PROTECT & OPTIMIZE THE VOICE CHANNEL

There is an open doorway in your cyber defense strategy.

The Doorway is your Voice Channel.

The Problem

The business telephone (Voice), by its very nature, is an open conduit to connect people in an immediate and direct manner. These inherent properties coupled with a typically limited defense posture have attracted cybercriminals to target the Voice Channel with increasingly sophisticated attacks.

The Solution

Mutare’s Voice Traffic Filter

Enterprise-class software built to provide multiple layers of protection against unwanted traffic. We create a barrier at the network edge, ensuring that malicious and nefarious traffic does not gain access to your network.

Comprehensive Voice Security

Our Voice Traffic Filter is the most comprehensive enterprise solution on the market for removing unwanted calls. Last year, we earned several top industry awards for Communication Fraud Protection, Breach Protection, Anti-Vishing, Breach / Attack Protection and more.

Layer 1: STIR/SHAKEN

Analyzes STIR/SHAKEN attestation scores in call data for evidence of suspected call spoofing.

Layer 2: Proprietary Dynamic DB

Integrates data from worldwide resources to identify known spam, scam, spoofing and robocalls.

Layer 3: Threat Radar

Applies a set of analytic processes to detect atypical call patterns consistent with nefarious activity.

Layer 4: Custom Rules

Creates organization-specific custom rules directing filtering actions for matching calls.

Layer 5: Voice CAPTCHA

Extra layer of vetting that challenges callers to enter random digits before call is complete.

Multi-Layered Protection

A rapidly evolving threat landscape demands a layered approach to protection and defense.

Take Control of your Voice Security…

Feature Snapshots

STIR / SHAKEN
Filter

The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.

Proprietary Dynamic DB Filter

The Mutare Voice Traffic Filter taps into multiple and continuously evolving worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity.

Threat Radar

The Threat Radar filtering layer applies a combination of analytic processes, machine learning, and AI to detect atypical call patterns consistent with nefarious activity and then applies protective actions when warranted.

Voice CAPTCHA Verification

Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. 

Custom Rules
Filter

Custom Rules is an organization-specific blocklist and allow list builder that adds a customized set of call handling and filtering actions for matching calls, both inbound and outbound.

Inbound/Outbound Traffic Manager

Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring. 

Personal Blocklist

Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, etc.) and block those calls before they ever ring through.

Admin Dashboard

Provides a graphical overview of voice traffic activity and filtering actions over a specific date range for both inbound and outbound calls.

Admin Email Reports & Alerts

Admins can choose recipients, types, and email delivery time for reports and/or alerts generated by Voice Traffic Filter activity.

Embedded CDR Reporting

Review a detailed, filterable record of call data from a single page.

Security Logging

Built-in telemetry security tool automatically extracts, formats, and delivers logged voice channel data to the organization’s network security platform (e.g. SIEM).

Features Review

STIR / SHAKEN Filter

The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.

STIR/SHAKEN Filter

Through this section in the Control Panel, administrators can select call handling actions based on the telephone number verification provided via the verstat URI parameter in the call SIP headers

Proprietary Dynamic DB Filter

Mutare’s Voice Traffic Filter’s proprietary dynamic database is a continuously-evolving hard line of defense against known spam, scam, and vishing attack campaigns. It taps into multiple worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity and then assures those calls never make it into the organization’s voice network.

Proprietary Dynamic DB Filter

Threat Radar 

Threat Radar consists of three distinct call surge detection systems designed to recognize call patterns consistent with a potential spam storm or spoof attack. Threat Radar applies a combination of analytic processes, machine learning, and AI to detect and, when warranted, deflect these disrupting or potentially malicious calls based on specific behaviors and number patterns that are outside of the organization’s normal voice traffic activity.

Spoof Radar Filter

Administrators can set their own Threat Radar configurations or simply choose to apply recommended system default settings.

Voice CAPTCHA Verification

Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. The system prompts the caller to input a random set of digits before passing the call through, effectively separating bots from humans.

Voice CAPTCHA Verification

Administrators can determine how many digits the CAPTCHA requires and how many seconds and tries the caller is allowed before the test is treated as a fail.

Custom Rules Filter

Custom Rules is an organization-specific blocklist and allowlist builder that adds a customized set of filtering and call handling rules for specified numbers/number types. Rules can be built around a combination of Caller and Called party IDs or CNAM and applied to both incoming and outgoing calls.

Custom Rules Filter

The Custom Rules Filter displays the call Direction (Inbound, Outbound), the Rule Type (Number or CNAM),  the From and To numbers, partial numbers or CNAM that have been included, a description and date entered, a count of matching call Activity, as well as the action that will be applied to each.

Inbound/Outbound Traffic Manager

Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring.

Inbound/Outbound Traffic Manager

Hover over any bar to display specific number of wanted/unwanted calls represented.

Personal Blocklist

Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, or any other caller that is an unwanted intrusion on their business phones) and block those calls before they ever ring through.

The Blocked Callers section displays details including when blocked calls were created and, going forward, a count of call attempts to your number from the blocked caller.

Admin Dashboard

The Traffic Filter Dashboard provides a graphical overview of activity and actions over a specified date range. Dashboard data can be displayed for Inbound calls or Outbound calls by selecting from the call direction dropdown. 

From the graphical dashboard, admins can see a general overview of their organization’s activity. Data includes a graph displaying daily/hourly tallies of calls broken down by Unwanted and Wanted calls.

Admin Email Reports & Alerts

Admins can choose recipients, types, and email delivery time for reports and/or alerts generated by Voice Traffic Filter activity.  

Each alert or notification type can be enabled or disabled individually, and multiple individuals can be assigned to receive specific reports.

Embedded CDR Reporting (Call Detail Records)

Review a log of all calls identified by Call ID, Call Time, Caller ID, CNAM (Caller Name), Called Number, Action, Reason, Dynamic Database filter results, Filter Mode at time of processing, CAPTCHA results, and STIR/SHAKEN analysis results.

Click on the More Filters button to reveal filter options where you can set a date range and filter by action as well as by Type. Data can be exported as a CSV or JSON file.

Security Logging

Built-in telemetry security tool automatically extracts, formats, and delivers logged voice channel data to the organization’s network security platform (e.g. SIEM). 

Extracted data set can be correlated with other network activity datapoints for enhanced visibility into network security vulnerabilities and emerging threats.

Voice Traffic Filter News

What is Vishing in 2024?

What is Vishing in 2024?

What is Vishing in 2024?A cyber threat made incredibly worse with the help of Generative AI, and the lack of acknowledgement of a very real threat vector.EXECUTIVE SUMMARY Successful cyber-attacks on data-rich organizations like MGM continue to escalate at an alarming...

Would you like to connect with an expert?

Complete this short web form and one of our Team Members will reach out!