Frequently Asked Questions
Find answers to common questions about Prismatom, how it works, and how enterprises can engage with us.
What problem does Prismatom solve?
Prismatom addresses the failure of identity signals used in digital communications. Sender IDs, display names, email headers, and domains can be impersonated at scale, making legitimate and fraudulent messages indistinguishable with certainty for customers.
Is Prismatom a messaging platform?
No. Prismatom does not send messages, route traffic, or participate in message delivery. Enterprises continue to use their existing SMS, WhatsApp, Email, and OTT messaging infrastructure unchanged.
Does Prismatom access message content or customer data?
No. Prismatom does not inspect, store, modify, or analyse message content. It does not assume custody of customer data and does not act as a data processor for communications.
How is Prismatom different from anti-phishing tools or filters?
Anti-phishing systems rely on probabilistic detection, heuristics, or after-the-fact analysis. Prismatom introduces a deterministic assurance signal derived outside the delivery channel, enabling authenticity recognition rather than post-delivery detection.
How is this different from customer education or awareness campaigns?
Customer education relies on user judgment, memory, and vigilance, which do not scale reliably under real-world conditions. Prismatom introduces a visible, deterministic assurance signal designed to work even when customers do not think, check, or remember.
Does Prismatom work across channels?
Yes. Prismatom is designed to operate independently of communication channels and can be applied consistently across SMS, Email, WhatsApp, RCS, and other OTT channels.
Does Prismatom change how enterprises send messages?
No. Existing messaging flows, providers, routing logic, and customer journeys remain unchanged. Prismatom operates alongside delivery systems, not within them.
Does Prismatom introduce new operational or regulatory risk?
No. By remaining outside the delivery path and avoiding data custody, Prismatom does not expand regulatory scope related to message processing, storage, or interception.
When is Prismatom relevant for an organisation?
Prismatom is relevant wherever digital communications carry material risk if impersonated, particularly in environments operating at scale or under regulatory or brand-sensitivity constraints.
How does an enterprise engage with Prismatom?
Engagement begins with a structured discussion to assess suitability, boundaries, and deployment posture. Prismatom is deployed selectively and is not offered as a self-service product.
Does Prismatom guarantee prevention of fraud?
No system can guarantee the elimination of fraud. Prismatom adds deterministic assurance that reduces ambiguity in digital communications and strengthens an enterprise's ability to signal authenticity at scale.
Is Prismatom a short-term solution or long-term infrastructure?
Prismatom is designed as long-lived infrastructure, intended to function as a foundational assurance layer for digital communications over time.
What happens after requesting a demo?
A demo is a guided discussion focused on applicability, integration boundaries, and assurance semantics. It does not imply technical or commercial commitment.