A multinational financial services company with more than 1,400 employees and $38 billion in assets under management.
Recent year stock market volatility and high-profile trading events were pitting large Wall Street firms against small investors banded through social media. This was triggering an increase in harassing phone calls and socially engineered campaigns targeting financial firms and their employees. This company went on a search for a solution that could provide a firewall of protection against intrusive, malicious, and otherwise unwanted calls entering its voice network.
Key Decision Points
- Extent of Mutare Dynamic Database
- All Admin Controls from a Single Interface/One-Step Rules Manager
- Voice CAPTCHA feature
- User-Controlled Personal Blocklists / Relief for IT
- Automated Spoof Detection and Action
- Small Hardware Footprint
- Ease of Working with Mutare team
Malicious Calls Diverted
Annual Projected Savings
In their discovery process, the company’s leadership had narrowed down their choice for an enterprise spam blocking solution to two vendors, one being Mutare. They agreed to implement the Mutare Voice Traffic Filter for a five week Proof of Concept. During that time, administrators had full hands-on experience with the system interface and controls. Over the POC period, the filter processed 155,181 incoming calls and identified 18,162 of those calls, or 12%, as spam or robocalls. What’s more, Mutare research revealed that more than 8,000 of those calls likely carried nefarious intent. The Mutare solution was able to detect unusual call influx (spam storms) at the onset through pattern recognition and automatically direct traffic to its proprietary Voice CAPTCHA which preserved network performance while assuring that legitimate callers could still get through. In a side-by-side comparison of product features, performance, and team support, the Mutare solution, with a projected ROI of 525%, beat out the competition on multiple levels.
About Mutare Voice Traffic Filter
The Mutare Voice Traffic Filter (VTF) is enterprise-class software built to provide multiple layers of protection against unwanted traffic. VTF creates a barrier at the network edge, ensuring that malicious and nefarious traffic does not gain access to your network. Our open architecture is designed to work seamlessly with just about every unified communications platform, including Cisco, Avaya, Mitel, Nortel and more.
- STIR / SHAKEN Filter
- Proprietary Dynamic DB Filter
- Spoof Radar Filter
- Voice CAPTCHA Verification
- Custom Rules Filter
- Inbound/Outbound Traffic Manager
- Personal Blocklist
- Admin Dashboard
- Admin Email Alerts
- Embedded CDR Reporting (Call Detail Records)
We now have a modern technology solution specifically developed to eliminate vishing, robocalls and a host of nuisance and nefarious phone calls from your voice traffic. In this Webinar we dive into Vishing to explain what it is, how it works, and its many evolving forms.
Your voice network is under attack, every day, all day, and yet most organizations offer little defense. Why? Most organizations have fallen for several common myths! Learn more on Oct 4th at our newest webinar.
Enterprise Voice Network Security Myths Organizations are wide-open to cyber attacks via the voice channel largely because of misunderstandings and a lack of attention on this expanding threat vector. This Article has been crafted to educate business, IT and security...
Mutare Voice Network Threat Survey Shows Nearly Half of Organizations Experienced Vishing or Social Engineering Attacks in Past Year
Mutare, Inc. today released a new industry Voice Network Threat Survey that reveals serious shortcomings in enterprise security protections against voice network attacks.
The Voice Network Threat Survey reveals serious shortcomings in enterprise security protections against voice network attacks.This Report is intended to shine a light on one of the most universal infrastructure systems,…
The following is an expert of a Q&A with our CTO Roger Northrop that was on collaboration platforms expanding the threat surface and introduce new security vulnerabilities