Real-Life Use Case
Eliminate Unwanted Voice Traffic
Government
This is a real-life Use Case of a Mutare Customer and provides a high-level summary of the scenario and business problems resolved with the Mutare Voice Traffic Filter solution.
The Client
This county, located just outside of Austin, Texas, is among the fastest-growing in the state with a current population of more than 609,000 residents.
Problem Definition
County administrators were getting flooded with complaints from staff about the amount of spam, scam, and dead air calls filling inbound phone lines, interrupting normal operations, and delaying response to legitimate constituent callers. Many of these calls were clearly fraudulent, using spoofed numbers to resemble legitimate county numbers. Bad actors were also spoofing the county’s outbound call line numbers and delivering scam calls to constituents under the guise of legitimate calls from county departments, prompting additional complaints from residents.
The Story
County IT management recognized the negative impact unwanted and intrusive calls were having on their operations, staff, and constituents, and sought out a solution. They contacted Mutare after learning about the Mutare Voice Traffic Filter from the company’s website and agreed to a Voice Traffic Analysis. The County submitted three months of Call Detail Records for analysis which produced results that confirmed their suspicions. Of the nearly 1.3 million incoming calls filtered through the VTF dynamic database alone, more than 12%, or an average of 400 daily, were found to be unwanted robocalls and spam. Of those, 5.5% were deemed nefarious in nature. These findings are conservative relative to what would be found with a full implementation of all five VTF filtering layers. Even so, the bottom-line savings with VTF implementation was projected at a minimum of $245,846 a year, or 373% Return on Investment. The Mutare VTF Voice CAPTCHA feature provided added reassurance that legitimate callers would always ring through. With that information, the County chose to move forward with the Voice Traffic Filter purchase and implementation.
%
% Total Unwanted Traffic
# Unwanted Calls Blocked
%
Return on Investment

Key Decision Points
- Five Layers of Call Filtering
- Both Inbound/Outbound Call Filtering
- Protection from Nefarious Calls
- Easy Administration
- “Do No Harm” Approach
These considerations, combined with the Mutare’s solution capabilities, uncomplicated implementation, and unrivaled customer support, made a clear case for the purchase of the Mutare Voice Traffic Filter.
About Mutare Voice Traffic Filter
The Mutare Voice Traffic Filter (VTF) is enterprise-class software built to provide multiple layers of protection against unwanted traffic. VTF creates a barrier at the network edge, ensuring that malicious and nefarious traffic does not gain access to your network. Our open architecture is designed to work seamlessly with just about every unified communications platform, including Cisco, Avaya, Mitel, Nortel and more.
Key Features
- STIR / SHAKEN Filter
- Proprietary Dynamic DB Filter
- Spoof Radar Filter
- Voice CAPTCHA Verification
- Custom Rules Filter
- Inbound/Outbound Traffic Manager
- Personal Blocklist
- Admin Dashboard
- Admin Email Alerts
- Embedded CDR Reporting (Call Detail Records)
Quick Links
WEBINAR – Contact Center: From Noise to Clarity SEPT 12th 2023
Explore the true impact that unwanted nuisance and nefarious calls (robocalls, spoof calls, voice spam storms and more) are exacting on Contact Center KPIs, Customer Experience and Network/Data Security.
Executive Report: Voice Network Threat Survey 2023
With over 300 responses from IT and Security industry experts, the second annual Voice Network Threat Survey was created to shine a light on the industry’s perception of a burgeoning threat vector – Voice
WEBINAR – What is Vishing? JAN 25th 2022
We now have a modern technology solution specifically developed to eliminate vishing, robocalls and a host of nuisance and nefarious phone calls from your voice traffic. In this Webinar we dive into Vishing to explain what it is, how it works, and its many evolving forms.
WEBINAR – Aliens, Bigfoot, and The Myths of Voice Network Security
Your voice network is under attack, every day, all day, and yet most organizations offer little defense. Why? Most organizations have fallen for several common myths! Learn more on Oct 4th at our newest webinar.
Enterprise Voice Network Security Myths
Enterprise Voice Network Security Myths Organizations are wide-open to cyber attacks via the voice channel largely because of misunderstandings and a lack of attention on this expanding threat vector. This Article has been crafted to educate business, IT and security...
Mutare Voice Network Threat Survey Shows Nearly Half of Organizations Experienced Vishing or Social Engineering Attacks in Past Year
Mutare, Inc. today released a new industry Voice Network Threat Survey that reveals serious shortcomings in enterprise security protections against voice network attacks.