SlideShare a Scribd company logo
New Opportunities with
Two Factor
Authentication
A How-To Webinar
2
Today’s Presenters:
Alan D Percy
CMO at TelcoBridges
alan.percy@telcobridges.com
Kevin Nethercott
CCO at Telestax
kevin.nethercott@telestax.com
Jamie Hash
COO at Network Intelligence
jhash@netg2.com
3
Agenda
• Introductions
• Why 2FA?
• 2FA use cases
• How does 2FA work?
• The commercial opportunity for 2FA as a service
• Customer case study
• Using voice calling with 2FA
• Demonstration
• Your Questions
What’s the problem?
Phishing Attacks on
the Rise
According to APWG’s
Phishing Activity Trends
Report for Q3 2019,
phishing attacks rose in
prevalence to a level that
hasn’t been observed
since 2016. In Q4 of
2016, 277,693 attacks
were recorded by APWG.
In Q3 of 2019, the
number was close to that
at 266,387
4
Majority of attacks
involve credentials
Cofense’s Phishing
Threat and Malware
Review 2019 found that
almost 74 percent of
phishing attacks between
October 2018 and March
2019 involved credential
phishing—stealing
usernames and
passwords.
Spear phishing email
are most popular
Symanetc’s Internet
Security Threat Report
2019 shows spear
phishing emails are used
by almost two-thirds (65
percent) of all known
groups carrying out
targeted cyber attacks.
What is 2FA?
PCMag's lead security analyst Neil J.
Rubenking puts it,
“there are three generally recognized
factors for authentication: something you
know (such as a password), something
you have (such as a hardware token or
cell phone), and something you are (such
as your fingerprint). Two-factor means the
system is using two of these options."
5
6
Why 2FA?
1) Can’t trust just user account and passwords any more
• Dark web market for account information
2) Inbound telephone numbers cannot be trusted
• Contact centers often depend on caller’s number
• Calling number can easily be spoofed
3) Smartphones are fairly ubiquitous and personal
• Depends on industry/market/geography
• SMS is not universal
7
Opportunities for 2FA
1)TSPs can use 2FA to
protect their own
applications/network
1)TSPs can offer valuable 2FA
services to their business
customers to help protect their
applications/network
Switch Your 2FA Today
Kevin Nethercott
Chief Commercial Officer
Telestax
April 14, 2020
9
About Telestax- Built with Community,
Scalability, & Agility
Opensource
▪ Development driven
▪ 10K+ telecom developers
▪ 6M+ lines of code
▪ 5000+ global deployments
On-Premise
▪ Customers in 65 countries
▪ 200 customers
▪ 200M+ calls per day
▪ 900M+ messages per day
Cloud-Enabled
▪ 2018 CPaaS Enabling Leader*
▪ Faster time-to-market for CSPs
▪ Quick onboarding for customers
▪ Programmable omnichannel APIs
*Source: Frost & Sullivan Telestax 2018 North American CPaaS Enabling Technology Leadership Award Report.
