Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireAccess ManagementIdentity Management

Nearly Half of Americans Likely to Use Voice Recognition for Personal Verification

April 11, 2018

A new Pindrop survey has found the vast majority (81%) believe there are benefits to using voice recognition as a form of personal verification.

Not only do 81% find benefits, said the survey, but nearly half of Americans (48%) said they would be likely to use voice recognition as a form of personal verification.

The study also assessed consumer engagement with financial institutions, retailers, healthcare providers and other major omnichannel organizations. Findings indicate that roughly half of Americans contacted financial service companies (49%), healthcare companies (59%), insurance companies (54%), and telco companies (60%), via phone with a customer service inquiry in the last 12 months. About one in ten Americans contacted healthcare companies (15%), insurance companies (9%) and financial service companies (11%) via phone more than five times per year.

Consumer Frustration

Consumers may be dissatisfied with current verification methods used to protect their personal information. More than one in four Americans who have accessed an account at a healthcare company (28%) or TV/telecom company (27%) by phone expressed frustration with their experience. Among those who have found it difficult to access their accounts* by phone, burdensome requirements to answer numerous identity verification questions is the cause of this difficulty for over one quarter of them (28%).  Additionally, nearly one in five (18%) have found it difficult because they forgot the answers to their security questions and were locked out of their accounts.

“We are ushering in a new era of passive voice authentication that will create opportunities for brands to interact with their customers,” said Scott Rose, SVP of Product, Pindrop. “As consumers go beyond their phones and increase interactions with voice activated devices, it is crucial not to confuse personalization with security and identification.”

Fear, Uncertainty, and Doubt Abound

One key finding in the study highlights that roughly four out of five Americans (81%) believe there are benefits to using voice recognition as a form of personal verification. However, concerns remain as 94% believe there are drawbacks to this process. The top reasons for concern include:

  • 61%: May not work well because of background noise (channel independence)
  • 60%: May not work accurately every time (low EER)
  • 48%: Voice can be cloned and used against them (voice spoofing)
  • 43%: May have difficulty recognizing accents
  • 39%: May not be secure
  • 36%: Requires you to speak loudly and clearly (channel independence)
  • 31%: Lack of info on how voice as personal verification works

“In January, Pindrop released the first-of-its-kind Deep Voice™ biometric engine that is able to recognize a consumer by their voice, even with short command-like utterances in a passive manner,” Rose said. “Pindrop®Labs first looked at the limitations of current voice biometrics and specifically designed a voice biometric engine, in a deep neural architecture, that  addresses the top consumer concerns such as channel independence, the emerging threat of voice synthesis and accuracy rates.”

The Frictionless Conversational Economy

In the emerging conversational economy, brands are reimagining voice activated consumer experiences. Enterprise level security and multi-factor authentication is the necessary next step for all industries creating new opportunities for frictionless customer experiences. As more channels become voice-activated, fraudsters will leverage emerging technologies such as voice synthesis to impersonate consumers. Today, voice fraud costs organizations in the U.S. $14 billion each year within call centers alone.

KEYWORDS: identity (ID) management verification voice recognition

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cyber6-900px.jpg

    Nearly Half of Americans Willing to Give Brands a Pass for a Data Breach

    See More
  • CCPA california privacy requests cost companies much time and money

    Nearly half of privacy requests last year were to stop the sale of personal data

    See More
  • eye-scan1-900px.jpg

    More Than Half of U.S. Adults Trust Law Enforcement to Use Facial Recognition Responsibly

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing