Governments and industry continue to work toward broad implementation of STIR/SHAKEN and its call attestation benefits. STIR/SHAKEN can indeed provide a substantial and credible means to help verify call identity. Even still, broad acceptance of STIR/SHAKEN alone will not solve all of the issues surrounding call identification, security and trust for the enterprise. Many gaps will remain, and enterprise and contact center environments will remain vulnerable to many types of robocalls and spoofed calling attacks.
A broader architecture and set of technologies for call security and trust is required, along with an intelligent and efficient means to unify and optimize all of it. If properly orchestrated, this broader framework can powerfully lever STIR/SHAKEN across an ecosystem of other industry metadata sets, technology plugins, and industry fraud tools to deliver the most useful call identification results at the lowest cost. This approach extends STIR/SHAKEN to help complete the call verification and security puzzle in a highly affordable and scalable way for the enterprise.
Some of the questions we will answer include:
- What is the full spectrum of call trust and security issues for the enterprise? Which should I be most concerned about?
- What do I get with STIR/SHAKEN and what do I not get? What call verification and security issues remain?
- What are some of the challenges and realities to broad adoption of STIR/SHAKEN?
- What additional tools and processes are needed for the enterprise to achieve full call security and trust?
- What role can AI, Machine Learning, and Orchestration play in extending STIR/SHAKEN as part of a broader call verification framework?
- What is orchestration for call verification, how does it work, and why is it beneficial?
- How does a call verification HUB drive down the costs of enterprise call authentication, identification and security?
- What impact can per-call verification costs have on extending call trust across the enterprise?