PHASE 3PHASE 2PHASE 1
BUILT TO SCALEPROVEN, TRUSTEDSTRONG FOUNDATION
10
SMBs
Large
Enterprises
Call
Centers
Financials
Healthcar
e
Marketing
Blast Companies
Ride Sharing
Apps
Communication
Service Providers
OEMs
System
Integrators
Network
Service Providers
Application
Providers
SMS
Aggregators
Telestax Partners with the
Communications Industry to Power
Enterprise Verticals with CPaaS
ENTERPRISE
VERTICALS
Travel &
Hospitalit
y
11
Higher quality standard
comes with network ownership
End-to-end accountability with full
diagnostic control
Lower pricing for full set
of service features
Competitive advantage in
international markets (no FCC)
Long term sales relationships
established
PLUS Higher delivery rate,
traffic blocking filters, higher QoS
No quality guarantee
as they do not own the network
Limited error detection
due to dependence on SP
Pricing is 30% higher
for same features
Low penetration worldwide
due to international constraints
Limited customer service with
self service model
OTT Providers CSPs with Telestax
vs
With CPaaS Enablement, CSPs Win at
CPaaS
12
Add Almost $1M Revenue This Year by
Switching
Just One Account to CPaaS
3M
TRAFFIC
MESSAGES PER
MONTH
Traffic switched
from
an OTT provider to
Service Provider
1MMESSAGES PER
MONTH
Traffic switched
from
an OTT provider to
Service Provider
4M Minutes of
traffic
each month
$0.01
REVENUE
PER MESSAGE
$30K new monthly revenue
$360K new yearly revenue
$0.05PER MESSAGE
$50K new monthly revenue
$600K new yearly revenue
$80K new monthly
revenue
$960K new yearly
revenueBy switching a key account to your organization, your company brings in $960K more revenue per year
USE CASE
SMS Alerts for:
- Accounts overdrawn
- Deposits completed
- Statements ready to view
2FA for:
- Account authentication
- Protect against phishing
attacks
13
Smart 2FA
14
Polling Question
As a communications provider, what is the PRIMARY reason you are
looking to add 2FA capabilities to your product offerings?
A)Add security features or options for your customers?
B)Improve turnkey application choices for your customers?
C)Provide better network quality than other vendors?
D)Provide better pricing than other vendors?
E) We already have a 2FA application, just looking for a better
alternative
15
A Turnkey Solution for Identity
Verification
The most widely implemented solution
for strong authentication is to use a
one-time password (OTP). With that in
mind, Smart 2FA will enable you to:
• Send an OTP via SMS, voice, or
email in order to provide two-factor
authentication (2FA) for user
account access.
• Add an additional layer of identity
protection beyond passwords.
• Support a robust enterprise security
strategy.
What is Smart 2FA?
16
Strengthen the
overall business
security strategy
with 2FA.
Fast Facts*
Smart 2FA Improves Account
Security
*Source: Google Security Blog
17
o Instantly offer 2FA as a turn-key solution to
business customers
o BYOC - terminate 2FA traffic on your carrier
network
o White label Telestax Smart 2FA for enterprise
account management, reporting, and
troubleshooting
o Cut 2FA verification costs for your existing
customers
o Decrease SMS and voice termination costs by at
As a Provider, How Does Smart 2FA
Benefit You?
18
Built By and For Developers
o Smart 2FA lets you send OTP using SMS, Voice or Email powered by the robust
and scalable Restcomm platform that developers love
o Send verification code that includes:
o Account SID
o Auth Token
Send OTP
Verify OTP
19
With Smart 2FA, your customers
will
benefit from:
• End-to-end quality control
• Better 2FA delivery rates
• 2FA cost savings
• Localized support
• Simple API
• Intuitive console
How Will Smart 2FA Benefit Your
Customers?
20
2FA Use Case Examples
Financial Healthcare Travel Retail
banking portal access
mobile banking
capability
financial record access
wire transfers
account withdrawal
approvals
secure patient record
access
online appointment
scheduling
virtual consult
identification
payments, balances,
statement access
account history access
online booking
verification
booking confirmation
access
modify reservations
verify frequent flier or
traveler ID details
customer portal setup for
ecommerce capability
order goods securely
save payment
information to speed
ordering
access order history for
faster reorders
21
Easily promote and educate your customers on 2FA possibilities
Telestax Leads in Sales Enablement
Videos
Documentation
Brochures 2FA
Guidebook
Learn more at: www.telestax.com/2FA
A Consultancy and Managed Services Organization
Advice in Action
Network Intelligence has evolved from providing clients with
information and advice to providing fully customized and outsourced
operating solutions for their telecommunications business models.
