There is an open doorway
in your cyber defense strategy.

The Doorway is your Voice Network.

Mutare Voice Traffic Filter

There is an open doorway in your cyber defense strategy.

The Doorway is your Voice Network.

The Mutare Voice Traffic Filter purifies voice network traffic by removing unwanted calls at the network edge.

Robocalls  –  Spoof Calls  –  Spam Calls  –  Direct Nefarious Calls  –  Vishing  –  Smishing

A Firewall for your Voice Traffic

5 Layers of Protection

The multi-layered voice traffic firewall, aka Mutare Voice Traffic Filter, eliminates nefarious and nuisance calls at the network edge.

Protect your people, customers and your entire organization from cyber criminals exploiting your phone system. Our dashboard displays your personal setup including one-click access to most used services: check your messages in a single view, manage your notification methods, configure settings for voice message management.

Mutare Voice Traffic Filter Shut the Door

STIR/
SHAKEN

Proprietary
Dynamic DB

Threat
Radar

Custom
Rules

Voice
CAPTCHA

Mutare Voice Traffic Filter Layer 1
Mutare Voice Traffic Filter Layer 2
Mutare Voice Traffic Filter Layer 3
Mutare Voice Traffic Filter Layer 4
Mutare Voice Traffic Filter Layer 5

A Firewall for your Voice Traffic

5 Layers of Protection

The multi-layered voice traffic firewall, aka Mutare Voice Traffic Filter, eliminates nefarious and nuisance calls at the network edge.

Protect your people, customers and your entire organization from cyber criminals exploiting your phone system. Our dashboard displays your personal setup including one-click access to most used services: check your messages in a single view, manage your notification methods, configure settings for voice message management.

Mutare Voice Traffic Filter 5 Layer Protection
Mutare Voice Traffic Filter Shut the Door

3 Key Benefits of Mutare Voice Traffic Filter

Reduce Cybersecurity Risk

Reduce Cybersecurity Risk

Reduce Contact Frequency
Reduce Threat Event Frequency
Reduce Primary Loss

Improve Network Reliability

Improve Network Reliability

Eliminate Bad Traffic
Reduce TDoS Equivalent Downtime
Optimize Network Tuning

Protect People

Protect People & Performance

Stop Bad Actors from Making First Contact
Remove Calls that Distract Employees
Lift Workforce Productivity

This assessment brings together qualitative insights and information, and quantitative data and metrics which have been sourced from reputable industry institutions, Mutare’s proprietary research, Mutare’s proprietary dynamic database of unwanted voice traffic, and from you, our client.

We have done our best to assemble and consolidate meaningful, relevant information to help you and your organization understand unwanted voice traffic:

First, to provide visibility & insight into your voice infrastructure.

Specifically, through this assessment you will get the facts about the traffic traversing your voice network. We begin with the highest level of segmentation of Wanted Calls (good traffic) and Unwanted Calls (bad traffic).

First, to provide visibility & insight into your voice infrastructure.

Specifically, through this assessment you will get the facts about the traffic traversing your voice network. We begin with the highest level of segmentation of Wanted Calls (good traffic) and Unwanted Calls (bad traffic).

Second, to provide clarity & perspective on the impact of Unwanted Calls.

As we delve into understanding voice traffic, we believe in a pragmatic, business-centric approach. Our intent is to present you with the facts and then help you view those facts from multiple perspectives, or lenses.

Second, to provide clarity & perspective on the impact of Unwanted Calls.

As we delve into understanding voice traffic, we believe in a pragmatic, business-centric approach. Our intent is to present you with the facts and then help you view those facts from multiple perspectives, or lenses.

Feature Snapshots

STIR / SHAKEN
Filter

The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.

Proprietary Dynamic DB Filter

The Mutare Voice Traffic Filter taps into multiple and continuously evolving worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity.

Threat Radar

The Threat Radar filtering layer applies a combination of analytic processes, machine learning, and AI to detect atypical call patterns consistent with nefarious activity and then applies protective actions when warranted.

Voice CAPTCHA Verification

Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. 

Custom Rules
Filter

Custom Rules is an organization-specific blocklist and allow list builder that adds a customized set of call handling and filtering actions for matching calls, both inbound and outbound.

Inbound/Outbound Traffic Manager

Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring. 

Personal Blocklist

Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, etc.) and block those calls before they ever ring through.

Admin Dashboard

Provides a graphical overview of voice traffic activity and filtering actions over a specific date range for both inbound and outbound calls.

