Pindrop Security: The Phone Fraud Experts

Pindrop Security has developed a breakthrough caller-ID product that helps detect, report and mitigate phone fraud. We have developed a patent-pending solution that can identify key attributes of any phone call including the device used, ID, call path, and geographic point of origin. Look at it as a call “fingerprint” that helps clients identify and avoid fraud.

Pindrop is in both the a16z and JC2Ventures portfolios.


Pindrop is focused on bringing trust back to the telephone. Telephony has long been viewed as a trusted communication medium and is used by organizations and individuals to conduct important transactions. For example, customers activate their credit card using their phone and on the banks end, Caller-ID or Automatic Number Identification (ANI) is used to determine if it is the right customer. Essentially, Caller-ID or ANI provides the caller’s phone number (e.g., 1-404-555-0000). However, this information is limited and can be easily manipulated, leaving such services completely broken.


  • Voice Phishing
  • Social engineering
  • Account takeover
  • Fake card activation
  • Fraudulent transactions
  • Fake authentication

To address this pindrop developed a breakthrough Caller-ID alternative. It is based on research that shows that every phone call has a fingerprint hidden away in its audio. This fingerprint reveals many aspects about a call including which phone device was used and what was the call path.


  • Authentication
  • Fraud Detection
  • Reporting
  • Enterprise Integration
  • Workflow Management
  • SaaS or On-premise

Learn more here: 

Track the most disruptive technologies by diving into our categorized index:

Artificial Intelligence Companies | Big Data Companies | Business Intelligence Companies | Cybersecurity Companies | Cloud Computing Companies | Collaborative Tool Companies | Infrastructure Companies | IoT Companies | Mobile Companies | Robotics Companies | Services Companies | Tech Titans | VC, PE and Finance Companies

What do you think?

Okta: On-Demand Identity Management for All Your Web Applications

Why Cybersecurity is Looking to AI to Mitigate Business Risks