We not only know how to build networks, we design, build, operate, and
manage them for our clients.
o Founded in 1985
o History of Consulting to RBOCs, CLECs, IOCs, Vendors and End User
o First Certified Managed Service Provider for RestcommOne
• CPaaS (Communications Platform as a Service)
o Tenured Industry Professionals
• Technical Expertise
• Design in TDM, IP and CPaaS
• Operations Know How
• Business Systems Experience
© 2020 Network Intelligence. Proprietary and Confidential.
An Autonomous Software Platform capable of Enabling
Communication based Business Processes across
multiple cloud Services and Endpoints
• Integration of Applications and Communications
• API Inbound/Outbound
• Media Inbound/Outbound
• Voice/Video
• Messaging Inbound/Outbound
• SMS/WebChat/Email
• Optimization
• Elimination of redundant and manual processes
Scripting of new processes
• Automation
• Real-Time Orchestration and delivery of
Integrated and Optimized Processes
CPaaS is a Real-Time Business Process
Management and Control Tool
Sentient
Cloud
Services
Integration
Optimization Automation
© 2020 Network Intelligence. Proprietary and Confidential.
• IVR-Xchange
• SMS and Voice Contact Center
• Voice Activated SMS
• Smart Voicemail
• IoT Solution
• AI Chatbot
• Telemedicine
• Video Websharing
• Cognitive Voice and messaging
• Real Estate Call Capture
• Smart Appoint Scheduling
• 2FA
• Live chat, scriptable voice API
• Hosted PBX
• Communications based team management
• USSD Self Care
• Mobile payments & Financing
• TextSelect
• Text2Email
• Web-Trigger Auto Dialing
Current Applications
© 2020 Network Intelligence. Proprietary and Confidential.
Voice
Call Center Agent
Voice
SMS
Landline
Mobile
Sentient
Control
Point
SMS
Carrier
Services
SMS
Voice
Circuit Type
GPS Locator
Account Info
Verification
Time & Temp
Banking
Reservations
IVR-Xchange
API
Database
Voice/SMS/Video
Voice
Call Center
Auto Dialer
Messaging
Business IVR
Auto Repair
Doctor’s Office
Restaurant
Dispatch
Real Estate
Retail
Physical Layer Switching + Applications Layer Control = Applications Border Controller
Sentient Cloud Services
An Autonomous Software Platform capable of
Enabling Communication based Business
Processes across multiple cloud Services and
Endpoints
Sentient Cloud Services
© 2020 Network Intelligence. Proprietary and Confidential.
IVR-Xchange with Mobile/Landline Detection
Two Factor Authentication Call Flow
Inbound call to a Toll Free or Direct Number
Text Message is Automatically Sent to Originating Caller
Authentication Code returned by Caller
SMS Confirmation Sent Back to Caller
Voice Confirmation Call from Contact Center sets up Interactive Conversation
Try the LIVE DEMO after the event!
Voice
Call Center Agent
Voice
Voice
DID or Toll Free
SMS
Carrier
Services
Voice
Voice Carriers
Voice
Call Center
Voice
Applications
Voice
Outbound
SMS SMS
Two Factor
Authentication
Mobile
Landline
© 2020 Network Intelligence. Proprietary and Confidential.
• Rapid Implementation Time
• Protects Your Installed Base
• Bring Your Own Carrier
• Enhances Legacy Systems
• Visual Designer Reduces Development
• Shorter Time to Market
• Offloads Applications Platform Development
• Allows for a graceful Integration of legacy applications
• Integrates with Existing Toll Free and DID numbers
• Automates the Two Factor Authentication process for Voice
• Integrates with existing API’s
• No Disruption to Legacy Application environment
• No Capital Investment
• Enhances Productivity and Reduces Operational Cost
• Agent productivity is increased through process automation
• Toll Free usage is replaced with less expensive termination services
Benefits of IVR-Xchange with Mobile/Landline Detection
Two Factor Authentication
© 2020 Network Intelligence. Proprietary and Confidential.
