View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
May 11, 2009

Convergys introduces voice authentication system

The web services interface claims to deliver voice authentication in conjunction with web and mobile device applications

By CBR Staff Writer

Convergys, a provider of relationship management systems, has introduced a platform-independent on-demand voice authentication system.

Convergys clients and non-Convergys clients can implement this system by enrolling the voice signatures of their customers and employees. Upon enrollment, companies can authenticate agent-assisted and consumer transactions securely than with a traditional ID + PIN authentication, said Convergys.

Included in this system is voice biometric security from the Voice Signature Service provided through Convergys’s partnership with TradeHarbor, a provider of voice authentication web services.

Convergys has a voice authentication deployment framework that includes an operations and administrator interface to provide a total enterprise system for managing deployments, adjusting security thresholds and generating reports. In addition, any company can access Convergys on-demand voice authentication via an API or web services from an existing IVR/Voice Portal platform. The web services interface delivers voice authentication in conjunction with web and mobile device applications.

Paul Watson, general manager of on-demand solutions at Convergys, said: In these economic times, our clients have been asking us for increased authentication security for their customer self-service – for both speech and touchtone applications as well as agent-assisted transactions, but without the traditional capital expenditure hurdle. Our partnership with TradeHarbor has enabled us take customer service security and convenience to a new level keeping cost efficiencies in mind.

Content from our partners
How to engage in SAP monitoring effectively in an era of volatility
How to turn the evidence hackers leave behind against them
Why food manufacturers must pursue greater visibility and agility

Topics in this article :
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU