Share to
Let’s be clear, we’re not talking about how long it takes for a message to leave your phone and arrive on your friends (although we know this is extremely important), we are talking about SMS service with relation to enterprise to consumer messaging, e.g. when your bank sends you a fraud notification.
The industry divides enterprise to consumer messaging into two types of messages – transactional and promotional. There is an implied speed for each type, for transactional messages delivery needs to be fast, for promotional messaging it’s not necessary for it to be quite so quick.
By far the most important transactional messages are those sending a PIN code or password required to transition to the next step in a process, e.g. logging in to access an online account or resetting a password. For the sake of clarity, we will group this subset of transactional messages into one and call them “two factor authentication” (2FA) messages.
It should be noted that the speed to deliver a message, or the delivery time, is often referred to as the latency of a message. The true meaning of latency can require a magnifying glass in some contracts, because the definition can vary significantly from one provider to another, and in most cases does not actually mean the time from when a user requests the message to when they receive it on their phone.
Our starting point in answering the question, “Just how important is the delivery time of an SMS message?”, was to look at other digital communications and see if there were any similarities. We started with looking at web page loading times and associated drop off of conversion.
We found this excellent infographic on the importance web page load time has on conversion. Kissmetrics found that 35% of surveyed users would abandon a page within 10 seconds of waiting. Intuitively, this sounded roughly about what most users would do if they did not receive a 2FA message within the same time period, but we needed proof.
Many companies who implement 2FA have this data at their fingertips, but because CLX only carries 2FA messages, and is unable to know exactly when a user actually enters the code, we needed some other mechanism to determine the tipping point, the point when the user becomes impatient and requests another message. After racking our brains we realised the most likely thing someone would do if the 2FA message was delayed would be to do exactly that – request another one!
We embarked on a journey of discovery to determine what the ‘repeat request’ rate was as a function of delivery time. As 90% of CLX messages are delivered in less than 5 seconds, we needed to seek out periods where we had rare, but known blips of congestion either due to a carrier network being down or other issue.
When using 2FA, the need for immediate delivery of the text message to the handset is not only required, but expected by the consumer. But how “immediate” does the message have to be? How long are people willing to wait to receive the text before making an additional request to resend the message?
To determine this threshold, we specifically looked at one-time-request versus multiple-requests-per-unique-mobile-number. Prior to analysis the data was cleansed, i.e. for non-delivery issues we did an HLR on all handsets in the data set, and excluded those that showed any kind of potential delivery issue. We then deleted repeat requests from non-existent numbers, as this would indicate someone had entered their mobile number incorrectly.
The first finding from our analysis showed multiple requests to be infrequent, in fact 98% were single entries, meaning the security code was sent to the handset once, the remaining 2% made more than one request. This low percentage for total retries can be explained by the fact that congestion on the CLX network is rare and transient. It is our assumption that every 2FA message will get a repeat request if the message is not delivered within a reasonable and expected period of time.
Looking at this data more closely, we can see just how important delivery latency is. First off, 10% of users asked for a repeat message if they did not receive the message within 3 seconds, a further 19% asked for a repeat message if they didn’t receive the message within 7 seconds, and 6% asked for a repeat message within 11 seconds. In total, this is a staggering 35% of users who will ask for a repeat message if the first one is not delivered within 11 seconds. This is very similar to the Kissmetrics finding, showing that 35% of users would abandon a web page within 10 seconds of waiting. We also noted that the average number of repeat requests was 1.2 across the data set, which means for these users, the enterprise will be paying at least double, if not more than double, per user than required – this can be directly attributed to latency.
We conclude that a 2FA message must be delivered within 10 seconds maximum, ideally it should be in less than 3 seconds. There are a number of issues that can impact speed of delivery:
CLX has over 100 direct connections worldwide. We proactively monitor our system performance and message delivery times. As part of our monitoring process, our system continually runs tests, some of which are outbound to the carrier networks and partners to measure message delivery times and to alert us to any changes in latency. Early detection allows us to notify and expedite working with carriers and partners to correct the performance.
If you have mission-critical messages and time-sensitive use cases, you need to take message delivery latency seriously, and choose your provider wisely, as the need for speed is real. It seems end user’s patience (or in this case impatience) is universal across multiple channels. Delivery immediacy is a major strength of SMS messaging, and not taking advantage of it could cost you dear in the long run.
First published by CLX Communications.