There are 2 methods in getting Defender protecting your call traffic.
SIP Proxy
Incorporating the Defender SIP Proxy into your call flow will result in a response that will dictate your subsequent actions. These actions may include permitting the traffic to traverse your network, terminating the call, redirecting it to a secure black hole destination, or routing it through an alternative path for more thorough security assessment.
Defender API
During the call setup process, engage with the Defender REST API by transmitting call data according to the instructions outlined in our API documentation. This interaction will result in a response that corresponds to your settings within the Defender portal. In instances where we detect any signs of fraudulent activity, relevant information will be included in the API response.
No, at no time does Defender require access to call media.
As we do not receive any of your media, there are no GDPR concerns or any risk for customer data.
A typical lookup will take less than 10ms to execute and respond.
Our solution is built with a zero-trust in mind, secret keys are rotated constantly. Any access to data is logged for audit purposes and can be provided on request.
Defender can handle thousands of call setups per second.
Our Cloud solution is automatically horizontally scalable, growing as demand increases. Our On-Premises model can be deployed within days of the contracts being signed.
We subscribe to various fraud lists, with constant updates. We also have a comprehensive network of honey traps dotted around the globe, fraudsters literally tell us what they are doing so we can act accordingly.
If you are interested in working with us to increase threat intelligence, please get in touch.
Yes we are so confident in our system we offer a no obligation 30 day trial, please contact us for more information