SlideShare a Scribd company logo
New Opportunities with
Two Factor
Authentication
A How-To Webinar
2
Today’s Presenters:
Alan D Percy
CMO at TelcoBridges
alan.percy@telcobridges.com
Kevin Nethercott
CCO at Telestax
kevin.nethercott@telestax.com
Jamie Hash
COO at Network Intelligence
jhash@netg2.com
3
Agenda
• Introductions
• Why 2FA?
• 2FA use cases
• How does 2FA work?
• The commercial opportunity for 2FA as a service
• Customer case study
• Using voice calling with 2FA
• Demonstration
• Your Questions
What’s the problem?
Phishing Attacks on
the Rise
According to APWG’s
Phishing Activity Trends
Report for Q3 2019,
phishing attacks rose in
prevalence to a level that
hasn’t been observed
since 2016. In Q4 of
2016, 277,693 attacks
were recorded by APWG.
In Q3 of 2019, the
number was close to that
at 266,387
4
Majority of attacks
involve credentials
Cofense’s Phishing
Threat and Malware
Review 2019 found that
almost 74 percent of
phishing attacks between
October 2018 and March
2019 involved credential
phishing—stealing
usernames and
passwords.
Spear phishing email
are most popular
Symanetc’s Internet
Security Threat Report
2019 shows spear
phishing emails are used
by almost two-thirds (65
percent) of all known
groups carrying out
targeted cyber attacks.
What is 2FA?
PCMag's lead security analyst Neil J.
Rubenking puts it,
“there are three generally recognized
factors for authentication: something you
know (such as a password), something
you have (such as a hardware token or
cell phone), and something you are (such
as your fingerprint). Two-factor means the
system is using two of these options."
5
6
Why 2FA?
1) Can’t trust just user account and passwords any more
• Dark web market for account information
2) Inbound telephone numbers cannot be trusted
• Contact centers often depend on caller’s number
• Calling number can easily be spoofed
3) Smartphones are fairly ubiquitous and personal
• Depends on industry/market/geography
• SMS is not universal
7
Opportunities for 2FA
1)TSPs can use 2FA to
protect their own
applications/network
1)TSPs can offer valuable 2FA
services to their business
customers to help protect their
applications/network
Switch Your 2FA Today
Kevin Nethercott
Chief Commercial Officer
Telestax
April 14, 2020
9
About Telestax- Built with Community,
Scalability, & Agility
Opensource
▪ Development driven
▪ 10K+ telecom developers
▪ 6M+ lines of code
▪ 5000+ global deployments
On-Premise
▪ Customers in 65 countries
▪ 200 customers
▪ 200M+ calls per day
▪ 900M+ messages per day
Cloud-Enabled
▪ 2018 CPaaS Enabling Leader*
▪ Faster time-to-market for CSPs
▪ Quick onboarding for customers
▪ Programmable omnichannel APIs
*Source: Frost & Sullivan Telestax 2018 North American CPaaS Enabling Technology Leadership Award Report.
PHASE 3PHASE 2PHASE 1
BUILT TO SCALEPROVEN, TRUSTEDSTRONG FOUNDATION
10
SMBs
Large
Enterprises
Call
Centers
Financials
Healthcar
e
Marketing
Blast Companies
Ride Sharing
Apps
Communication
Service Providers
OEMs
System
Integrators
Network
Service Providers
Application
Providers
SMS
Aggregators
Telestax Partners with the
Communications Industry to Power
Enterprise Verticals with CPaaS
ENTERPRISE
VERTICALS
Travel &
Hospitalit
y
11
Higher quality standard
comes with network ownership
End-to-end accountability with full
diagnostic control
Lower pricing for full set
of service features
Competitive advantage in
international markets (no FCC)
Long term sales relationships
established
PLUS Higher delivery rate,
traffic blocking filters, higher QoS
No quality guarantee
as they do not own the network
Limited error detection
due to dependence on SP
Pricing is 30% higher
for same features
Low penetration worldwide
due to international constraints
Limited customer service with
self service model
OTT Providers CSPs with Telestax
vs
With CPaaS Enablement, CSPs Win at
CPaaS
12
Add Almost $1M Revenue This Year by
Switching
Just One Account to CPaaS
3M
TRAFFIC
MESSAGES PER
MONTH
Traffic switched
from
an OTT provider to
Service Provider
1MMESSAGES PER
MONTH
Traffic switched
from