Admin Email Reports & Alerts

Admins can choose recipients, types, and email delivery time for reports and/or alerts generated by Voice Traffic Filter activity.

Embedded CDR Reporting

Review a detailed, filterable record of call data from a single page.

Data Logging

Built-in telemetry security tool automatically extracts, formats, and delivers logged voice channel data to the organization’s network security platform (e.g. SIEM).

Features Review

STIR / SHAKEN Filter

The Mutare Voice Traffic Filter spam detection algorithm includes integration and analysis of additional data provided by STIR/SHAKEN caller attestation protocols.

STIR/SHAKEN Filter

Through this section in the Control Panel, administrators can select call handling actions based on the telephone number verification provided via the verstat URI parameter in the call SIP headers

Proprietary Dynamic DB Filter

Mutare’s Voice Traffic Filter’s proprietary dynamic database is a continuously-evolving hard line of defense against known spam, scam, and vishing attack campaigns. It taps into multiple worldwide resources dedicated to tracking and verifying tens of millions of numbers related to nuisance and nefarious call activity and then assures those calls never make it into the organization’s voice network.

Proprietary Dynamic DB Filter

Threat Radar 

Threat Radar consists of three distinct call surge detection systems designed to recognize call patterns consistent with a potential spam storm or spoof attack. Threat Radar applies a combination of analytic processes, machine learning, and AI to detect and, when warranted, deflect these disrupting or potentially malicious calls based on specific behaviors and number patterns that are outside of the organization’s normal voice traffic activity.

Spoof Radar Filter

Administrators can set their own Threat Radar configurations or simply choose to apply recommended system default settings.

Voice CAPTCHA Verification

Designed to “do no harm,” the Voice Traffic Filter includes the ability to route all calls or those flagged as suspect through a voice CAPTCHA. The system prompts the caller to input a random set of digits before passing the call through, effectively separating bots from humans.

Voice CAPTCHA Verification

Administrators can determine how many digits the CAPTCHA requires and how many seconds and tries the caller is allowed before the test is treated as a fail.

Custom Rules Filter

Custom Rules is an organization-specific blocklist and allowlist builder that adds a customized set of filtering and call handling rules for specified numbers/number types. Rules can be built around a combination of Caller and Called party IDs or CNAM and applied to both incoming and outgoing calls.

Custom Rules Filter

The Custom Rules Filter displays the call Direction (Inbound, Outbound), the Rule Type (Number or CNAM),  the From and To numbers, partial numbers or CNAM that have been included, a description and date entered, a count of matching call Activity, as well as the action that will be applied to each.

Inbound/Outbound Traffic Manager

Admins can change the dashboard view to display either inbound or outbound call activity for more targeted monitoring.

Inbound/Outbound Traffic Manager

Hover over any bar to display specific number of wanted/unwanted calls represented.

Personal Blocklist

Gives users the power to flag phone numbers from nuisance callers (robocalls, solicitors, spam calls, or any other caller that is an unwanted intrusion on their business phones) and block those calls before they ever ring through.

The Blocked Callers section displays details including when blocked calls were created and, going forward, a count of call attempts to your number from the blocked caller.

Admin Dashboard

The Traffic Filter Dashboard provides a graphical overview of activity and actions over a specified date range. Dashboard data can be displayed for Inbound calls or Outbound calls by selecting from the call direction dropdown. 

From the graphical dashboard, admins can see a general overview of their organization’s activity. Data includes a graph displaying daily/hourly tallies of calls broken down by Unwanted and Wanted calls.

Admin Email Reports & Alerts

Admins can choose recipients, types, and email delivery time for reports and/or alerts generated by Voice Traffic Filter activity.  

Each alert or notification type can be enabled or disabled individually, and multiple individuals can be assigned to receive specific reports.

Embedded CDR Reporting (Call Detail Records)

Review a log of all calls identified by Call ID, Call Time, Caller ID, CNAM (Caller Name), Called Number, Action, Reason, Dynamic Database filter results, Filter Mode at time of processing, CAPTCHA results, and STIR/SHAKEN analysis results.

Click on the More Filters button to reveal filter options where you can set a date range and filter by action as well as by Type. Data can be exported as a CSV or JSON file.

Data Logging

Built-in telemetry security tool automatically extracts, formats, and delivers logged voice channel data to the organization’s network security platform (e.g. SIEM). 

Extracted data set can be correlated with other network activity datapoints for enhanced visibility into network security vulnerabilities and emerging threats.

Voice Traffic Filter News

Would you like to connect with an expert?

Complete this short web form and one of our Team Members will reach out!