Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/30/2013
09:26 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Verint Acquires Voice Biometric Company Victrio

Combined solution joins Victrio's voice biometrics and predictive analytics with Verint's customer-centric workforce optimization (WFO) solutions

MELVILLE, N.Y. and MENLO PARK, CALIF., October 29, 2013 -- Verint® Systems Inc. (NASDAQ: VRNT) today announced the signing of a definitive agreement to acquire Victrio&trade, an innovator in fraud prevention and identity authentication solutions. The combination of Verint and Victrio advances this comprehensive solution set by combining industry-leading voice biometrics and predictive analytics with customer-centric workforce optimization (WFO) solutions, furthering the company's strength in fraud and risk analytics.

Today, risk management, fraud prevention and identity authentication are high profile topics in more and more organizations. With an increased focus on safeguarding customer identity and private information, companies worldwide are investing in technology and services that help mitigate risk, prevent fraud, reduce fraud-related loss and improve the customer experience--all while decreasing contact center operating costs. According to Ovum, "Risk-based authentication is going to be an increasingly important requirement. It represents a more realistic approach for business users, who won't then need to present multiple credentials every time they log in."1

Victrio solutions combine a new generation of "passive" voice biometrics with unique predictive analysis that can accurately detect fraudsters and authenticate customers without caller interruption. Its innovative voice biometrics solution is ideally suited for large financial institutions, including banks, card issuers, wealth management service providers and other organizations focused on fraud reduction. Earlier this year, Victrio was named by Gartner, Inc. as a "Cool Vendor in Security: Identity and Access Management, 2013."2

"We're delighted to welcome Victrio to the Verint family and are enthusiastic about what the addition of its technology brings to the existing Verint fraud and risk analytics portfolio. This acquisition extends our offering and introduces a host of advanced capabilities that will enable us to offer our customers an even more comprehensive solution to address fraud and identity authentication problems head on," explains Elan Moriah, president, Verint Enterprise Intelligence Solutions&trade and Video and Situation Intelligence Solutions&trade.

Extending Market Leadership in Fraud and Risk Analytics

Armed with Actionable Intelligence®, Verint and now Victrio customers will be uniquely positioned to identify and respond more effectively to theft, detect and take action on behaviors that don't comply with industry regulations and company practices, and support data privacy compliance.

By delivering solutions that reduce risk, combat fraud and help ensure compliance, Verint offers an innovative approach to addressing specific areas of risk with advanced analytics technology. This supplements the company's existing fraud and risk analytics category leadership, which already includes video analytics, facial recognition, speech and data analytics, and desktop and process analytics. Verint has comprehensive experience in fraud, risk and compliance across many industries, including specific solutions for financial services, retail, telecommunications and government.

The combined organization will take part in next week's Voice Biometrics Conference in London, November 6-7, at Grosvenor House, a JW Marriott Hotel. To learn more about Victrio, visit www.victrio.com.

About Victrio

Victrio&trade is a leader in voice biometric solutions for call center authentication and fraud detection. Victrio clients include leading U.S. banks and card issuers. Powered by a new generation of voice biometrics and data science, Victrio screens calls to accurately catch fraudsters and verify customers without caller interruption. Victrio systems impact overall security, customer experience, and agent costs. Victrio integrates readily with existing call recording and fraud management systems. The company is headquartered in Menlo Park, California.

About Verint Enterprise Intelligence Solutions

Verint® Enterprise Intelligence Solutions&trade help organizations of all sizes capture and analyze customer interactions, sentiments and trends across multiple channels, improve performance and optimize the customer experience. The solution portfolio includes the Impact 360® Workforce Optimization&trade suite and Voice of the Customer software, which serve as strategic enterprise assets for increasing customer satisfaction and loyalty, enhancing products and services, reducing operating costs and driving revenue.

About Verint Systems

Verint® (NASDAQ: VRNT) is a global leader in Actionable Intelligence® solutions. Its portfolio of Enterprise Intelligence Solutions&trade and Security Intelligence Solutions&trade helps organizations Make Big Data Actionable&trade through the ability to capture, analyze and act on large volumes of rich, complex and often underused information sources--such as voice, video and unstructured text. With Verint solutions and value-added services, organizations of all sizes can make more timely and effective decisions. Today, more than 10,000 organizations in over 150 countries, including over 80% of the Fortune 100, count on Verint solutions to improve enterprise performance and make the world a safer place. Headquartered in NY, Verint has offices worldwide and an extensive global partner network. Learn more at www.verint.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27605
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 uses Ghostscript for processing of uploaded EPS documents, and consequently may be subject to attacks related to a "schwache Sandbox."
CVE-2020-27606
PUBLISHED: 2020-10-21
BigBlueButton before 2.2.8 (or earlier) does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
CVE-2020-27607
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), the client-side Mute button only signifies that the server should stop accepting audio data from the client. It does not directly configure the client to stop sending audio data to the server, and thus a modified server could store the audio data and/or tr...
CVE-2020-27608
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), uploaded presentations are sent to clients without a Content-Type header, which allows XSS, as demonstrated by a .png file extension for an HTML document.
CVE-2020-27609
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 records a video meeting despite the deactivation of video recording in the user interface. This may result in data storage beyond what is authorized for a specific meeting topic or participant.