At AVOXI, we take your privacy and security seriously; here is a summary of some measures and tools that we use to prevent, contain and eradicate Toll-Fraud. Use the below links to skip directly to a section for further information:
Toll-fraud or IRSF (international revenue-sharing fraud) is an illegal activity in which fraudsters produce a high volume of international calls on premium routes, generating increased income produced by this activity.
AVOXI has implemented rigorous information security controls and practices to protect the privacy, security, availability, and integrity of data, to guarantee the trust and safety of our clients.
Our AVOXI Genius product uses WebRTC as its framework. Unlike other VoIP technologies, encryption is mandatory in WebRTC. All data exchanged between your web browser and our servers are encrypted with the Transport Layer Security (TLS) and Secure Real-Time Protocol (SRTP). SRTP encrypts the session so that no one can decode the message without the proper encryption keys.
DenyList is an AVOXI Genius tool that allows you to control the outgoing flow of your calls by blocking premium route destinations that are not within your business objective. With just one click you can deny or allow calls to any destination. For more information about how to block inbound and outbound traffic, please read our user guide.
Access your Call Detail Records (CDR) and call center analytics at any time, anywhere. AVOXI Genius provides 24/7 365 access to your call details and analytics that help you determine the normal activity of your business.
Your account in AVOXI Genius utilizes credit limits not a sign of mistrust; they are the last defense line in a fraud situation. They use dynamic authorizations that calculate the use and remaining balance of your account. Credit limits also contain warning thresholds, which will notify you via email when your account has reached 80, 85, 90, 95, and 98% of total consumption.
AVOXI invests people and technology resources to identify, prevent, repress, and mitigate toll fraud. Our systems identify attack patterns via proprietary traffic analysis algorithms. Customer calls' behavior is subjected to different analyses to identify suspicious activity. We have an automated alert system that detects unusual telephone activity, and these incidents are subjected to investigation and verification by our fraud control team.
AVOXI does not store your credit card details, we use a Payment Card Industry (PCI) compliant payment processor that stores credit card details (or other payment information) and issues a token instead. A token does not contain actual credit card details but serves as the card identifier for the payment processor. AVOXI Genius stores this token and sends it to the payment processor when an end-user pays for an online service. Based on the token, the payment processor retrieves the required payment data and then completes the transaction.
The management of control and audit procedures can be time-consuming, especially when you must ask your service provider for the system logs to know who and when the changes were implemented. With AVOXI Genius® Auditing, you have control over which modified settings, when changed them, and by whom, everything from your administration panel.