an OTT provider to
Service Provider
4M Minutes of
traffic
each month
$0.01
REVENUE
PER MESSAGE
$30K new monthly revenue
$360K new yearly revenue
$0.05PER MESSAGE
$50K new monthly revenue
$600K new yearly revenue
$80K new monthly
revenue
$960K new yearly
revenueBy switching a key account to your organization, your company brings in $960K more revenue per year
USE CASE
SMS Alerts for:
- Accounts overdrawn
- Deposits completed
- Statements ready to view
2FA for:
- Account authentication
- Protect against phishing
attacks
13
Smart 2FA
14
Polling Question
As a communications provider, what is the PRIMARY reason you are
looking to add 2FA capabilities to your product offerings?
A)Add security features or options for your customers?
B)Improve turnkey application choices for your customers?
C)Provide better network quality than other vendors?
D)Provide better pricing than other vendors?
E) We already have a 2FA application, just looking for a better
alternative
15
A Turnkey Solution for Identity
Verification
The most widely implemented solution
for strong authentication is to use a
one-time password (OTP). With that in
mind, Smart 2FA will enable you to:
• Send an OTP via SMS, voice, or
email in order to provide two-factor
authentication (2FA) for user
account access.
• Add an additional layer of identity
protection beyond passwords.
• Support a robust enterprise security
strategy.
What is Smart 2FA?
16
Strengthen the
overall business
security strategy
with 2FA.
Fast Facts*
Smart 2FA Improves Account
Security
*Source: Google Security Blog
17
o Instantly offer 2FA as a turn-key solution to
business customers
o BYOC - terminate 2FA traffic on your carrier
network
o White label Telestax Smart 2FA for enterprise
account management, reporting, and
troubleshooting
o Cut 2FA verification costs for your existing
customers
o Decrease SMS and voice termination costs by at
As a Provider, How Does Smart 2FA
Benefit You?
18
Built By and For Developers
o Smart 2FA lets you send OTP using SMS, Voice or Email powered by the robust
and scalable Restcomm platform that developers love
o Send verification code that includes:
o Account SID
o Auth Token
Send OTP
Verify OTP
19
With Smart 2FA, your customers
will
benefit from:
• End-to-end quality control
• Better 2FA delivery rates
• 2FA cost savings
• Localized support
• Simple API
• Intuitive console
How Will Smart 2FA Benefit Your
Customers?
20
2FA Use Case Examples
Financial Healthcare Travel Retail
banking portal access
mobile banking
capability
financial record access
wire transfers
account withdrawal
approvals
secure patient record
access
online appointment
scheduling
virtual consult
identification
payments, balances,
statement access
account history access
online booking
verification
booking confirmation
access
modify reservations
verify frequent flier or
traveler ID details
customer portal setup for
ecommerce capability
order goods securely
save payment
information to speed
ordering
access order history for
faster reorders
21
Easily promote and educate your customers on 2FA possibilities
Telestax Leads in Sales Enablement
Videos
Documentation
Brochures 2FA
Guidebook
Learn more at: www.telestax.com/2FA
A Consultancy and Managed Services Organization
Advice in Action
Network Intelligence has evolved from providing clients with
information and advice to providing fully customized and outsourced
operating solutions for their telecommunications business models.
We not only know how to build networks, we design, build, operate, and
manage them for our clients.
o Founded in 1985
o History of Consulting to RBOCs, CLECs, IOCs, Vendors and End User
o First Certified Managed Service Provider for RestcommOne
• CPaaS (Communications Platform as a Service)
o Tenured Industry Professionals
• Technical Expertise
• Design in TDM, IP and CPaaS
• Operations Know How
• Business Systems Experience
© 2020 Network Intelligence. Proprietary and Confidential.
An Autonomous Software Platform capable of Enabling
Communication based Business Processes across
multiple cloud Services and Endpoints
