COMPARING

Voice Traffic Filter
to SecureLogix

The number of attacks against the voice channel are only increasing with the proliferation of vishing, social engineering and AI. Learn why Mutare is the best solution on the market for protecting your enterprise.

Connect With Us

Layers of Protection

A measure of resistance strength or how difficult it is for a threat actor to inflict harm. See this page for more information.

Enterprise-Grade Voice Network Security

Learn More

The Mutare Voice Traffic Filter is an enterprise-grade voice network security solution engineered to remove damaging nuisance and nefarious calls in their many and evolving forms at the network edge. The system consists of five distinct call analysis and filtering layers working together to maintain the security and integrity of voice traffic flowing into and out of the organization from a single application.

A Combination of Applications

Learn More

SecureLogix offers a combination of voice traffic analytics, caller authentication, and outbound call trust applications with heavy reliance on Managed Services to implement, coordinate and operate.

1) STIR/SHAKEN

The centerpiece of the TRACED act is a requirement for carriers to implement anti-robocall and anti-spoof call technology using the STIR/SHAKEN protocol system. Learn More

Included

Voice Traffic Filter integrates STIR/SHAKEN validation and attestation scoring results, when available, as an additional datapoint for call trust and handling.

Not Included

There is no indication that the SecureLogix enterprise Voice Defense™ platform integrates STIR/SHAKEN data into its analysis. STIR/SHAKEN data, if available, can be included as part of the contact center Orchestra One™ application.

2) Proprietary Dynamic DB

Learn More on our Proprietary Dynamic Database here.

Included

Voice Traffic Filter provides a meta-analysis of unwanted call sources and threat trends. Its proprietary dynamic database layer taps into nine separate, best-of-class worldwide resources along with 3 additional lists for Do Not Originate and Impossible Numbers dedicated to tracking and verifying numbers related to nuisance and nefarious call activity. These databases are expanded through proprietary analytics, confirmation methods, heuristics, voice printing, and machine learning, and are constantly updated in real time.

Included

SecureLogix maintains its own, internal Red List™ reputation database of unwanted numbers as reported through its customer base. Red List is maintained by the Call Secure™ Managed Services team and is only available to customers who subscribe to the Call Secure.

3) Threat Radar

A combination of analytic processes, machine learning, and AI to detect atypical call patterns. Learn More

Included

Threat Radar is a combination of three separate tools used to analyze organization-specific call patterns, call volumes/spikes, and anomalous behaviors. It includes application of machine learning to detect, and respond to, activity indicative of potential threats based on user-specified criteria. The system can suppress call spikes and redirect flagged calls through Voice CAPTCHA or to another resource for additional caller verification.

Included

The SecureLogix Call Defense™ System includes call spike and behavior anomaly detection, call velocity and volume threshold policy enforcement.

4) Custom Rules

Custom Rules is an organization-specific blocklist and allow list builder that adds a customized set of call handling and filtering actions for matching calls, both inbound and outbound. Learn More

Included

Voice Traffic Filter enforces organization-specific inbound and outbound blocklist and allowlist policies based on a spectrum of criteria including phone number exact match, partial match, and CNAM. Includes operators to automatically create and disable rules based on call behaviors.

Included

Under its Call Secure Managed Services, SecureLogix offers a PolicyGuru™ application for admin management of organization-specific rules, including for both inbound and outbound calls. Application includes an admin GUI but additional Managed Services support is recommended.

4a) Personal Blocklist

Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, etc.) and block those calls before they ever ring through. Learn More

Included

Voice Traffic Filter includes a portal where individual employees can add their own block number rules to the system, sparing IT Helpdesk from employee-generated, spam-related trouble tickets.

Not Included

There is no evidence that SecureLogix provides user-level system access that would allow individuals to add personal blocklists to the system; user-specific rules require manual input by admin or through Managed Services.

5) Voice CAPTCHA

Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. Learn More

Included

The Voice CAPTCHA is an additional safeguard used to further vet calls of ambiguous trust through simple keypad input; Separates bots from live callers so legitimate callers are not inadvertently blocked.

Not Included

There is no evidence that the SecureLogix Call Defense System includes any kind of application-based protection against false positive flagging and subsequent blocking of calls that are actually from legitimate sources.

Admin Control

How easy is the solution to use and how much power does the user + their IT team have the ability to tune it to their particular needs as an organization.

Maximum Control, Minimal Effort

Learn More

Voice Traffic Filter was developed to put maximum control with minimal effort in the hands of the user. Mutare provides personal support for initial set-up to assure a trouble-free start. Individuals with admin permissions may change configurations at any time from the control panel. However, once online, the system operates with minimal oversight required.

IT / Managed Service Dependent

Learn More

While trained admins may be able to manage SecureLogix Call Defense application configurations, customers have reported that the process is highly dependent on IT intervention and/or Managed Services.