More on Network Intelligence at: www.netg2.com
28
Use Cases – CPaaS Providers
Functions:
Intelligent Traffic Management
SIP Trunking Interoperability
DOS / DDOS Protection
Encryption Off-load
Cloud-based Communications Provider as a Service (CPaaS)
Service Provider
CPaaS Platform
SIP/UDPSIP Trunks
Mobile
Users
Internationa
l
Nationa
l
BYO DID
29
Positioning
Confidential
 Open Source communities
 Educational Programs
 Easy to Download and Use
 Community Support
 Free with Annual Renewal
 Tier 1/2/3 Service Providers
and Enterprise
 Access, Peering, SaaS…
 Commercial applications
 Encryption & HA Support
 Live Support w/ 24/7 opt.
 $1/Session/Year
Interoperability Portfolio
See: freesbc.com/alliance
Together, Enabling the Migration to
Cloud Communications
31
www.telcobridges.com
www.prosbc.com
sales@telcobridges.com
Youtube.com/telcobridges
www.telestax.com
www.netg2.com
Try the demo at:
+1-310-589-4015

More Related Content

PPT
24online for Hotels/Resorts
PPT
24online-Hotel presentation
PPT
24online Everywhere-Complete Wi-Fi Solutions for Hotels & Hotspots at Zero In...
PDF
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
PPTX
Battling Robocall Fraud with STIR/SHAKEN
PDF
How Data is Revolutionizing Authentication
PDF
PCI DSS Compliance. Shop Direct; A Case Study.
PDF
Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...
24online for Hotels/Resorts
24online-Hotel presentation
24online Everywhere-Complete Wi-Fi Solutions for Hotels & Hotspots at Zero In...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Battling Robocall Fraud with STIR/SHAKEN
How Data is Revolutionizing Authentication
PCI DSS Compliance. Shop Direct; A Case Study.
Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...

What's hot (20)

PDF
Shufti Pro| Digital Identity Verification Solution
PDF
A Telco and End-user Perspective on the Authentication Journey
PPTX
Cidway Securing POS Transactions
PDF
SUNDRAY Gigabit Series Wireless Access Controller
PDF
Entrust datacard --Authentication solutions overview
PPTX
Aaron Nasseh - ISO & Agent Partner Programs
PPTX
From Bad to Worse: How to Stay Protected from a Mega Data Breach
PPT
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
PDF
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
PPTX
CardConnect
PDF
Brander Group Buy IPv4 Address Blocks
PPS
Secur Digital Presentation 22jul10 Frm Show
PDF
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
PDF
apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...
DOC
87559489 auth
PPTX
Vera Bradley Chooses Paymetric to Automate Their Payment Processing Needs
PPTX
Voxeo Summit Day 2 - Securing customer interactions
PPTX
Professional messaging technologies in 2015 and beyond
PDF
Wi-Fi Hotspot in a Printer
PDF
WSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as Identity
Shufti Pro| Digital Identity Verification Solution
A Telco and End-user Perspective on the Authentication Journey
Cidway Securing POS Transactions
SUNDRAY Gigabit Series Wireless Access Controller
Entrust datacard --Authentication solutions overview
Aaron Nasseh - ISO & Agent Partner Programs
From Bad to Worse: How to Stay Protected from a Mega Data Breach
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
CardConnect
Brander Group Buy IPv4 Address Blocks
Secur Digital Presentation 22jul10 Frm Show
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
apidays LIVE Jakarta - Leveraging Business Growth with Telco API by Iwan Pujo...
87559489 auth
Vera Bradley Chooses Paymetric to Automate Their Payment Processing Needs
Voxeo Summit Day 2 - Securing customer interactions
Professional messaging technologies in 2015 and beyond
Wi-Fi Hotspot in a Printer
WSO2Con ASIA 2016: WSO2.Telco IDS – Mobile as Identity
Ad

Similar to New Opportunities with Two Factor Authentication (2FA) - A How To (20)

PPT
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
Download Ableton Live Crack Free Unlimited 2025 License
PDF
Advanced Authentication: Past, Present, and Future
PDF
Intelligent Authentication
PPTX
iovation's Dynamic Authentication Suite
PPTX
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
PDF
Two-factor Authentication
PPTX
TADSummit Telestax Keynote: API and Fly: CPaaS enablement, creating a B2B eco...