• Integration of Applications and Communications
• API Inbound/Outbound
• Media Inbound/Outbound
• Voice/Video
• Messaging Inbound/Outbound
• SMS/WebChat/Email
• Optimization
• Elimination of redundant and manual processes
Scripting of new processes
• Automation
• Real-Time Orchestration and delivery of
Integrated and Optimized Processes
CPaaS is a Real-Time Business Process
Management and Control Tool
Sentient
Cloud
Services
Integration
Optimization Automation
© 2020 Network Intelligence. Proprietary and Confidential.
• IVR-Xchange
• SMS and Voice Contact Center
• Voice Activated SMS
• Smart Voicemail
• IoT Solution
• AI Chatbot
• Telemedicine
• Video Websharing
• Cognitive Voice and messaging
• Real Estate Call Capture
• Smart Appoint Scheduling
• 2FA
• Live chat, scriptable voice API
• Hosted PBX
• Communications based team management
• USSD Self Care
• Mobile payments & Financing
• TextSelect
• Text2Email
• Web-Trigger Auto Dialing
Current Applications
© 2020 Network Intelligence. Proprietary and Confidential.
Voice
Call Center Agent
Voice
SMS
Landline
Mobile
Sentient
Control
Point
SMS
Carrier
Services
SMS
Voice
Circuit Type
GPS Locator
Account Info
Verification
Time & Temp
Banking
Reservations
IVR-Xchange
API
Database
Voice/SMS/Video
Voice
Call Center
Auto Dialer
Messaging
Business IVR
Auto Repair
Doctor’s Office
Restaurant
Dispatch
Real Estate
Retail
Physical Layer Switching + Applications Layer Control = Applications Border Controller
Sentient Cloud Services
An Autonomous Software Platform capable of
Enabling Communication based Business
Processes across multiple cloud Services and
Endpoints
Sentient Cloud Services
© 2020 Network Intelligence. Proprietary and Confidential.
IVR-Xchange with Mobile/Landline Detection
Two Factor Authentication Call Flow
Inbound call to a Toll Free or Direct Number
Text Message is Automatically Sent to Originating Caller
Authentication Code returned by Caller
SMS Confirmation Sent Back to Caller
Voice Confirmation Call from Contact Center sets up Interactive Conversation
Try the LIVE DEMO after the event!
Voice
Call Center Agent
Voice
Voice
DID or Toll Free
SMS
Carrier
Services
Voice
Voice Carriers
Voice
Call Center
Voice
Applications
Voice
Outbound
SMS SMS
Two Factor
Authentication
Mobile
Landline
© 2020 Network Intelligence. Proprietary and Confidential.
• Rapid Implementation Time
• Protects Your Installed Base
• Bring Your Own Carrier
• Enhances Legacy Systems
• Visual Designer Reduces Development
• Shorter Time to Market
• Offloads Applications Platform Development
• Allows for a graceful Integration of legacy applications
• Integrates with Existing Toll Free and DID numbers
• Automates the Two Factor Authentication process for Voice
• Integrates with existing API’s
• No Disruption to Legacy Application environment
• No Capital Investment
• Enhances Productivity and Reduces Operational Cost
• Agent productivity is increased through process automation
• Toll Free usage is replaced with less expensive termination services
Benefits of IVR-Xchange with Mobile/Landline Detection
Two Factor Authentication
© 2020 Network Intelligence. Proprietary and Confidential.
More on Network Intelligence at: www.netg2.com
28
Use Cases – CPaaS Providers
Functions:
Intelligent Traffic Management
SIP Trunking Interoperability
DOS / DDOS Protection
Encryption Off-load
Cloud-based Communications Provider as a Service (CPaaS)
Service Provider
CPaaS Platform
SIP/UDPSIP Trunks
Mobile
Users
Internationa
l
Nationa
l
BYO DID
29
Positioning
Confidential
 Open Source communities
 Educational Programs
 Easy to Download and Use
 Community Support
 Free with Annual Renewal
 Tier 1/2/3 Service Providers
and Enterprise
 Access, Peering, SaaS…
 Commercial applications
 Encryption & HA Support
 Live Support w/ 24/7 opt.
 $1/Session/Year
Interoperability Portfolio
See: freesbc.com/alliance
Together, Enabling the Migration to
Cloud Communications
31
www.telcobridges.com
www.prosbc.com
sales@telcobridges.com
Youtube.com/telcobridges
www.telestax.com
www.netg2.com
Try the demo at:
+1-310-589-4015

