Voice Firewall

Voice Firewall

Voice Firewall - Real-Time Protection. Carrier-Grade Intelligence.

Our Voice Firewall (VFW) is a state-of-the-art carrier-grade solution designed to actively prevent unauthorized and fraudulent voice traffic at the Core network level. Unlike traditional post-event detection systems, our VFW solution operates in real time, analyzing each voice call during the setup phase and applying dynamic call handling to block or manage suspicious traffic before it connects.

Why Our Voice Firewall Stands Out

We stand among the proud pioneers of Real-Time Voice Firewall solutions in the industry. Our pilot commercial Voice Firewall was deployed in 2012 and has grown to protect 600+ million subscribers across Europe, Euro-Asia, South Asia, and LATAM.

Key Benefits for Operators

  • Streamlined Integration with MNO network
  • Multiple smart ways of call handling beyond blocking
  • Improved User Experience (UX)
  • Security compliance
  • Regulatory compliance
  • Full compliance with GSMA and One Consortium standards
  • Compatible with STIR/SHAKEN,GSMA CALL CHECK
  • Machine Learning logic that adapts to emerging fraud patterns.

Supported Use Cases and Threat Scenarios

CLI Spoofing
  • Termination of calls using spoofed/forged CLIs to hide and falsify the caller’s identity. Often used for impersonation and social engineering attacks.
Interconnect Bypass
  • Calls originating from region with higher termination rate (e.g. international) masked as calls from region with lower termination rate (e.g. national call).
SIMBOX
  • SIM boxes use multiple low-cost prepaid or even unpaid SIM cards to route international calls through VoIP network into mobile operator network as local calls bypassing mobile termination charges.
Vishing
  • Fraudulent use of voice calls to trick victims into revealing sensitive or personal information to gain financial benefits like bank account hacking, account takeover, etc. This involves use of CLI spoofing, impersonation on behalf of governments and commercial organizations like banks, call centers, or financial institutions, to perform information harvesting and Social Engineering attacks.
Wangiri
  • High volume of missed calls generated to subscribers from high-risk premium destinations. When subscribers return the calls, they incur high charges, generating interconnect revenue fort he fraudsters.
IRSF (International Revenue Share Fraud)
  • Artificially inflate traffic by attackers generating calls to premium rate destinations without paying for them. This generally includes Wangiri schemes, PBX hacking, and user equipment hacking schemes.

Evolution to Additional Use Cases

Unlike our competitors, our Voice Firewall supports seamless upgrade to advanced services such as:

  • Call Validation
  • Branded Calling
  • 5G SEPP