PPTX
Api and fly! CPaaS Enablement: Combining Apps, Networks, and APIs
PDF
Security For The People: End-User Authentication Security on the Internet by ...
PDF
Transecq ITA
PDF
Over the Air 2011 Security Workshop
PDF
Enabling a Zero Trust strategy for SMS
PPTX
SecureAuth Solution Enhancements in 2017
PPTX
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
PPTX
Access Management with Aruba ClearPass
PDF
Enhancing Authentication to Secure the Open Enterprise
PDF
SmartCard Forum 2011 - Evolution of authentication market
PDF
Assurity seminar 24 jan
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Download Ableton Live Crack Free Unlimited 2025 License
Advanced Authentication: Past, Present, and Future
Intelligent Authentication
iovation's Dynamic Authentication Suite
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
Two-factor Authentication
TADSummit Telestax Keynote: API and Fly: CPaaS enablement, creating a B2B eco...
Api and fly! CPaaS Enablement: Combining Apps, Networks, and APIs
Security For The People: End-User Authentication Security on the Internet by ...
Transecq ITA
Over the Air 2011 Security Workshop
Enabling a Zero Trust strategy for SMS
SecureAuth Solution Enhancements in 2017
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Access Management with Aruba ClearPass
Enhancing Authentication to Secure the Open Enterprise
SmartCard Forum 2011 - Evolution of authentication market
Assurity seminar 24 jan
Ad

More from Alan Percy (20)

PPTX
Network Transformation Best Practices-Working.pptx
PPTX
The Role of SBC in Fraud Protection
PPTX
Tmedia for Metaswitch - an FAQ Session
PPTX
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
PPTX
Marketing Open Source Software - 10 Tips
PPTX
Contact Center as a Service - Challenges and Successes
PPTX
Robocall Mitigation with YouMail and ProSBC
PPTX
How to Measure VoIP Voice Quality
PPTX
What is SS7? An Introduction to Signaling System 7
PPTX
RESTful APIs and SBCs
PPTX
VoIP Frequently Asked Questions
PPTX
UCaaS with 3cx and ProSBC
PPTX
The Future of Media Gateways
PPTX
How to Protect Against TDOS Attacks
PPTX
ProSBC on Azure - A Tutorial
PPTX
uCPE and VNFs Explained
PPTX
How to Prevent Telecom Fraud in Real-Time
PPTX
ProSBC a Deep Dive
PPTX
Enabling business with CPaaS and SBCs
PPTX
Scaling Open Source Applications with SBCs
Network Transformation Best Practices-Working.pptx
The Role of SBC in Fraud Protection
Tmedia for Metaswitch - an FAQ Session
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Marketing Open Source Software - 10 Tips
Contact Center as a Service - Challenges and Successes
Robocall Mitigation with YouMail and ProSBC
How to Measure VoIP Voice Quality
What is SS7? An Introduction to Signaling System 7
RESTful APIs and SBCs
VoIP Frequently Asked Questions
UCaaS with 3cx and ProSBC
The Future of Media Gateways
How to Protect Against TDOS Attacks
ProSBC on Azure - A Tutorial
uCPE and VNFs Explained
How to Prevent Telecom Fraud in Real-Time
ProSBC a Deep Dive
Enabling business with CPaaS and SBCs
Scaling Open Source Applications with SBCs

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf

New Opportunities with Two Factor Authentication (2FA) - A How To

  • 1. New Opportunities with Two Factor Authentication A How-To Webinar
  • 2. 2 Today’s Presenters: Alan D Percy CMO at TelcoBridges alan.percy@telcobridges.com Kevin Nethercott CCO at Telestax kevin.nethercott@telestax.com Jamie Hash COO at Network Intelligence jhash@netg2.com
  • 3. 3 Agenda • Introductions • Why 2FA? • 2FA use cases • How does 2FA work? • The commercial opportunity for 2FA as a service • Customer case study • Using voice calling with 2FA • Demonstration • Your Questions
  • 4. What’s the problem? Phishing Attacks on the Rise According to APWG’s Phishing Activity Trends Report for Q3 2019, phishing attacks rose in prevalence to a level that hasn’t been observed since 2016. In Q4 of 2016, 277,693 attacks were recorded by APWG. In Q3 of 2019, the number was close to that at 266,387 4 Majority of attacks involve credentials Cofense’s Phishing Threat and Malware Review 2019 found that almost 74 percent of phishing attacks between October 2018 and March 2019 involved credential phishing—stealing usernames and passwords. Spear phishing email are most popular Symanetc’s Internet Security Threat Report 2019 shows spear phishing emails are used by almost two-thirds (65 percent) of all known groups carrying out targeted cyber attacks.