More Related Content

What's hot

Shufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification SolutionShufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification Solution
JoshuaVictor10
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
FIDO Alliance
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
lfilliat
 
SUNDRAY Gigabit Series Wireless Access Controller
SUNDRAY Gigabit Series Wireless Access ControllerSUNDRAY Gigabit Series Wireless Access Controller
SUNDRAY Gigabit Series Wireless Access ControllerSunardi Fatan
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood
 
Aaron Nasseh - ISO & Agent Partner Programs
Aaron Nasseh - ISO & Agent Partner ProgramsAaron Nasseh - ISO & Agent Partner Programs
Aaron Nasseh - ISO & Agent Partner Programs
Aaron Nasseh
 
From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data Breach
Paymetric, Inc.
 
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.Paymetric, Inc.
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET Journal
 
CardConnect
CardConnectCardConnect
CardConnect
AaronCSmith2
 
Brander Group Buy IPv4 Address Blocks
Brander Group Buy IPv4 Address BlocksBrander Group Buy IPv4 Address Blocks
Brander Group Buy IPv4 Address Blocks
JakeIskhakov
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Showfmitchell
 
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and SecureHow To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
Paymetric, Inc.
 
apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...
apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...
apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...
apidays
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
homeworkping4
 
Vera Bradley Chooses Paymetric to Automate Their Payment Processing Needs
Vera Bradley Chooses Paymetric to Automate Their Payment Processing NeedsVera Bradley Chooses Paymetric to Automate Their Payment Processing Needs
Vera Bradley Chooses Paymetric to Automate Their Payment Processing NeedsPaymetric, Inc.
 
Voxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Corp
 
Professional messaging technologies in 2015 and beyond
Professional messaging technologies in 2015 and beyondProfessional messaging technologies in 2015 and beyond
Professional messaging technologies in 2015 and beyond
Infobip
 
Wi-Fi Hotspot in a Printer
Wi-Fi Hotspot in a PrinterWi-Fi Hotspot in a Printer
Wi-Fi Hotspot in a Printer
ITWare
 
WSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as Identity
WSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as IdentityWSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as Identity
WSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as Identity
WSO2
 

What's hot (20)

Shufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification SolutionShufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification Solution
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
SUNDRAY Gigabit Series Wireless Access Controller
SUNDRAY Gigabit Series Wireless Access ControllerSUNDRAY Gigabit Series Wireless Access Controller
SUNDRAY Gigabit Series Wireless Access Controller
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Aaron Nasseh - ISO & Agent Partner Programs
Aaron Nasseh - ISO & Agent Partner ProgramsAaron Nasseh - ISO & Agent Partner Programs
Aaron Nasseh - ISO & Agent Partner Programs
 
From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data Breach
 
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
CardConnect
CardConnectCardConnect
CardConnect
 
Brander Group Buy IPv4 Address Blocks
Brander Group Buy IPv4 Address BlocksBrander Group Buy IPv4 Address Blocks
Brander Group Buy IPv4 Address Blocks
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
 
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and SecureHow To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
 
apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...
apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...
apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Vera Bradley Chooses Paymetric to Automate Their Payment Processing Needs
Vera Bradley Chooses Paymetric to Automate Their Payment Processing NeedsVera Bradley Chooses Paymetric to Automate Their Payment Processing Needs
Vera Bradley Chooses Paymetric to Automate Their Payment Processing Needs
 
Voxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactions
 
Professional messaging technologies in 2015 and beyond
Professional messaging technologies in 2015 and beyondProfessional messaging technologies in 2015 and beyond
Professional messaging technologies in 2015 and beyond
 
