Digital Identity
Score
Phone number reputation scoring
PhoneID
Discover device characteristics including carrier, type, recent SIM card swaps, and more.
PROGRAMMABLE COMMUNICATION
SMS
Build SMS messaging into web and mobile applications
Voice
Build voice calling into apps, web and communication systems
Verification
Authenticate users with SMS and voice-based one-time passcodes
RCS
Send conversational messages with rich content
BY INDUSTRY
BY USE CASE
Leverage 2FA and digital identity signals to protect your iGaming gambling accounts
Read more
Learn how datings apps can scale while protecting their users over the entire customer journey
Learn how TeleSign's 2FA verification solution uses Score to complement all your account security needs
Contact your customers where they are, when they want it with a contextual omnichannel strategy
When it comes to marketplaces, it's not always the customer committing fraud
What should eCommerce platforms be on the lookout for during spikes of activity?
Learn more
Programmable communications help a lot during a quarantine
Learn about one of Southeast Asia's largest shopping holidays
Leaving your connected devices unsecured can cause real problems
How one pair of roller skates made me rethink digital identity and marketplaces
Why We Link Communication and Digital Identity
Learn how TeleSign protects users and platforms during summer vacation with solutions ranging from digital identity to programmable communications.
Learn how TeleSign's flagship digital identity solution, Score, can help protect your platform and users in the Indian market.
Learn how TeleSign can help e-commerce platforms use RCS to engage users at all points of the customer lifecycle and drive higher revenue.
TeleSign is introducing expanded Know Your Customer solutions in India to improve conversion rates, fight fraud and bolster end user communication.
Learn how bots and trolls influence election fraud and how TeleSign uses digital identity to fight back by removing fake accounts from social platforms.
TeleSign chronicles how a SIM Swap attack works, and how social engineering can make it so easy that a young teenager was able to do it.