Category Archives: Research

Enacomm’s 4Cast = Perfect Solution for Marketing Automation

marketing automation - infographic - 1

Enacomm’s 4Cast® is a hosted CRM product that automates intelligent customer interactions, predicts future behavior and conducts targeted messaging campaigns. 4Cast tracks customers’ activities and anticipates their needs in real-time. Using an advanced real-time decisioning engine, 4Cast researches hundreds of data points and accesses dozens of business policies to provide an exceptional customer self-service experience – all while aggressively conducting ongoing marketing and retention campaigns that are unique for each customer. From recognizing a customer by name to performing complex account analysis and probability modeling, 4Cast autonomously works to upsell, communicate and retain.

Click here to download a brochure on 4Cast. To receive more information or to schedule a product demonstration, contact Enacomm today.

Biometrics Will Be Standard on Smart Mobile Devices by 2020

This summer, Acuity Market Intelligence, an emerging technology strategy and research consultancy, released its forecasts for the mobile biometrics market. According to the group:

  •  Annual revenues from biometrics embedded in smart mobile devices, biometric app downloads, and biometric authentication of transactions will grow from $1.6 billion in 2014 to $34.6 billion in 2020 representing a CAGR of nearly 67% with total forecast period revenues exceeding $117 billion.
  • With an installed base of 4.8 billion, more than 89% of all smart mobile devices in use will be biometrically enabled.
  • More than 5.5 billion biometric apps will be downloaded annually, and more than 800 billion transactions that require some level of biometric authentication will be processed on mobile devices each year.

Maxine Most, Acuity Market Intelligence Principal and lead analyst and a biometric identity expert, commented:

“Today’s mobile biometrics are primarily a convenience factor providing an easy pin alternative for device, application, and account access, as well as mobile payment authorization. By 2017, hardened biometric security on mobile devices will begin in earnest and we will see a genuine transformation in identity and commerce and the true end of ‘the password as we know it.’ The potential for consumer use of mobile biometrics and the associated revenue potential is magnitudes greater than any previous application of biometrics. This massive, globally available platform will provide an unprecedented opportunity for sustained sensor, software and app based revenue as well as enormous potential for biometric authentication services for high-risk and high-value transactions.”

Preview Acuity’s “The Global Biometrics and Mobility Report: The Convergence of Commerce and Privacy” here.

To learn more about Enacomm’s biometric authentication technology that protects mobile transactions and more, visit our products page.

Acuity meme - 1

The Latest Battle between Security Technologists and Law Enforcement

This week, a new report authored by 15 cybersecurity and computer science experts warned that the FBI’s goal of gaining “exceptional access” to tech companies’ encryption systems could pose an even bigger risk than anything fraudsters or terrorists could cook up. The Computer Science and Artificial Intelligence Laboratory Technical Report—issued by MIT—is titled “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”.

The report was a grenade from technologists and privacy advocates in their ideological war with intelligence and law enforcement leaders. The group of security technologists intentionally issued the 31-pager the day before FBI Director James Comey and Sally Quillian Yates, the deputy attorney general at the Justice Department, testified before the Senate Judiciary Committee.

Comey fired back in a LAWFARE op-ed that there are lots of good things about universally strong encryption (e.g., expanded privacy and protection from cybercriminals), but the benefits must be weighed against the potential risks of making it harder for the government to access the digital communications and data of likely wrongdoers.

Scott O’Connell of the Telegram & Gazette paints a picture of the U.S. government’s concerns:

Somewhere in cyberspace, ISIS operatives are busy planning something and the Federal Bureau of Investigation’s concern is that thanks to today’s stronger encryption technology, it’s increasingly difficult to figure out what that something is.

Here’s to hoping that both sides continue their efforts to come together and reach a balanced solution through fair-minded and healthy discussion, as encouraged by Comey.Keys under Doormats - Meme

How Much Does A Data Breach Cost?

Criminal efforts to steal financial data continue to escalate. According to the Ponemon Institute, the cost of a data breach is now more than $3.8 million, on average – and that doesn’t even include the impact of “mega breaches,” such as the massive attack on Target, which can cost hundreds of millions of dollars. The newly reported figure is 23 percent higher than what it was just two years ago.

According to the research, the average hit for each compromised record including sensitive information is also up 6 percent, from $145 to $154. What’s more, nearly half (47%) of all breaches are caused by criminal attacks, which cost more to resolve than breaches due to human error, for example.

Enacomm’s security technology can help your organization prevent criminal attacks on your customers’ data. Read more about our products eKBA and EVA (voice biometrics authentication) at http://www.enacommweb.net/products.html.