Wi-Fi Hotspot in a Printer
Wi-Fi Hotspot in a PrinterWi-Fi Hotspot in a Printer
Wi-Fi Hotspot in a Printer
 
WSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as Identity
WSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as IdentityWSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as Identity
WSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as Identity
 

Similar to New Opportunities with Two Factor Authentication (2FA) - A How To

CPaaS - Leveraging the Power of Cloud Communications
CPaaS - Leveraging the Power of Cloud CommunicationsCPaaS - Leveraging the Power of Cloud Communications
CPaaS - Leveraging the Power of Cloud Communications
Voxvalley .
 
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Alan Quayle
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
FinTech Belgium
 
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
Alan Quayle
 
Which Technologies Do Digital CPAs Use?
Which Technologies Do Digital CPAs Use?Which Technologies Do Digital CPAs Use?
Which Technologies Do Digital CPAs Use?
Avni Rajput
 
Cloopen contact center software
Cloopen contact center softwareCloopen contact center software
Cloopen contact center software
ssuser45d48c
 
Top Digital Transformation Trends (2020)
Top Digital Transformation Trends (2020)Top Digital Transformation Trends (2020)
Top Digital Transformation Trends (2020)
Cygnet Infotech
 
V-CONNECT Profile.pptx
V-CONNECT Profile.pptxV-CONNECT Profile.pptx
V-CONNECT Profile.pptx
Atishay Chaudhary
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
Matteo Masi
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now Democratized
Alan Quayle
 
Office Technology SaaS
Office Technology SaaSOffice Technology SaaS
Office Technology SaaS
Imaging Network
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
Alan Percy
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
TelcoBridges Inc.
 
Navigating the Worker Shortage in the Contact Center
Navigating the Worker Shortage in the Contact CenterNavigating the Worker Shortage in the Contact Center
Navigating the Worker Shortage in the Contact Center
Aggregage
 
tyntec Operator Services
tyntec Operator Servicestyntec Operator Services
tyntec Operator Services
tyntec
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
Alan Percy
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
JeraSoft
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
apidays
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
TelcoBridges Inc.
 
Move your customer authentication to the next level!
Move your customer authentication to the next level!Move your customer authentication to the next level!
Move your customer authentication to the next level!
Ivona M
 

Similar to New Opportunities with Two Factor Authentication (2FA) - A How To (20)

CPaaS - Leveraging the Power of Cloud Communications
CPaaS - Leveraging the Power of Cloud CommunicationsCPaaS - Leveraging the Power of Cloud Communications
CPaaS - Leveraging the Power of Cloud Communications
 
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
 
Which Technologies Do Digital CPAs Use?
Which Technologies Do Digital CPAs Use?Which Technologies Do Digital CPAs Use?
Which Technologies Do Digital CPAs Use?
 
Cloopen contact center software
Cloopen contact center softwareCloopen contact center software
Cloopen contact center software
 
Top Digital Transformation Trends (2020)
Top Digital Transformation Trends (2020)Top Digital Transformation Trends (2020)
Top Digital Transformation Trends (2020)
 
V-CONNECT Profile.pptx
V-CONNECT Profile.pptxV-CONNECT Profile.pptx
V-CONNECT Profile.pptx
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now Democratized
 
Office Technology SaaS
Office Technology SaaSOffice Technology SaaS
Office Technology SaaS
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Navigating the Worker Shortage in the Contact Center
Navigating the Worker Shortage in the Contact CenterNavigating the Worker Shortage in the Contact Center
Navigating the Worker Shortage in the Contact Center
 
tyntec Operator Services
tyntec Operator Servicestyntec Operator Services
tyntec Operator Services
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Move your customer authentication to the next level!
Move your customer authentication to the next level!Move your customer authentication to the next level!
Move your customer authentication to the next level!
 