  • 5. What is 2FA? PCMag's lead security analyst Neil J. Rubenking puts it, “there are three generally recognized factors for authentication: something you know (such as a password), something you have (such as a hardware token or cell phone), and something you are (such as your fingerprint). Two-factor means the system is using two of these options." 5
  • 6. 6 Why 2FA? 1) Can’t trust just user account and passwords any more • Dark web market for account information 2) Inbound telephone numbers cannot be trusted • Contact centers often depend on caller’s number • Calling number can easily be spoofed 3) Smartphones are fairly ubiquitous and personal • Depends on industry/market/geography • SMS is not universal
  • 7. 7 Opportunities for 2FA 1)TSPs can use 2FA to protect their own applications/network 1)TSPs can offer valuable 2FA services to their business customers to help protect their applications/network
  • 8. Switch Your 2FA Today Kevin Nethercott Chief Commercial Officer Telestax April 14, 2020
  • 9. 9 About Telestax- Built with Community, Scalability, & Agility Opensource ▪ Development driven ▪ 10K+ telecom developers ▪ 6M+ lines of code ▪ 5000+ global deployments On-Premise ▪ Customers in 65 countries ▪ 200 customers ▪ 200M+ calls per day ▪ 900M+ messages per day Cloud-Enabled ▪ 2018 CPaaS Enabling Leader* ▪ Faster time-to-market for CSPs ▪ Quick onboarding for customers ▪ Programmable omnichannel APIs *Source: Frost & Sullivan Telestax 2018 North American CPaaS Enabling Technology Leadership Award Report. PHASE 3PHASE 2PHASE 1 BUILT TO SCALEPROVEN, TRUSTEDSTRONG FOUNDATION
  • 10. 10 SMBs Large Enterprises Call Centers Financials Healthcar e Marketing Blast Companies Ride Sharing Apps Communication Service Providers OEMs System Integrators Network Service Providers Application Providers SMS Aggregators Telestax Partners with the Communications Industry to Power Enterprise Verticals with CPaaS ENTERPRISE VERTICALS Travel & Hospitalit y
  • 11. 11 Higher quality standard comes with network ownership End-to-end accountability with full diagnostic control Lower pricing for full set of service features Competitive advantage in international markets (no FCC) Long term sales relationships established PLUS Higher delivery rate, traffic blocking filters, higher QoS No quality guarantee as they do not own the network Limited error detection due to dependence on SP Pricing is 30% higher for same features Low penetration worldwide due to international constraints Limited customer service with self service model OTT Providers CSPs with Telestax vs With CPaaS Enablement, CSPs Win at CPaaS
  • 12. 12 Add Almost $1M Revenue This Year by Switching Just One Account to CPaaS 3M TRAFFIC MESSAGES PER MONTH Traffic switched from an OTT provider to Service Provider 1MMESSAGES PER MONTH Traffic switched from an OTT provider to Service Provider 4M Minutes of traffic each month $0.01 REVENUE PER MESSAGE $30K new monthly revenue $360K new yearly revenue $0.05PER MESSAGE $50K new monthly revenue $600K new yearly revenue $80K new monthly revenue $960K new yearly revenueBy switching a key account to your organization, your company brings in $960K more revenue per year USE CASE SMS Alerts for: - Accounts overdrawn - Deposits completed - Statements ready to view 2FA for: - Account authentication - Protect against phishing attacks
  • 14. 14 Polling Question As a communications provider, what is the PRIMARY reason you are looking to add 2FA capabilities to your product offerings? A)Add security features or options for your customers? B)Improve turnkey application choices for your customers? C)Provide better network quality than other vendors? D)Provide better pricing than other vendors? E) We already have a 2FA application, just looking for a better alternative
