Marketplace Providers

Callsign

Intelligence Driven Authentication™

callsign-logo

Callsign Intelligence Driven Authentication™

Callsign’s Intelligence Driven Authentication™ (IDA) proactively defends against data breaches and cybercrime. IDA secures customer identities to prevent data breaches occurring and protects consumer identities to minimise the impact of compromised credentials. Callsign provides policy driven authentication, behavioural and threat analytic solutions that are managed through a single dashboard interface and are pre-integrated through standards based Open Banking API interfaces in to the Temenos T24, Temenos Connect Internet and Temenos Connect Mobile Banking solutions.

Overview

The Challenge

With data breaches and cybercrime at an all time high, companies of all sizes are under increasing pressure to implement secure authentication practices without compromising user experience. Multi-factor authentication on its own is no longer adequate. Companies need an agile and intelligent authentication solution that adapts to the threat level of attempts to access their services. The hassle of unblocking profiles and resetting passwords is as frustrating for users as it is costly for businesses. Businesses need a solution now.

The Solution

Callsign’s Intelligence Driven Authentication™ (IDA) proactively defends against data breaches and cybercrime. IDA secures employee identities to prevent data breaches occurring and protects consumer identities to minimise the impact of compromised credentials. We apply artificial intelligence to understand user patterns and intelligently adjust authentication journeys in real-time. We request the most appropriate authentication action for every situation, supporting all types of user. This balances the need to protect you and your users from unwanted cyber threats, while ensuring the most frictionless and transparent user experience.

Minimize the impact of Data Breaches

Even if credentials and personal information are compromised IDA defends identities by pinpointing malicious usage. Proactively defend against fraudulent account creation and takeover and misuse of your identity.

Increase Consumer Engagement

Engage consumers with seamless access to digital services. Drive consumers through digital channels avoiding the friction of physical interactions

Passwordless access to Services

Deliver passwordless login through location, device and behavioral analytics .

Reducing false Positives

The combination of location, device and behavioral analytics builds a richer picture of a consumer’s digital fingerprint.

Reducing password reset help desk calls

Reduce the need for secret questions and other weak and inconvenient solutions

Regulatory Compliance

Ensure access to personal data is fully accountable. Support critical PSD2 and GDPR requirements around the confidentiality of personal information

Web, Mobile, Telephony, Physical

Protect access to your online services. Secure activities within your mobile applications. Defend telephony to the same level as other channels. Secure payment and ATM transactions with real time alerts.

Electronic Identity and Verification (eID & V)

Our digital Know Your Customer (KYC) capability enables businesses to verify the identity of clients quickly and easily. Through our mobile app and web portal, businesses can capture, verify and store customer ID information in just a few simple steps. Clients capture and securely submit standard ID documents directly from their smartphone or tablet, anytime, anywhere, in less than 3 minutes – reducing dropout rate and improving the customer experience. Robust compliance checks are run to authenticate the ID documents. Comprehensive Customer Due Diligence reports are then generated and stored securely, so your compliance records are complete and easily accessible.

Features

Callsign is designed with multi-layered security to help enterprises instantly detect and mitigate threats with accuracy and precision. With Callsign’s technology, enterprises define adaptive authentication journeys that react to real-time threats and accurately orchestrate user authentication actions for secure and seamless access. IDA is truly unique. It applies deep learning to device, location and behavior analytics to paint the complete threat picture of every access attempt. This enables you to protect against threats in real-time by adjusting the authentication journey to the risk, using a variety of biometric and knowledge based authenticators. Callsign is designed with multi-layered security to help enterprises instantly detect and mitigate threats with accuracy and precision. With Callsign’s technology, enterprises define adaptive authentication journeys that react to real-time threats and accurately orchestrate user authentication actions for secure and seamless access.

  • The Callsign Policy Engine enforces the IDA journeys based on what is being performed, who is performing it and contextual intelligence
  • The Callsign Authentication Engine is the hub for authentication actions and assertions. It requests the required authentication action from the user to mitigate the identified risk.
  • The Callsign Analytics Engine applies deep-learning algorithms to understand user authentication patterns. It fuses together more than 300 data elements from device sensors to pinpoint suspicious activity in real-time.

Callsing is pre-integrated with Temenos T24, Temenos Connect Internet Banking and Temenos Connect Mobile Banking products.

  • Temenos Temenos T24 remains the single point of truth of the user identity.
  • Authentication journeys decoupled from Temenos workflows.
  • Authentication and authorization built on standards based Open Banking APIs.
  • Updates are pushed from Temenos T24 to Callsign also using standards based APIs.
  • Branding propagates to all UXP products.
  • PSD2 and Open Banking compliant integration.

The Callsign dashboard is your control room for managing and configuring your authentication, analytics and policies in one central location.

  • The Callsign Service Manager is where organisations configure their services. It is also the place for issuing Temporary Access Codes, accessing audit logs and viewing other transaction related information.
  • The Callsign Policy Manager uses Callsign’s Authentication Decision Tree framework, admins intuitively define and refine IDA journeys. The Policy Manager is also the point of call for handling denied access and configuring risk policies to determine when additional authentication actions are required.

The Callsign service can be delivered to fit your needs as a business. We offer everything from SaaS multi-tenant and single-tenant databases to on-premise deployments.

  • In Callsign’s on-premise solution, core components of the Callsign platform can be run on local, dedicated hardware, with the option to fail over to the cloud in real-time.
  • The platform has been designed and developed to scale linearly with increasing demand.
  • Callsign’s Tier 1 bank customers have proven scalability in excess of 10,000 transactions per second.

Resources

Get In Touch