Control Panel

A single page for one-stop oversight and management. Learn More

Included

Voice Traffic Filter’s intuitive, single-pane-of-glass web-based admin control panel supports easy configurations and call handling preferences for each filtering layer without need for IT or Managed Services support.

Not Included

The SecureLogix enterprise Call Defense platform provides a limited admin portal for viewing reports and logs. The PolicyGuru application provides a web-based GUI for rules creation and policy management, though additional support through Managed Services is recommended.

Dashboard

A  graphical overview of voice traffic activity and filtering actions over a specific date range for inbound and outbound calls. Learn More

Included

Voice Traffic Filter’s graphical, dynamic admin dashboard delivers real-time, clear insight into voice traffic filtering and threat detection/unwanted call handling activity. Display can be set for specific days, weeks, months or year date range.

Unsure

SecureLogix literature refers to a user dashboard but no public details available.

Custom Rules

Custom Rules, an organization-specific blocklist and allowlist builder that adds a customized set of filtering and call handling rules for specified numbers/number types. Learn More

Included

Voice Traffic Filter’s flexible, web-based Rules Engine supports rapid rules creation through a simple wizard, csv import, or through a one-click link in the call history report. Administrators can quickly add rules based on call source and destination and/or create multiple-number Allowlists and Blocklists for a range of both incoming and outgoing calls based on a call type criteria.

Not Included

Subscribers to SecureLogix CallSecure Managed Services have access to the system’s PolicyGuru application which provides a portal for admin rules management.

Detection

Detection allows you to identify a potential security misconfiguration, threat, or unexpected behavior before they become security risks. See this page for more information.

Nuisance and Nefarious Call Detection

Learn More

Voice Traffic Filter includes broad nuisance and nefarious call detection capabilities, starting with a meta-analysis of worldwide data and threat trends amalgamated with local-level, customer-specific policies and traffic pattern analytics using AI and machine learning for optimal sensitivity and response.

Call Defense Augmented by Managed Services

Learn More

Call Defense includes robocall filtering, rules enforcement, and anomalous pattern detection and alert systems. More advanced detection capabilities for database management, data analytics and threat detection requires Managed Service support.

Spoof Detection

Call spoofing is the process of changing the caller ID to any number other than the calling number.  Learn More

Included

Voice Traffic Filter detects call spoofing through a combination of meta-data analysis, STIR/SHAKEN data analysis and machine learning/AI analytics

Included

The SecureLogix Orchestra One™ call authentication application includes spoof call detection for outbound calls.

Pattern Recognition

Pattern recognition is a data analysis method that uses machine learning algorithms to automatically recognize patterns and regularities in data. Learn More

Included

Voice Traffic Filter Threat Radar applies machine learning algorithms based on an organization’s calling patterns to analyze incoming traffic and detect anomalous calling behavior and spikes consistent with suspicious activity.

Included

The SecureLogix Call Defense system analyzes call patterns and spike detection to flag anomalous behavior consistent with suspicious activity.

Artificial Intelligence (AI)

Cyberattack Types Being Supercharged by GenAI:
Vishing, Social Engineering, Phishing, Spoof Calls and Robocalls. Click here to see the Webinar we did on this topic.

Included

Voice Traffic Filter optimizes threat detection capabilities through application of AI.

Unsure

It is not clear if SecureLogix utilizes AI for threat detection.

Remediation

Security remediation is the process of identifying threats and taking the proper steps to resolve them. Sumo Logic has a great page outlining this topic.

Removes Unwanted Calls Before the Phone Rings

Learn More

Voice Traffic Filter protects all enterprise endpoints, contact center as well as internal DIDs. It is sensitive enough to detect and filter out the vast majority of unwanted calls before they reach their endpoint, but with added “do no harm” protections to assure that legitimate callers are not blocked.

No Single Organization-wide Solution

Learn More

SecureLogix does not have a single, organization-wide solution that provides comprehensive protection of both enterprise and contact center users but, rather, offers disparate applications with heavy reliance on Managed Services.

Threat Types Eliminated

Some examples include: Robocalls, Spam Class, Spoof Calls, Vishing, Social Engineering and more.  Learn More

Included

Voice Traffic Filter eliminates the disruption and threat of nuisance and nefarious calls in their many and evolving forms, including robocalls, voice spam, spoofers, spike attacks, phone fraud, social engineering and vishing.

Included

SecureLogix targets robocalls, voice spam, spoofers, spike attacks and phone fraud, with the added capability of detecting TDoS attacks and outbound call spoofing.

Endpoint Coverage

Which endpoints are covered by the solution?

Included

Protects all endpoints in the organization, both enterprise DIDs and Contact Center lines, for both premise-based and cloud contact centers.

Included with Caveats

Protects all endpoints including employee DIDs and premise-based contact center lines but has no integration with cloud contact centers.

