
Eliminate Unwanted Voice Traffic
Mutare Voice Traffic Filter for Webex eliminates unwanted calls at the network edge.
Spoof Calls
Vishing
Robocalls
Voice Spam
The Mutare Voice Traffic Filter purifies voice network traffic by removing unwanted calls at the network edge.
Robocalls – Spoof Calls – Spam Calls – Direct Nefarious Calls – Vishing – Smishing
A Firewall for your Voice Traffic
5 Layers of Protection
The multi-layered voice traffic firewall, aka Mutare Voice Traffic Filter, eliminates nefarious and nuisance calls at the network edge.
Protect your people, customers and your entire organization from cyber criminals exploiting your phone system. Our dashboard displays your personal setup including one-click access to most used services: check your messages in a single view, manage your notification methods, configure settings for voice message management.


STIR/
SHAKEN

Proprietary
Dynamic DB

Threat
Radar

Custom
Rules

Voice
CAPTCHA
A Firewall for your Voice Traffic
5 Layers of Protection
The multi-layered voice traffic firewall, aka Mutare Voice Traffic Filter, eliminates nefarious and nuisance calls at the network edge.
Protect your people, customers and your entire organization from cyber criminals exploiting your phone system. Our dashboard displays your personal setup including one-click access to most used services: check your messages in a single view, manage your notification methods, configure settings for voice message management.


3 Key Benefits of Mutare Voice Traffic Filter

Reduce Cybersecurity Risk
Reduce Contact Frequency
Reduce Threat Event Frequency
Reduce Primary Loss

Improve Network Reliability
Eliminate Bad Traffic
Reduce TDoS Equivalent Downtime
Optimize Network Tuning

Protect People & Performance
Stop Bad Actors from Making First Contact
Remove Calls that Distract Employees
Lift Workforce Productivity
Feature Snapshots
STIR / SHAKEN
Filter
The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.
Proprietary Dynamic DB Filter
The Mutare Voice Traffic Filter taps into multiple and continuously evolving worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity.
Threat Radar
The Threat Radar filtering layer applies a combination of analytic processes, machine learning, and AI to detect atypical call patterns consistent with nefarious activity and then applies protective actions when warranted.
Voice CAPTCHA Verification
Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA.
Custom Rules
Filter
Custom Rules is an organization-specific blocklist and allow list builder that adds a customized set of call handling and filtering actions for matching calls, both inbound and outbound.
Inbound/Outbound Traffic Manager
Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring.
Personal Blocklist
Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, etc.) and block those calls before they ever ring through.
Admin Dashboard
Provides a graphical overview of voice traffic activity and filtering actions over a specific date range for both inbound and outbound calls.
Admin Email Reports & Alerts
Admins can choose recipients, types, and email delivery time for reports and/or alerts generated by Voice Traffic Filter activity.
Embedded CDR Reporting
Review a detailed, filterable record of call data from a single page.
Data Logging
Built-in telemetry security tool automatically extracts, formats, and delivers logged voice channel data to the organization’s network security platform (e.g. SIEM).
Features Review
STIR / SHAKEN Filter
The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.

Through this section in the Control Panel, administrators can select call handling actions based on the telephone number verification provided via the verstat URI parameter in the call SIP headers
Proprietary Dynamic DB Filter
Mutare’s Voice Traffic Filter’s proprietary dynamic database is a continuously-evolving hard line of defense against known spam, scam, and vishing attack campaigns. It taps into multiple worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity and then assures those calls never make it into the organization’s voice network.

Threat Radar
Threat Radar consists of three distinct call surge detection systems designed to recognize call patterns consistent with a potential spam storm or spoof attack. Threat Radar applies a combination of analytic processes, machine learning, and AI to detect and, when warranted, deflect these disrupting or potentially malicious calls based on specific behaviors and number patterns that are outside of the organization’s normal voice traffic activity.

Administrators can set their own Threat Radar configurations or simply choose to apply recommended system default settings.
Voice CAPTCHA Verification
Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. The system prompts the caller to input a random set of digits before passing the call through, effectively separating bots from humans.

Administrators can determine how many digits the CAPTCHA requires and how many seconds and tries the caller is allowed before the test is treated as a fail.
Custom Rules Filter
Custom Rules is an organization-specific blocklist and allowlist builder that adds a customized set of filtering and call handling rules for specified numbers/number types. Rules can be built around a combination of Caller and Called party IDs or CNAM and applied to both incoming and outgoing calls.

The Custom Rules Filter displays the call Direction (Inbound, Outbound), the Rule Type (Number or CNAM), the From and To numbers, partial numbers or CNAM that have been included, a description and date entered, a count of matching call Activity, as well as the action that will be applied to each.
Inbound/Outbound Traffic Manager
Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring.

Hover over any bar to display specific number of wanted/unwanted calls represented.
Personal Blocklist
Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, or any other caller that is an unwanted intrusion on their business phones) and block those calls before they ever ring through.

The Blocked Callers section displays details including when blocked calls were created and, going forward, a count of call attempts to your number from the blocked caller.
Admin Dashboard
The Traffic Filter Dashboard provides a graphical overview of activity and actions over a specified date range. Dashboard data can be displayed for Inbound calls or Outbound calls by selecting from the call direction dropdown.

From the graphical dashboard, admins can see a general overview of their organization’s activity. Data includes a graph displaying daily/hourly tallies of calls broken down by Unwanted and Wanted calls.
Admin Email Reports & Alerts
Admins can choose recipients, types, and email delivery time for reports and/or alerts generated by Voice Traffic Filter activity.

Each alert or notification type can be enabled or disabled individually, and multiple individuals can be assigned to receive specific reports.
Embedded CDR Reporting (Call Detail Records)
Review a log of all calls identified by Call ID, Call Time, Caller ID, CNAM (Caller Name), Called Number, Action, Reason, Dynamic Database filter results, Filter Mode at time of processing, CAPTCHA results, and STIR/SHAKEN analysis results.

Click on the More Filters button to reveal filter options where you can set a date range and filter by action as well as by Type. Data can be exported as a CSV or JSON file.
Data Logging
Built-in telemetry security tool automatically extracts, formats, and delivers logged voice channel data to the organization’s network security platform (e.g. SIEM).

Extracted data set can be correlated with other network activity datapoints for enhanced visibility into network security vulnerabilities and emerging threats.
Voice Traffic Filter News
Seasonal Grinch Cake
"It's because I'm green, isn't it?” "Holiday Hooby Whatty?" If you're looking for a last-minute baked good this holiday, treat your family, friends or coworkers with this delightful cake. Each slice ensures your baked good comes from the heart. Simply starting with a...
Voice Security: is Multi-Factor Authentication (MFA) the Answer?
Recent High-Profile Voice-Based Cyberattacks have increased attention on defending Voice as a Threat Vector. Many Cybersecurity Experts have turned to MFA as the answer. Is this the correct cyber protection strategy?
MGM, Caesars Lawsuits Elevate Critical Need for “Reasonable” Voice Channel Cyber Defense
Successful cyber-attacks on data-rich organizations like MGM continue to escalate at an alarming pace. So, too, is the frequency and price tag related to….