Ponemon Fact Meme

Customer Self-Service Adoption Is Increasing, Reports Forrester

Customer service channel usage is evolving,, and offering excellent self-service to consumers has never been more important. According to Kate Leggett of Forrester – VP, Principal Analyst serving Application Development & Delivery Pros – customers are using more communication channels for customer service than ever before and are contacting customer service organizations more frequently.

Here’s one key takeaway from Forrester’s latest consumer survey about channel usage for customer service:

self-service increase - meme
Consumers now expect service interactions to be quick and easy. When it comes to the IVR, only next-generation technology that enables intelligent interactions fits the bill. Enacomm is a leading provider of personalized, multi-modal self-service voice and data processing products and services. Delivered as hosted, on-demand and managed services through the cloud, Enacomm’s IVR solutions are helping organizations cut costs, improve loyalty and increase member retention.

To learn more about Enacomm’s hosted IVR, download our brochure here, or contact us at sales@enacomm.net or 1-877-860-0025.

Voice Is Still #1 Channel for Customer Service – Optimize Your IVR

While the number of self-service options has multiplied, four out of five inbound customer service interactions still come from the phone channel, according to Contact Babel. Whether it’s an easy task that can be handled via self-service or a complicated concern that requires the assistance of a customer service representative, the call should start with Intelligent IVR to lay the foundation for a positive customer experience.

Delivered as hosted, on-demand and managed services through the cloud, Enacomm’s self-service and assisted-service IVR solutions offer organizations the chance to cut costs, improve loyalty and increase member retention. To learn more about Enacomm’s Intelligent IVR, go here. For more information or to schedule a product demonstration, contact us: sales@enacomm.net or 1-877-860-0025. We would be happy to help your organization optimize its customer interactions.

11133944_965241513487502_5923143408769193027_o

Enacomm Voice Authentication Fights Phishing Flagged by Akamai in New Report

This week Akamai Technologies released its Q4 2014 State of the Internet Report . Section 1 of the report focuses on security and details escalating, advanced attacks. Phishing, for instance, is a form of fraud that involves defrauding an online account holder of financial information by posing as a legitimate company.

To help prevent fraudsters from compromising online banking accounts and, for example, wiring a victim’s funds to a third-party account, the report emphasizes user awareness. An excerpt:

Because end users are the target of these attacks, training and education are needed to help them identify suspected phishing attacks…Users should not respond to e-mail requests with sensitive information and should contact their financial institutions with questions about suspicious banking emails. It’s a good idea to browse directly to a financial institution instead of clicking a link.

Banks, credit unions and prepaid companies can help thwart online account break-ins and wrongful transactions, too. Enacomm Voice Authentication (EVA) utilizes voice biometrics technology to protect financial institutions, customers and members, fulfilling Federal Financial Institutions Examination Council (FFIEC) guidance. Click here to learn more. Enacomm’s team is available to help with questions about EVA – call 1-877-860-0025 or email sales@enacomm.net.

Phishing infographic

Lower Costs, Happier Customers and Faster Authentication with Voice Biometrics

Opus Research this month released the second part of its Enterprise Series, Best Practices for Voice Biometrics in the Enterprise. The new report examines best practices for using voice biometrics for simple secure authentication in the enterprise across mobile, IVR, and contact centers. For more information, visit the Opus Research blog.Opus Research March 2015 meme

Chip Tech Will Not Help with “Card Not Present” Threats

According to Reuters, analysts predict that credit card fraud at brick-and-mortar retailers will fall with the move to chip-enabled cards…but what about “card not present” threats? Aite Group estimates online card fraud will more than double in the U.S. to $6.6 billion from $3.3 billion between 2015 and 2018. It’s a side-effect of the chip transition that’s been encountered in other countries, as well.

Voice biometrics technology can help fill the card security gap. To learn more about Enacomm Voice Authentication (EVA), click here.

card fraud - Aite group

More Smartphones, More Biometrics Technology in the Mainstream

Last week, Cisco released its “Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2014–2019”. According to the study, in 2014, smart devices and connections – those having advanced computing and multimedia capabilities with a minimum of 3G connectivity – made up 72% of wireless devices in North America that are accessing mobile networks. By 2019, that number is projected to reach 89%.

Recently, in an interview with Arlene Hauben of The Prepaid Press, Enacomm CEO Mike Boukadakis explained that, with the advent of smartphones, we should expect to see more biometrics technology being employed. “Now we have a vehicle to implement dual mode authentication,” he said. To read the full article, go here.

What does it all mean? Smart devices are making biometric authentication a reality.

Smart Devices Infographic