More from Alan Percy

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
Alan Percy
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
Alan Percy
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
Alan Percy
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Alan Percy
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
Alan Percy
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
Alan Percy
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
Alan Percy
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
Alan Percy
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
Alan Percy
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
Alan Percy
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
Alan Percy
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
Alan Percy
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
Alan Percy
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
Alan Percy
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
Alan Percy
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
Alan Percy
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
Alan Percy
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
Alan Percy
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
Alan Percy
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
Alan Percy
 

More from Alan Percy (20)

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

New Opportunities with Two Factor Authentication (2FA) - A How To

  • 1. New Opportunities with Two Factor Authentication A How-To Webinar
  • 2. 2 Today’s Presenters: Alan D Percy CMO at TelcoBridges alan.percy@telcobridges.com Kevin Nethercott CCO at Telestax kevin.nethercott@telestax.com Jamie Hash COO at Network Intelligence jhash@netg2.com
  • 3. 3 Agenda • Introductions • Why 2FA? • 2FA use cases • How does 2FA work? • The commercial opportunity for 2FA as a service • Customer case study • Using voice calling with 2FA • Demonstration • Your Questions
  • 4. What’s the problem? Phishing Attacks on the Rise According to APWG’s Phishing Activity Trends Report for Q3 2019, phishing attacks rose in prevalence to a level that hasn’t been observed since 2016. In Q4 of 2016, 277,693 attacks were recorded by APWG. In Q3 of 2019, the number was close to that at 266,387 4 Majority of attacks involve credentials Cofense’s Phishing Threat and Malware Review 2019 found that almost 74 percent of phishing attacks between October 2018 and March 2019 involved credential phishing—stealing usernames and passwords. Spear phishing email are most popular Symanetc’s Internet Security Threat Report 2019 shows spear phishing emails are used by almost two-thirds (65 percent) of all known groups carrying out targeted cyber attacks.
  • 5. What is 2FA? PCMag's lead security analyst Neil J. Rubenking puts it, “there are three generally recognized factors for authentication: something you know (such as a password), something you have (such as a hardware token or cell phone), and something you are (such as your fingerprint). Two-factor means the system is using two of these options." 5
  • 6. 6 Why 2FA? 1) Can’t trust just user account and passwords any more • Dark web market for account information 2) Inbound telephone numbers cannot be trusted • Contact centers often depend on caller’s number • Calling number can easily be spoofed 3) Smartphones are fairly ubiquitous and personal • Depends on industry/market/geography • SMS is not universal
  • 7. 7 Opportunities for 2FA 1)TSPs can use 2FA to protect their own applications/network 1)TSPs can offer valuable 2FA services to their business customers to help protect their applications/network
  • 8. Switch Your 2FA Today Kevin Nethercott Chief Commercial Officer Telestax April 14, 2020
  • 9. 9 About Telestax- Built with Community, Scalability, & Agility Opensource ▪ Development driven ▪ 10K+ telecom developers ▪ 6M+ lines of code ▪ 5000+ global deployments On-Premise ▪ Customers in 65 countries ▪ 200 customers ▪ 200M+ calls per day ▪ 900M+ messages per day Cloud-Enabled ▪ 2018 CPaaS Enabling Leader* ▪ Faster time-to-market for CSPs ▪ Quick onboarding for customers ▪ Programmable omnichannel APIs *Source: Frost & Sullivan Telestax 2018 North American CPaaS Enabling Technology Leadership Award Report. PHASE 3PHASE 2PHASE 1 BUILT TO SCALEPROVEN, TRUSTEDSTRONG FOUNDATION
  • 10. 10 SMBs Large Enterprises Call Centers Financials Healthcar e Marketing Blast Companies Ride Sharing Apps Communication Service Providers OEMs System Integrators Network Service Providers Application Providers SMS Aggregators Telestax Partners with the Communications Industry to Power Enterprise Verticals with CPaaS ENTERPRISE VERTICALS Travel & Hospitalit y
