Vendors
日本語

Callsign

Create a vendor selection project
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.
We are waiting for the vendor to publish their solution profile. Contact us or request the RFX.
Projects allow you to export Registered Vendor details and survey responses for analysis outside of Marsh CND. Please refer to the Marsh CND User Guide for detailed instructions.
Download Registered Vendor Survey responses as PDF
Contact vendor directly with specific questions (ie. pricing, capacity, etc)

Overview

Callsign changes the rules of identity, we believe simply securing that someone is who they say they are should be a basic requirement for any solution. Today’s user, be they customer or employee expects more from technology, they are used to smart and seamless experiences and anything less causes people to abandon transactions or find other ways such as costly calls to helpdesks. By using all of the thousands of data points available such as typing or swiping techniques, location, online habits, face recognition, devices, and yes even passwords, we can provide a friction-free experience; we even know the Monday person can behave differently to the Friday person. Where there is a veering from the norm we then intelligently and in real time introduce further tests, avoiding a rules-based approach that can be replicated by the bad guys. For your company you can choose different intelligent authentication journeys for high-risk users, or high-risk activities. We have the lowest false positive rates in the industry and zero breaches thanks to our inbuilt trust engine. As a result, users can get on with their digital lives whilst you can improve customer engagement, increase productivity and reduce the risk of fraud. Many customers have had increased return on investment by consolidating on our technology across employees and customers, and by using our focused deployment program you can secure the higher risk areas first. We can even make sure current authentication technology is integrated into our intelligent platform so legacy investment is not redundant.

Media

Brochures