  • 15. 15 A Turnkey Solution for Identity Verification The most widely implemented solution for strong authentication is to use a one-time password (OTP). With that in mind, Smart 2FA will enable you to: • Send an OTP via SMS, voice, or email in order to provide two-factor authentication (2FA) for user account access. • Add an additional layer of identity protection beyond passwords. • Support a robust enterprise security strategy. What is Smart 2FA?
  • 16. 16 Strengthen the overall business security strategy with 2FA. Fast Facts* Smart 2FA Improves Account Security *Source: Google Security Blog
  • 17. 17 o Instantly offer 2FA as a turn-key solution to business customers o BYOC - terminate 2FA traffic on your carrier network o White label Telestax Smart 2FA for enterprise account management, reporting, and troubleshooting o Cut 2FA verification costs for your existing customers o Decrease SMS and voice termination costs by at As a Provider, How Does Smart 2FA Benefit You?
  • 18. 18 Built By and For Developers o Smart 2FA lets you send OTP using SMS, Voice or Email powered by the robust and scalable Restcomm platform that developers love o Send verification code that includes: o Account SID o Auth Token Send OTP Verify OTP
  • 19. 19 With Smart 2FA, your customers will benefit from: • End-to-end quality control • Better 2FA delivery rates • 2FA cost savings • Localized support • Simple API • Intuitive console How Will Smart 2FA Benefit Your Customers?
  • 20. 20 2FA Use Case Examples Financial Healthcare Travel Retail banking portal access mobile banking capability financial record access wire transfers account withdrawal approvals secure patient record access online appointment scheduling virtual consult identification payments, balances, statement access account history access online booking verification booking confirmation access modify reservations verify frequent flier or traveler ID details customer portal setup for ecommerce capability order goods securely save payment information to speed ordering access order history for faster reorders
  • 21. 21 Easily promote and educate your customers on 2FA possibilities Telestax Leads in Sales Enablement Videos Documentation Brochures 2FA Guidebook Learn more at: www.telestax.com/2FA
  • 22. A Consultancy and Managed Services Organization Advice in Action Network Intelligence has evolved from providing clients with information and advice to providing fully customized and outsourced operating solutions for their telecommunications business models. We not only know how to build networks, we design, build, operate, and manage them for our clients. o Founded in 1985 o History of Consulting to RBOCs, CLECs, IOCs, Vendors and End User o First Certified Managed Service Provider for RestcommOne • CPaaS (Communications Platform as a Service) o Tenured Industry Professionals • Technical Expertise • Design in TDM, IP and CPaaS • Operations Know How • Business Systems Experience © 2020 Network Intelligence. Proprietary and Confidential.
  • 23. An Autonomous Software Platform capable of Enabling Communication based Business Processes across multiple cloud Services and Endpoints • Integration of Applications and Communications • API Inbound/Outbound • Media Inbound/Outbound • Voice/Video • Messaging Inbound/Outbound • SMS/WebChat/Email • Optimization • Elimination of redundant and manual processes Scripting of new processes • Automation • Real-Time Orchestration and delivery of Integrated and Optimized Processes CPaaS is a Real-Time Business Process Management and Control Tool Sentient Cloud Services Integration Optimization Automation © 2020 Network Intelligence. Proprietary and Confidential.