  • 11. 11 Higher quality standard comes with network ownership End-to-end accountability with full diagnostic control Lower pricing for full set of service features Competitive advantage in international markets (no FCC) Long term sales relationships established PLUS Higher delivery rate, traffic blocking filters, higher QoS No quality guarantee as they do not own the network Limited error detection due to dependence on SP Pricing is 30% higher for same features Low penetration worldwide due to international constraints Limited customer service with self service model OTT Providers CSPs with Telestax vs With CPaaS Enablement, CSPs Win at CPaaS
  • 12. 12 Add Almost $1M Revenue This Year by Switching Just One Account to CPaaS 3M TRAFFIC MESSAGES PER MONTH Traffic switched from an OTT provider to Service Provider 1MMESSAGES PER MONTH Traffic switched from an OTT provider to Service Provider 4M Minutes of traffic each month $0.01 REVENUE PER MESSAGE $30K new monthly revenue $360K new yearly revenue $0.05PER MESSAGE $50K new monthly revenue $600K new yearly revenue $80K new monthly revenue $960K new yearly revenueBy switching a key account to your organization, your company brings in $960K more revenue per year USE CASE SMS Alerts for: - Accounts overdrawn - Deposits completed - Statements ready to view 2FA for: - Account authentication - Protect against phishing attacks
  • 14. 14 Polling Question As a communications provider, what is the PRIMARY reason you are looking to add 2FA capabilities to your product offerings? A)Add security features or options for your customers? B)Improve turnkey application choices for your customers? C)Provide better network quality than other vendors? D)Provide better pricing than other vendors? E) We already have a 2FA application, just looking for a better alternative
  • 15. 15 A Turnkey Solution for Identity Verification The most widely implemented solution for strong authentication is to use a one-time password (OTP). With that in mind, Smart 2FA will enable you to: • Send an OTP via SMS, voice, or email in order to provide two-factor authentication (2FA) for user account access. • Add an additional layer of identity protection beyond passwords. • Support a robust enterprise security strategy. What is Smart 2FA?
  • 16. 16 Strengthen the overall business security strategy with 2FA. Fast Facts* Smart 2FA Improves Account Security *Source: Google Security Blog
  • 17. 17 o Instantly offer 2FA as a turn-key solution to business customers o BYOC - terminate 2FA traffic on your carrier network o White label Telestax Smart 2FA for enterprise account management, reporting, and troubleshooting o Cut 2FA verification costs for your existing customers o Decrease SMS and voice termination costs by at As a Provider, How Does Smart 2FA Benefit You?
  • 18. 18 Built By and For Developers o Smart 2FA lets you send OTP using SMS, Voice or Email powered by the robust and scalable Restcomm platform that developers love o Send verification code that includes: o Account SID o Auth Token Send OTP Verify OTP
  • 19. 19 With Smart 2FA, your customers will benefit from: • End-to-end quality control • Better 2FA delivery rates • 2FA cost savings • Localized support • Simple API • Intuitive console How Will Smart 2FA Benefit Your Customers?
  • 20. 20 2FA Use Case Examples Financial Healthcare Travel Retail banking portal access mobile banking capability financial record access wire transfers account withdrawal approvals secure patient record access online appointment scheduling virtual consult identification payments, balances, statement access account history access online booking verification booking confirmation access modify reservations verify frequent flier or traveler ID details customer portal setup for ecommerce capability order goods securely save payment information to speed ordering access order history for faster reorders
  • 21. 21 Easily promote and educate your customers on 2FA possibilities Telestax Leads in Sales Enablement Videos Documentation Brochures 2FA Guidebook Learn more at: www.telestax.com/2FA
