goes beyond simply calling a cell number is a new twist on what may seem like a simplistic approach. Multifactor authentication is the right way to authenticate something sensitive, such as a bank transaction, but multifactor can get pretty expensive - what with the cost of tokens, provisioning and other associated functions. If one could get the cost, ease of use and provisioning into a practical range - both financially and from the user perspective -  one could offer multifactor authentication to all users. That is exactly what Telesign does.

TeleSign services include a good range of authentication and forensic functions at a reasonable price. First, the simplest approach is the automated authentication call that goes out to the user's cell phone as a voice call or SMS text. But there is a lot more to Telesign than that. We looked at a suite of four products with Verify and PhoneID Standard being the flagships.

The whole idea behind this suite is knowing as much about the phone calling as possible. Verify can be used to secure e-business transactions, prevent bulk registrations and validate sales leads. Basically, Verify answers the question, "Is the entity performing a function on my e-commerce site a real person or a bot?" This is the classic phone authentication scheme. Verify captures as much traceable information as is available for future investigation if that becomes necessary.

The TeleSign products offer a complete multifactor authentication kit complete with the ability to monitor potential fraud activity and investigate attempts. This is a powerful weapon in the online fraud fight and worth your consideration.

 

 

Copyright © SC Magazine, US edition


TeleSign Verify & PhoneID Standard
 
Overall Rating
Product Info
Supplier:
 
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1015

Vote