Real-Life Use Case

Eliminate Unwanted Voice Traffic

Technology

This is a real-life Use Case of a Mutare Customer and provides a high-level summary of the scenario and business problems resolved with the Mutare Voice Traffic Filter solution.

Solution

Industry

Technology

The Client

A U.S. content delivery network, cybersecurity, and cloud service company with over $3 billion in revenue and an employee force of 8,800.

Problem Definition

As a leader in Internet security for data, the client was becoming increasingly aware of their own organization’s vulnerability to criminal intrusions that could take place through the relatively unprotected voice channel. Looking to close that gap, they committed their team to finding a solution that could effectively protect their organization and employees from unwanted and malicious calls.

Key Decision Points

  1. Multi-Layered Approach to Call Filtering
  2. Cybersecurity Protection
  3. User-Controlled Personal Blocklists
  4. Spam Storm Detection
  5. Simple Integration with Call Completion
  6. POC Validation

Total Annual Unwanted Calls Blocked

Malicious Calls Diverted Annually

Annual Projected Savings

The Story

As a current customer, the client again turned to Mutare to address concerns over the security of their voice network. After attending a Mutare webinar on Voice Traffic Filter, the client recognized the severity of their voice spam problem and agreed to a Voice Traffic Assessment (VTA) to measure the level of spam activity in their network. The results revealed that 24% of incoming calls were robocalls or other forms of spam. With that data, the customer moved forward with a 60-day full Proof of Concept trial that not only verified the results of the VTA but provided additional details related to their cybersecurity risk exposure. The POC data also indicated patterns of spam storm activity that prompted the company’s IT engineers to reevaluate their entire network call flow structure to mitigate the reach of predictive dialer spammers. The Mutare Voice Traffic Filter also enabled individual employees to create their own block lists of unwanted callers, further relieving IT of excessive spam-related trouble tickets. When looking at implementation, the customer recognized that upgrading their legacy Mutare voicemail-to-email application to the full-featured Mutare Voice call completion solution would allow for simple integration of the Voice Traffic Filter and streamlined management of both voicemail and spam filtering from a single interface. Convinced of the Voice Traffic Filter’s value to their organization, the client moved forward with the purchase of Mutare Voice Traffic Filter and the upgrade to Mutare Voice.

About Mutare Voice Traffic Filter

The Mutare Voice Traffic Filter (VTF) is enterprise-class software built to provide multiple layers of protection against unwanted traffic. VTF creates a barrier at the network edge, ensuring that malicious and nefarious traffic does not gain access to your network. Our open architecture is designed to work seamlessly with just about every unified communications platform, including Cisco, Avaya, Mitel, Nortel and more.

Key Features

  • STIR / SHAKEN Filter
  • Proprietary Dynamic DB Filter
  • Spoof Radar Filter
  • Voice CAPTCHA Verification
  • Custom Rules Filter
  • Inbound/Outbound Traffic Manager
  • Personal Blocklist
  • Admin Dashboard
  • Admin Email Alerts
  • Embedded CDR Reporting (Call Detail Records)

Learn More about Mutare Voice Traffic Filter

Quick Links

WEBINAR – What is Vishing? JAN 25th 2022

We now have a modern technology solution specifically developed to eliminate vishing, robocalls and a host of nuisance and nefarious phone calls from your voice traffic.

 In this Webinar we dive into Vishing to explain what it is, how it works, and its many evolving forms. 

Enterprise Voice Network Security Myths

Enterprise Voice Network Security Myths Organizations are wide-open to cyber attacks via the voice channel largely because of misunderstandings and a lack of attention on this expanding threat vector. This Article has been crafted to educate business, IT and security...

Executive Report: Voice Network Threat Survey 2022

The Voice Network Threat Survey reveals serious shortcomings in enterprise security protections against voice network attacks.This Report is intended to shine a light on one of the most universal infrastructure systems,…