  • 24. • IVR-Xchange • SMS and Voice Contact Center • Voice Activated SMS • Smart Voicemail • IoT Solution • AI Chatbot • Telemedicine • Video Websharing • Cognitive Voice and messaging • Real Estate Call Capture • Smart Appoint Scheduling • 2FA • Live chat, scriptable voice API • Hosted PBX • Communications based team management • USSD Self Care • Mobile payments & Financing • TextSelect • Text2Email • Web-Trigger Auto Dialing Current Applications © 2020 Network Intelligence. Proprietary and Confidential.
  • 25. Voice Call Center Agent Voice SMS Landline Mobile Sentient Control Point SMS Carrier Services SMS Voice Circuit Type GPS Locator Account Info Verification Time & Temp Banking Reservations IVR-Xchange API Database Voice/SMS/Video Voice Call Center Auto Dialer Messaging Business IVR Auto Repair Doctor’s Office Restaurant Dispatch Real Estate Retail Physical Layer Switching + Applications Layer Control = Applications Border Controller Sentient Cloud Services An Autonomous Software Platform capable of Enabling Communication based Business Processes across multiple cloud Services and Endpoints Sentient Cloud Services © 2020 Network Intelligence. Proprietary and Confidential.
  • 26. IVR-Xchange with Mobile/Landline Detection Two Factor Authentication Call Flow Inbound call to a Toll Free or Direct Number Text Message is Automatically Sent to Originating Caller Authentication Code returned by Caller SMS Confirmation Sent Back to Caller Voice Confirmation Call from Contact Center sets up Interactive Conversation Try the LIVE DEMO after the event! Voice Call Center Agent Voice Voice DID or Toll Free SMS Carrier Services Voice Voice Carriers Voice Call Center Voice Applications Voice Outbound SMS SMS Two Factor Authentication Mobile Landline © 2020 Network Intelligence. Proprietary and Confidential.
  • 27. • Rapid Implementation Time • Protects Your Installed Base • Bring Your Own Carrier • Enhances Legacy Systems • Visual Designer Reduces Development • Shorter Time to Market • Offloads Applications Platform Development • Allows for a graceful Integration of legacy applications • Integrates with Existing Toll Free and DID numbers • Automates the Two Factor Authentication process for Voice • Integrates with existing API’s • No Disruption to Legacy Application environment • No Capital Investment • Enhances Productivity and Reduces Operational Cost • Agent productivity is increased through process automation • Toll Free usage is replaced with less expensive termination services Benefits of IVR-Xchange with Mobile/Landline Detection Two Factor Authentication © 2020 Network Intelligence. Proprietary and Confidential. More on Network Intelligence at: www.netg2.com
  • 28. 28 Use Cases – CPaaS Providers Functions: Intelligent Traffic Management SIP Trunking Interoperability DOS / DDOS Protection Encryption Off-load Cloud-based Communications Provider as a Service (CPaaS) Service Provider CPaaS Platform SIP/UDPSIP Trunks Mobile Users Internationa l Nationa l BYO DID
  • 29. 29 Positioning Confidential  Open Source communities  Educational Programs  Easy to Download and Use  Community Support  Free with Annual Renewal  Tier 1/2/3 Service Providers and Enterprise  Access, Peering, SaaS…  Commercial applications  Encryption & HA Support  Live Support w/ 24/7 opt.  $1/Session/Year
  • 31. Together, Enabling the Migration to Cloud Communications 31 www.telcobridges.com www.prosbc.com sales@telcobridges.com Youtube.com/telcobridges www.telestax.com www.netg2.com Try the demo at: +1-310-589-4015