Eliminate Unwanted Voice Traffic

Mutare Voice Traffic Filter for Webex eliminates unwanted calls at the network edge.

Spoof Calls

Vishing

Robocalls

Voice Spam

The Mutare Voice Traffic Filter purifies voice network traffic by removing unwanted calls at the network edge.

Robocalls  –  Spoof Calls  –  Spam Calls  –  Direct Nefarious Calls  –  Vishing  –  Smishing

A Firewall for your Voice Traffic

5 Layers of Protection

The multi-layered voice traffic firewall, aka Mutare Voice Traffic Filter, eliminates nefarious and nuisance calls at the network edge.

Protect your people, customers and your entire organization from cyber criminals exploiting your phone system. Our dashboard displays your personal setup including one-click access to most used services: check your messages in a single view, manage your notification methods, configure settings for voice message management.

Mutare Voice Traffic Filter Shut the Door

STIR/
SHAKEN

Proprietary
Dynamic DB

Threat
Radar

Custom
Rules

Voice
CAPTCHA

Mutare Voice Traffic Filter Layer 1
Mutare Voice Traffic Filter Layer 2
Mutare Voice Traffic Filter Layer 3
Mutare Voice Traffic Filter Layer 4
Mutare Voice Traffic Filter Layer 5

A Firewall for your Voice Traffic

5 Layers of Protection

The multi-layered voice traffic firewall, aka Mutare Voice Traffic Filter, eliminates nefarious and nuisance calls at the network edge.

Protect your people, customers and your entire organization from cyber criminals exploiting your phone system. Our dashboard displays your personal setup including one-click access to most used services: check your messages in a single view, manage your notification methods, configure settings for voice message management.

Mutare Voice Traffic Filter 5 Layer Protection
Mutare Voice Traffic Filter Shut the Door

3 Key Benefits of Mutare Voice Traffic Filter

Reduce Cybersecurity Risk

Reduce Cybersecurity Risk

Reduce Contact Frequency
Reduce Threat Event Frequency
Reduce Primary Loss

Improve Network Reliability

Improve Network Reliability

Eliminate Bad Traffic
Reduce TDoS Equivalent Downtime
Optimize Network Tuning

Protect People

Protect People & Performance

Stop Bad Actors from Making First Contact
Remove Calls that Distract Employees
Lift Workforce Productivity

Feature Snapshots

STIR / SHAKEN
Filter

The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.

Proprietary Dynamic DB Filter

The Mutare Voice Traffic Filter taps into multiple and continuously evolving worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity.

Threat Radar

The Threat Radar filtering layer applies a combination of analytic processes, machine learning, and AI to detect atypical call patterns consistent with nefarious activity and then applies protective actions when warranted.

Voice CAPTCHA Verification

Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. 

Custom Rules
Filter

Custom Rules is an organization-specific blocklist and allow list builder that adds a customized set of call handling and filtering actions for matching calls, both inbound and outbound.

Inbound/Outbound Traffic Manager

Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring. 

Personal Blocklist

Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, etc.) and block those calls before they ever ring through.

Admin Dashboard

Provides a graphical overview of voice traffic activity and filtering actions over a specific date range for both inbound and outbound calls.

Admin Email Alerts

Admins can receive a daily summary of filter activity in one, streamlined email report including counts of wanted/ unwanted calls, CAPTCHA failures/passes and top unwanted callers.

Embedded CDR Reporting

Review a log of all calls identified by Call ID, Call Time, Caller ID, CNAM, Called Number, Action, Reason, External Spam Filter Service results, and more.

Features Review

STIR / SHAKEN Filter

The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.

STIR/SHAKEN Filter

Through this section in the Control Panel, administrators can select call handling actions based on the telephone number verification provided via the verstat URI parameter in the call SIP headers

Proprietary Dynamic DB Filter

Mutare’s Voice Traffic Filter’s proprietary dynamic database is a continuously-evolving hard line of defense against known spam, scam, and vishing attack campaigns. It taps into multiple worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity and then assures those calls never make it into the organization’s voice network.

Proprietary Dynamic DB Filter

Threat Radar 

Threat Radar consists of three distinct call surge detection systems designed to recognize call patterns consistent with a potential spam storm or spoof attack. Threat Radar applies a combination of analytic processes, machine learning, and AI to detect and, when warranted, deflect these disrupting or potentially malicious calls based on specific behaviors and number patterns that are outside of the organization’s normal voice traffic activity.

Spoof Radar Filter

Add an email address or addresses for email alerts when the system detects a potential influx of spoofed calls (spoof storm).

Voice CAPTCHA Verification

Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. The system prompts the caller to input a random set of digits before passing the call through, effectively separating bots from humans.

Voice CAPTCHA Verification

Administrators can determine how many digits the CAPTCHA requires and how many seconds and tries the caller is allowed before the test is treated as a fail.

Custom Rules Filter

Custom Rules is an organization-specific blocklist and allowlist builder that adds a customized set of filtering and call handling rules for specified numbers/number types. Rules can be built around a combination of Caller and Called party IDs or CNAM and applied to both incoming and outgoing calls.

Custom Rules Filter

The Rules Filter displays the call Direction (Inbound, Outbound), the Rule Type (Number or CNAM, the Rule Type (Number or CNAM), the From and To numbers, partial numbers or CNAM that have been included, a description and date entered, as well as the action that will be applied to each.

Inbound/Outbound Traffic Manager

Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring.

Inbound/Outbound Traffic Manager

Hover over any bar to display specific number of wanted/unwanted calls represented.

Personal Blocklist

Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, or any other caller that is an unwanted intrusion on their business phones) and block those calls before they ever ring through.

The Blocked Callers section displays details including when blocked calls were created and, going forward, a count of call attempts to your number from the blocked caller.

Admin Dashboard

The Traffic Filter Dashboard provides a graphical overview of activity and actions over a specified date range. Dashboard data can be displayed for Inbound calls or Outbound calls by selecting from the call direction dropdown. 

From the graphical dashboard, admins can see a general overview of their organization’s activity. Data includes a graph displaying daily/hourly tallies of calls broken down by Unwanted and Wanted calls.

Admin Email Alerts

Admins can receive a daily summary of filter activity in one, streamlined email report. Pick the time and addresses for summary delivery

Emailed reports can include counts of wanted/unwanted calls, CAPTCHA failures/passes and top unwanted callers.

Embedded CDR Reporting (Call Detail Records)

Review a log of all calls identified by Call ID, Call Time, Caller ID, CNAM (Caller Name), Called Number, Action, Reason, External Spam Filter Service results, Filter Mode at time of processing, CAPTCHA results, and STIR/SHAKEN analysis results.

Click on the More Filters button to reveal filter options where you can set a date range and filter by action as well as by Type.

Voice Traffic Filter News

What is Vishing?

What is Vishing?

What is Vishing? Background, Definitions, High Profile Attacks & How to Protect the EnterpriseVoice Phishing (Vishing) is an escalating attack vector that highlights the dire need for awareness and protection for our most critical communication channel, the...

A Vishing Attack is Coming Your Way

A Vishing Attack is Coming Your Way

Who would have guessed that, in 2022, the humble phone would emerge as the weapon of choice for sophisticated cybercriminals through Vishing?

Would you like to connect with an expert?

Complete this short web form and one of our Team Members will reach out!