Real-Life Use Case

Eliminate Unwanted Voice Traffic


This is a real-life Use Case of a Mutare Customer and provides a high-level summary of the scenario and business problems resolved with the Mutare Voice Traffic Filter solution.




The Client

Texas’ leading research university with 3,000 faculty members serving 52,000 students. This institution attracts more than $650 million annually for discovery.

Problem Definition

IT administrators recognized the need to address an inordinate amount of spam, scam, and other forms of unwanted calls affecting faculty and support staff. Not only were these calls generating a large volume of complaints hitting the Help Desk, but they were also causing rising concern over staff safety, data privacy and network security.

The Story

When investigating solutions to mitigate their unwanted voice traffic, the University first looked at what their SBC provider could offer. They discovered that the provider’s solution entailed filtering incoming voice traffic through a single, third party reputation database. When comparing the SBC-specific solution to Mutare’s Voice Traffic Filter, the client discovered that the SBC provider’s database not only was already included in the Mutare Voice Traffic Filter, but was just one of Mutare’s six other dynamic database filters working together with four additional advanced filtering technologies (Custom Rules, Threat Radar, STIR/SHAKEN analysis and Voice CAPTCHA). What’s more, the Mutare solution also includes outbound call filtering that protects against potential toll fraud, which has been a concern for this client. They subsequently agreed to a Proof of Concept trial of the full Mutare filtering system. Over an 18 day period, the system evaluated 176,697 calls and flagged 24,269 of those, or approximately 14%, as unwanted. Estimated annual savings as a result of blocking these calls calculated out to $1,023,401 due to recovered productivity. What’s more, an average of nearly 1,400 calls per day carried the markings of potential threats and were diverted by the Mutare Voice Traffic Filter.

Given that evidence and projected 1,895% annual ROI, the client agreed to the purchase of the Mutare Voice Traffic Filter, renewable annually.

Annual Productivity Gain


ROI Validation

Annual Nefarious Calls Diverted Daily

Key Decision Points

  1. The Breadth of the Mutare Filter’s Dynamic Database
  2. Multiple Layers of Call Detection & Filtering
  3. Both Inbound and Outbound Call Filtering
  4. Reduced Exposure to Criminal (Nefarious) Intrusion
  5. ROI Validation via Proof of Concept Results

These considerations, combined with the Mutare’s solution capabilities, uncomplicated implementation, and unrivaled customer support, made a clear case for the purchase of the Mutare Voice Traffic Filter.

About Mutare Voice Traffic Filter

The Mutare Voice Traffic Filter (VTF) is enterprise-class software built to provide multiple layers of protection against unwanted traffic. VTF creates a barrier at the network edge, ensuring that malicious and nefarious traffic does not gain access to your network. Our open architecture is designed to work seamlessly with just about every unified communications platform, including Cisco, Avaya, Mitel, Nortel and more.

Key Features

  • STIR / SHAKEN Filter
  • Proprietary Dynamic DB Filter
  • Spoof Radar Filter
  • Voice CAPTCHA Verification
  • Custom Rules Filter
  • Inbound/Outbound Traffic Manager
  • Personal Blocklist
  • Admin Dashboard
  • Admin Email Alerts
  • Embedded CDR Reporting (Call Detail Records)

Learn More about Mutare Voice Traffic Filter

Quick Links

Executive Report: Voice Network Threat Survey 2023

With over 300 responses from IT and Security industry experts, the second annual Voice Network Threat Survey was created to shine a light on the industry’s perception of a burgeoning threat vector – Voice

WEBINAR – What is Vishing? JAN 25th 2022

We now have a modern technology solution specifically developed to eliminate vishing, robocalls and a host of nuisance and nefarious phone calls from your voice traffic.

 In this Webinar we dive into Vishing to explain what it is, how it works, and its many evolving forms. 

Enterprise Voice Network Security Myths

Enterprise Voice Network Security Myths Organizations are wide-open to cyber attacks via the voice channel largely because of misunderstandings and a lack of attention on this expanding threat vector. This Article has been crafted to educate business, IT and security...