Real-Life Use Case

Eliminate Unwanted Voice Traffic


This is a real-life Use Case of a Mutare Customer and provides a high-level summary of the scenario and business problems resolved with the Mutare Voice Traffic Filter solution.




The Client

This county, located just outside of Austin, Texas, is among the fastest-growing in the state with a current population of more than 609,000 residents.

Problem Definition

County administrators were getting flooded with complaints from staff about the amount of spam, scam, and dead air calls filling inbound phone lines, interrupting normal operations, and delaying response to legitimate constituent callers. Many of these calls were clearly fraudulent, using spoofed numbers to resemble legitimate county numbers. Bad actors were also spoofing the county’s outbound call line numbers and delivering scam calls to constituents under the guise of legitimate calls from county departments, prompting additional complaints from residents.

The Story

County IT management recognized the negative impact unwanted and intrusive calls were having on their operations, staff, and constituents, and sought out a solution. They contacted Mutare after learning about the Mutare Voice Traffic Filter from the company’s website and agreed to a Voice Traffic Analysis. The County submitted three months of Call Detail Records for analysis which produced results that confirmed their suspicions. Of the nearly 1.3 million incoming calls filtered through the VTF dynamic database alone, more than 12%, or an average of 400 daily, were found to be unwanted robocalls and spam. Of those, 5.5% were deemed nefarious in nature. These findings are conservative relative to what would be found with a full implementation of all five VTF filtering layers. Even so, the bottom-line savings with VTF implementation was projected at a minimum of $245,846 a year, or 373% Return on Investment. The Mutare VTF Voice CAPTCHA feature provided added reassurance that legitimate callers would always ring through. With that information, the County chose to move forward with the Voice Traffic Filter purchase and implementation.


% Total Unwanted Traffic

# Unwanted Calls Blocked


Return on Investment

Key Decision Points

  1. Five Layers of Call Filtering
  2. Both Inbound/Outbound Call Filtering
  3. Protection from Nefarious Calls
  4. Easy Administration
  5. “Do No Harm” Approach

These considerations, combined with the Mutare’s solution capabilities, uncomplicated implementation, and unrivaled customer support, made a clear case for the purchase of the Mutare Voice Traffic Filter.

About Mutare Voice Traffic Filter

The Mutare Voice Traffic Filter (VTF) is enterprise-class software built to provide multiple layers of protection against unwanted traffic. VTF creates a barrier at the network edge, ensuring that malicious and nefarious traffic does not gain access to your network. Our open architecture is designed to work seamlessly with just about every unified communications platform, including Cisco, Avaya, Mitel, Nortel and more.

Key Features

  • STIR / SHAKEN Filter
  • Proprietary Dynamic DB Filter
  • Spoof Radar Filter
  • Voice CAPTCHA Verification
  • Custom Rules Filter
  • Inbound/Outbound Traffic Manager
  • Personal Blocklist
  • Admin Dashboard
  • Admin Email Alerts
  • Embedded CDR Reporting (Call Detail Records)

Learn More about Mutare Voice Traffic Filter

Quick Links

Executive Report: Voice Network Threat Survey 2023

With over 300 responses from IT and Security industry experts, the second annual Voice Network Threat Survey was created to shine a light on the industry’s perception of a burgeoning threat vector – Voice

WEBINAR – What is Vishing? JAN 25th 2022

We now have a modern technology solution specifically developed to eliminate vishing, robocalls and a host of nuisance and nefarious phone calls from your voice traffic.

 In this Webinar we dive into Vishing to explain what it is, how it works, and its many evolving forms. 

Enterprise Voice Network Security Myths

Enterprise Voice Network Security Myths Organizations are wide-open to cyber attacks via the voice channel largely because of misunderstandings and a lack of attention on this expanding threat vector. This Article has been crafted to educate business, IT and security...