  • 22. A Consultancy and Managed Services Organization Advice in Action Network Intelligence has evolved from providing clients with information and advice to providing fully customized and outsourced operating solutions for their telecommunications business models. We not only know how to build networks, we design, build, operate, and manage them for our clients. o Founded in 1985 o History of Consulting to RBOCs, CLECs, IOCs, Vendors and End User o First Certified Managed Service Provider for RestcommOne • CPaaS (Communications Platform as a Service) o Tenured Industry Professionals • Technical Expertise • Design in TDM, IP and CPaaS • Operations Know How • Business Systems Experience © 2020 Network Intelligence. Proprietary and Confidential.
  • 23. An Autonomous Software Platform capable of Enabling Communication based Business Processes across multiple cloud Services and Endpoints • Integration of Applications and Communications • API Inbound/Outbound • Media Inbound/Outbound • Voice/Video • Messaging Inbound/Outbound • SMS/WebChat/Email • Optimization • Elimination of redundant and manual processes Scripting of new processes • Automation • Real-Time Orchestration and delivery of Integrated and Optimized Processes CPaaS is a Real-Time Business Process Management and Control Tool Sentient Cloud Services Integration Optimization Automation © 2020 Network Intelligence. Proprietary and Confidential.
  • 24. • IVR-Xchange • SMS and Voice Contact Center • Voice Activated SMS • Smart Voicemail • IoT Solution • AI Chatbot • Telemedicine • Video Websharing • Cognitive Voice and messaging • Real Estate Call Capture • Smart Appoint Scheduling • 2FA • Live chat, scriptable voice API • Hosted PBX • Communications based team management • USSD Self Care • Mobile payments & Financing • TextSelect • Text2Email • Web-Trigger Auto Dialing Current Applications © 2020 Network Intelligence. Proprietary and Confidential.
  • 25. Voice Call Center Agent Voice SMS Landline Mobile Sentient Control Point SMS Carrier Services SMS Voice Circuit Type GPS Locator Account Info Verification Time & Temp Banking Reservations IVR-Xchange API Database Voice/SMS/Video Voice Call Center Auto Dialer Messaging Business IVR Auto Repair Doctor’s Office Restaurant Dispatch Real Estate Retail Physical Layer Switching + Applications Layer Control = Applications Border Controller Sentient Cloud Services An Autonomous Software Platform capable of Enabling Communication based Business Processes across multiple cloud Services and Endpoints Sentient Cloud Services © 2020 Network Intelligence. Proprietary and Confidential.
  • 26. IVR-Xchange with Mobile/Landline Detection Two Factor Authentication Call Flow Inbound call to a Toll Free or Direct Number Text Message is Automatically Sent to Originating Caller Authentication Code returned by Caller SMS Confirmation Sent Back to Caller Voice Confirmation Call from Contact Center sets up Interactive Conversation Try the LIVE DEMO after the event! Voice Call Center Agent Voice Voice DID or Toll Free SMS Carrier Services Voice Voice Carriers Voice Call Center Voice Applications Voice Outbound SMS SMS Two Factor Authentication Mobile Landline © 2020 Network Intelligence. Proprietary and Confidential.
  • 27. • Rapid Implementation Time • Protects Your Installed Base • Bring Your Own Carrier • Enhances Legacy Systems • Visual Designer Reduces Development • Shorter Time to Market • Offloads Applications Platform Development • Allows for a graceful Integration of legacy applications • Integrates with Existing Toll Free and DID numbers • Automates the Two Factor Authentication process for Voice • Integrates with existing API’s • No Disruption to Legacy Application environment • No Capital Investment • Enhances Productivity and Reduces Operational Cost • Agent productivity is increased through process automation • Toll Free usage is replaced with less expensive termination services Benefits of IVR-Xchange with Mobile/Landline Detection Two Factor Authentication © 2020 Network Intelligence. Proprietary and Confidential. More on Network Intelligence at: www.netg2.com
  • 28. 28 Use Cases – CPaaS Providers Functions: Intelligent Traffic Management SIP Trunking Interoperability DOS / DDOS Protection Encryption Off-load Cloud-based Communications Provider as a Service (CPaaS) Service Provider CPaaS Platform SIP/UDPSIP Trunks Mobile Users Internationa l Nationa l BYO DID
  • 29. 29 Positioning Confidential  Open Source communities  Educational Programs  Easy to Download and Use  Community Support  Free with Annual Renewal  Tier 1/2/3 Service Providers and Enterprise  Access, Peering, SaaS…  Commercial applications  Encryption & HA Support  Live Support w/ 24/7 opt.  $1/Session/Year
  • 31. Together, Enabling the Migration to Cloud Communications 31 www.telcobridges.com www.prosbc.com sales@telcobridges.com Youtube.com/telcobridges www.telestax.com www.netg2.com Try the demo at: +1-310-589-4015