Implementation

How can you get the solution, and how does in play in your environment.

Any way you want to consume it

Learn More

With its light infrastructure footprint, the Mutare Voice Traffic Filter solution can be implemented via SIP integration, API, or a combination of both. It integrates with all major enterprise voice platforms, including mixed environments, as well as leading Contact Center, CCaaS and UCaaS cloud platforms. It can be easily deployed to multiple tenants from a single tenant hub, giving customers ultimate flexibility in how and where they choose to add the Mutare solution into their environment.

On-Prem + Cloud

Learn More

SecureLogix enterprise solution can be implemented via TDM and SIP integration on premise. The Orchestra One inbound call authentication and outbound call trust service is cloud-based. SecureLogix can be included with AT&T and Verizon carrier packages. To date, SecureLogix has no integration with Cloud Contact Center (CCaaS) platforms.

On Prem

On private data centers that companies house in their own facilities and maintain themselves

Yes

Mutare Voice Traffic Filter can be implemented on premise and is compatible with any major voice platforms (Avaya, Cisco, etc).

Yes

SecureLogix was originally built as an on-premise solution and integrates with enterprise voice platforms.

Cloud

“The cloud” refers to servers that are accessed over the Internet, and the software and databases that run on those servers.

Yes

Mutare Voice Traffic filter can be implemented in the secure Mutare cloud for enterprise implementation.

Yes

SecureLogix has a cloud-based caller authentication and outbound call trust application for contact centers (Orchestra One). Literature indicates some form of enterprise cloud implementation but with few public details.

Hybrid

A hybrid cloud is a type of cloud computing that combines on-premises infrastructure—or a private cloud—with a public cloud.

Yes

Voice Traffic Filter works with hybrid on-premise/cloud environments.

Yes

SecureLogix claims to work in hybrid on-premise/cloud environments.

API

An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software interface, offering a service to other pieces of software.

Yes

Mutare’s API provides seamless integration for cloud platforms.

No

There is no evidence that SecureLogix offers an API for cloud integrations.

Multi-Tenancy

Multitenancy is a reference to the mode of operation of software where multiple independent instances of one or multiple applications operate in a shared environment.

Yes

Mutare Voice Traffic Filter includes the option to easily apply unwanted call filtering capabilities to remote locations (tenants) from a primary tenant hub.

No

There is no indication SecureLogix supports multi-tenancy. If deployed through a carrier, coverage from a single application to multiple locations is possible.

Integrations

Do the solutions play nice with other solutions in your technology ‘stack’

A resounding yes

Learn More

Voice Traffic Filter integrates with major CCaaS and UCaaS cloud providers, including Genesys, Webex CC, Nice, Five9 and Talk Desk, through secure API. Call data collected through the VTF filtering process can be extracted and integrated with any organization’s existing Security Information and Events Management (SIEM) system enabling more insightful, cross-channel detection and response to emerging threats.

Yes but with no Cloud Contact Centers

Learn More

SecureLogix works well with on-premise contact center environments but, to date, has no integrations with cloud contact center platforms.

CCaaS

CCaaS, which is an abbreviation for Contact Center as a Service, is customer service software that is hosted in the cloud by a solution provider – From Nice

Yes

Voice Traffic Filter provides rapid API integration with CCaaS providers and is currently available for Genesys, Five9, Cisco Webex CC and Nice cloud contact center platforms.

Yes

There is no evidence that SecureLogix can integrate with CCaaS platforms.

UCaaS

Unified communications as a service (UCaaS) brings together apps and services like call, chat, video, and audio conferencing into one cloud-based platform. – From Microsoft

Yes

Voice Traffic Filter can integrate with UCaaS providers through API integration.

Yes

There is no evidence SecureLogix supports UCaaS integration through API.

Carrier

A carrier is a telecommunications service provider (TSP), that offers telecommunications circuits and service. Examples of carriers include AT&T and Verizon.From Five9

In Beta

Mutare is in Beta testing for carrier service integration.

Yes

SecureLogix has carrier integration with Verizon and AT&T.

SIEM/XDR

Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis  of security events, as well as a wide variety of other event and contextual data sources. – From Gartner

Yes

Voice Traffic Filter admin controls include a simple tool for extracting syslog data formatted for easy integration via telemetry into the organization’s SIEM/XDR security system.

Unsure

There is no evidence that SecureLogix provides a tool for data extraction to support SIEM/XDR integration, but participation in SNTP protocol indicates it is a possibility.

This information is our best understanding based on what is publicly available. We invite those who feel corrections are necessary to please fill out this form and we will evaluate and update accordingly.

Mutare’s Voice Traffic Filter

Your most powerful, award winning solution for Voice Threat Defense

Would you like to connect with an expert?

Complete this short web form and one of our Team Members will reach out!