saved every month
fraudulent calls blocked
attacks prevented every day
With automatic detection of the telecom fraud attack with immediate alerting and granular blocking.
That discover even well disguised attacks on retail and transit traffic and detect sophisticated fraud patterns.
With individually adjustable alerting & blocking policies and configurable high usage rules.
With fast out-of-the-box deployment and no CDR uploads, capital expenses or complicated procedures.
Any voice switch is compatible. Besides SIP signaling, the system is capable to analyze SS7 and Accounting messages.
We automatically block fraudulent calls in real time before the damage is done and prevent financial losses.
You can fine tune the system in accordance with your needs and either block the calls or just receive fraud alerts.
Receive detailed reports in accordance with custom settings on hourly or daily basis + notifications about rule changes to your email.
Setup the system one time and it will block fraudulent calls without the need to review each case.
Enable automated call blocking and turn off email alerts so that you don’t need to check your mailbox for fraud alerts every hour.
Wangiri 2.0 is a new type of fraud that is unknown to most anti-fraud systems.
Fraudsters exploit voice services rendered to enterprises & brands by telcos. Internet bots fill in contact & sign-up forms with high cost phone numbers and wait for the company to dial these numbers. As a result the company uses voice services priced at exorbitant rates and loses money while the fraudster gains profit.
Our FMS with machine learning algorithms can detect suspicious deviations & patterns in voice traffic. In late 2018 FMS alerted us about suspicious activity: we examined and analyzed the traffic marked by the system and were the first to discover a new type of fraud – Wangiri 2.0 – and develop protection against it.
If you are looking for a fraud management system that is capable of detecting new unknown fraud schemes and protecting you from them, then our FMS is the way to go.
Use our advanced anti-fraud suite to detect suspicious activity within your network and stop fraud before it happens
Dashboard with all statistics and analytics on active blockages, last events as well as top fraudulent destinations and top fraudulent A & B ranges & numbers active, blockages can be unblocked by one click.
With customization tool you will be able to create individual usage-based rules for every country and make necessary adjustments, fine-tuning every rule to comply with your specific needs.
Fraudster uses autodialers to make many zero-duration calls, mainly to mobile devices, leaving a missed call from premium rate number, in hope that a victim will call back.
Fraudster obtains access to an account of a conference service application and uses it to generate calls to premium rate numbers.
Fraudster uses bots or scripts to fill out the company's on-line form and, therefore, to initiate calls from the company to premium rate numbers.
Fraudster gains access to a business's phone system and generates profit from international calls, at a victim's expense.
All other scenarios of International Revenue Share Fraud, which include generation of well-disguised artificial traffic.
All the types of unsolicited calls for subscribers, including robocalls, call bombing, and silent calls, which have telemarketing or scam purposes.
With automatic detection of the fraud attack with immediate alerting and granular blocking
That discover even well disguised attacks on retail and transit traffic and detect sophisticated fraud patterns
Identifying the parameters of the fraud attack
Protect your networks from telecom fraud, increase revenues and prevent significant fraud-related financial losses and customer churn
Avoid disputes and non-payments, prevent reputational losses and reduce revenue leakage caused by suspicious fraudulent traffic
Protect your businesses from Wangiri 2.0, PBX hackings, calls to premium rate numbers and other types of voice fraud
Prevent dishonest use of your PBX and collateral damage caused by fraud attacks