Real-Life Use Case

Eliminate Unwanted Voice Traffic

Construction, Architecture, Engineering & Design

This is a real-life Use Case of a Mutare Customer and provides a high-level summary of the scenario and business problems resolved with the Mutare Voice Traffic Filter solution.

Solution

Industry

Construction, Architecture, Engineering & Design

The Client

A Planning, design, technology, and construction management services with more than 60 offices, annual revenues over $500 million, and a professional employee force of 2,500+.

Problem Definition

The IT service desk was getting overwhelmed with trouble tickets from employees asking to have robocalls blocked from ringing through. The growing volume of unwanted calls was impacting employee productivity and ability to serve clients in a timely manner while also raising concerns about criminal intrusions through the voice network. The client sought a solution that could solve the issue enterprise-wide without adding additional stress to IT support and administration.

Key Decision Points

  1. Recovered Productivity
  2. Relief for IT Helpdesk
  3. Reduced Exposure to Cyber Threats
  4. Single-Source Enterprise-Wide Filter Solution
  5. Ease of Administration and Support
  6. Evolutionary Product Design

Annual Malicious Calls Diverted

%

ROI Validated Annually

Annual Projected Savings

The Story

When the client attended a Mutare webinar and learned of Mutare’s Voice Traffic Filter they signed on for a Mutare Voice Traffic Analysis. Reports generated from the customer-supplied CDR data revealed that, of the 4,169,350 calls processed through the Voice Traffic Filter, nearly 10% were unwanted spam or robocalls. Over a year’s time, that would amount to 734,961 unwanted calls that could be blocked by the filter, including nearly 250,000 defined as having nefarious intent. The dollar gains for improved productivity due to reduced call disruptions came to an estimated $1,900,000 annually. What’s more, IT helpdesk saw a dramatic decrease in trouble tickets related to nuisance spam and scam calls, further adding to convincing evidence of the filter’s effectiveness. Noting Mutare’s commitment to a product designed to evolve with the ever-changing challenges of voice spam detection and network security, the customer recently updated their application to the most recent release, adding deeper threat detection capabilities to their Mutare voice traffic filtering system.

About Mutare Voice Traffic Filter

The Mutare Voice Traffic Filter (VTF) is enterprise-class software built to provide multiple layers of protection against unwanted traffic. VTF creates a barrier at the network edge, ensuring that malicious and nefarious traffic does not gain access to your network. Our open architecture is designed to work seamlessly with just about every unified communications platform, including Cisco, Avaya, Mitel, Nortel and more.

Key Features

  • STIR / SHAKEN Filter
  • Proprietary Dynamic DB Filter
  • Spoof Radar Filter
  • Voice CAPTCHA Verification
  • Custom Rules Filter
  • Inbound/Outbound Traffic Manager
  • Personal Blocklist
  • Admin Dashboard
  • Admin Email Alerts
  • Embedded CDR Reporting (Call Detail Records)

Learn More about Mutare Voice Traffic Filter

Quick Links

Executive Report: Voice Network Threat Survey 2023

With over 300 responses from IT and Security industry experts, the second annual Voice Network Threat Survey was created to shine a light on the industry’s perception of a burgeoning threat vector – Voice

WEBINAR – What is Vishing? JAN 25th 2022

We now have a modern technology solution specifically developed to eliminate vishing, robocalls and a host of nuisance and nefarious phone calls from your voice traffic.

 In this Webinar we dive into Vishing to explain what it is, how it works, and its many evolving forms. 

Enterprise Voice Network Security Myths

Enterprise Voice Network Security Myths Organizations are wide-open to cyber attacks via the voice channel largely because of misunderstandings and a lack of attention on this expanding threat vector. This Article has been crafted to educate business, IT and security...