
Eliminate Unwanted Voice Traffic
Mutare Voice Traffic Filter for Webex eliminates unwanted calls at the network edge.
Spoof Calls
Vishing
Robocalls
Voice Spam
The Mutare Voice Traffic Filter purifies voice network traffic by removing unwanted calls at the network edge.
Robocalls – Spoof Calls – Spam Calls – Direct Nefarious Calls – Vishing – Smishing
A Firewall for your Voice Traffic
5 Layers of Protection
The multi-layered voice traffic firewall, aka Mutare Voice Traffic Filter, eliminates nefarious and nuisance calls at the network edge.
Protect your people, customers and your entire organization from cyber criminals exploiting your phone system. Our dashboard displays your personal setup including one-click access to most used services: check your messages in a single view, manage your notification methods, configure settings for voice message management.


STIR/
SHAKEN

Proprietary
Dynamic DB

Threat
Radar

Custom
Rules

Voice
CAPTCHA
A Firewall for your Voice Traffic
5 Layers of Protection
The multi-layered voice traffic firewall, aka Mutare Voice Traffic Filter, eliminates nefarious and nuisance calls at the network edge.
Protect your people, customers and your entire organization from cyber criminals exploiting your phone system. Our dashboard displays your personal setup including one-click access to most used services: check your messages in a single view, manage your notification methods, configure settings for voice message management.


3 Key Benefits of Mutare Voice Traffic Filter

Reduce Cybersecurity Risk
Reduce Contact Frequency
Reduce Threat Event Frequency
Reduce Primary Loss

Improve Network Reliability
Eliminate Bad Traffic
Reduce TDoS Equivalent Downtime
Optimize Network Tuning

Protect People & Performance
Stop Bad Actors from Making First Contact
Remove Calls that Distract Employees
Lift Workforce Productivity
Feature Snapshots
STIR / SHAKEN
Filter
The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.
Proprietary Dynamic DB Filter
The Mutare Voice Traffic Filter taps into multiple and continuously evolving worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity.
Threat Radar
The Threat Radar filtering layer applies a combination of analytic processes, machine learning, and AI to detect atypical call patterns consistent with nefarious activity and then applies protective actions when warranted.
Voice CAPTCHA Verification
Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA.
Custom Rules
Filter
Custom Rules is an organization-specific blocklist and allow list builder that adds a customized set of call handling and filtering actions for matching calls, both inbound and outbound.
Inbound/Outbound Traffic Manager
Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring.
Personal Blocklist
Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, etc.) and block those calls before they ever ring through.
Admin Dashboard
Provides a graphical overview of voice traffic activity and filtering actions over a specific date range for both inbound and outbound calls.
Admin Email Alerts
Admins can receive a daily summary of filter activity in one, streamlined email report including counts of wanted/ unwanted calls, CAPTCHA failures/passes and top unwanted callers.
Embedded CDR Reporting
Review a log of all calls identified by Call ID, Call Time, Caller ID, CNAM, Called Number, Action, Reason, External Spam Filter Service results, and more.
Features Review
STIR / SHAKEN Filter
The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.

Through this section in the Control Panel, administrators can select call handling actions based on the telephone number verification provided via the verstat URI parameter in the call SIP headers
Proprietary Dynamic DB Filter
Mutare’s Voice Traffic Filter’s proprietary dynamic database is a continuously-evolving hard line of defense against known spam, scam, and vishing attack campaigns. It taps into multiple worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity and then assures those calls never make it into the organization’s voice network.

Threat Radar
Threat Radar consists of three distinct call surge detection systems designed to recognize call patterns consistent with a potential spam storm or spoof attack. Threat Radar applies a combination of analytic processes, machine learning, and AI to detect and, when warranted, deflect these disrupting or potentially malicious calls based on specific behaviors and number patterns that are outside of the organization’s normal voice traffic activity.

Add an email address or addresses for email alerts when the system detects a potential influx of spoofed calls (spoof storm).
Voice CAPTCHA Verification
Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. The system prompts the caller to input a random set of digits before passing the call through, effectively separating bots from humans.

Administrators can determine how many digits the CAPTCHA requires and how many seconds and tries the caller is allowed before the test is treated as a fail.
Custom Rules Filter
Custom Rules is an organization-specific blocklist and allowlist builder that adds a customized set of filtering and call handling rules for specified numbers/number types. Rules can be built around a combination of Caller and Called party IDs or CNAM and applied to both incoming and outgoing calls.

The Rules Filter displays the call Direction (Inbound, Outbound), the Rule Type (Number or CNAM, the Rule Type (Number or CNAM), the From and To numbers, partial numbers or CNAM that have been included, a description and date entered, as well as the action that will be applied to each.
Inbound/Outbound Traffic Manager
Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring.

Hover over any bar to display specific number of wanted/unwanted calls represented.
Personal Blocklist
Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, or any other caller that is an unwanted intrusion on their business phones) and block those calls before they ever ring through.

The Blocked Callers section displays details including when blocked calls were created and, going forward, a count of call attempts to your number from the blocked caller.
Admin Dashboard
The Traffic Filter Dashboard provides a graphical overview of activity and actions over a specified date range. Dashboard data can be displayed for Inbound calls or Outbound calls by selecting from the call direction dropdown.

From the graphical dashboard, admins can see a general overview of their organization’s activity. Data includes a graph displaying daily/hourly tallies of calls broken down by Unwanted and Wanted calls.
Admin Email Alerts
Admins can receive a daily summary of filter activity in one, streamlined email report. Pick the time and addresses for summary delivery

Emailed reports can include counts of wanted/unwanted calls, CAPTCHA failures/passes and top unwanted callers.
Embedded CDR Reporting (Call Detail Records)
Review a log of all calls identified by Call ID, Call Time, Caller ID, CNAM (Caller Name), Called Number, Action, Reason, External Spam Filter Service results, Filter Mode at time of processing, CAPTCHA results, and STIR/SHAKEN analysis results.

Click on the More Filters button to reveal filter options where you can set a date range and filter by action as well as by Type.
Voice Traffic Filter News
New Release: Mutare Voice Traffic Filter April 2023 3.6
We are proud to unveil our new release with data logging for security systems integration, control panel redesign and most attacked numbers added to the dashboard
What is Vishing?
What is Vishing? Background, Definitions, High Profile Attacks & How to Protect the EnterpriseVoice Phishing (Vishing) is an escalating attack vector that highlights the dire need for awareness and protection for our most critical communication channel, the...
A Vishing Attack is Coming Your Way
Who would have guessed that, in 2022, the humble phone would emerge as the weapon of choice for sophisticated cybercriminals through Vishing?