RAID Bypass Fraud

Protect your business from the fraudulent manipulation of call records executed to avoid paying the defined legal charges for products and services

Deploy A Multi-Layered Approach To Grey Routing Traffic

Bypass fraud is the most damaging and costly type of fraud and particularly affects countries where the costs of terminating international calls are very high.
Also known as ‘landing fraud’ or ‘grey routing’, this fraud is carried out through manipulating call records to be recognized as local calls. This fraud type exploits immobile to mobile and landline gateway equipment to hijack inbound international calls while transferring them through Voice over Internet Protocol (VoIP) to the mobile network.

The Pre-Packaged Approach To Fight Against Bypass Fraud

RAID is a pre-packaged solution that allows CSPs to evaluate their network traffic and detect fraudulent behaviors and deviations of subscriber usage.
The solution makes use of a complex rule library combined with machine learning techniques on top of a wide range of data such as CDR information, signaling (SS7 and Diameter) as well test call generator (TCG) analysis to detect bypass fraud.

Can't see the forest for the trees?

Harness the power of your data to connect the dots between strategy, risk and performance.

Get rid of VoIP Bypass Fraud

Making calls requires as many security measures as any web-based software. Although the price of long-distance service through a VoIP provider is significantly cheaper than through PTSN, the cost of added up minutes can cause some damage, especially if they are from fraudulent calls.
WeDo Technologies has developed a solution to detect fraud on VoIP networks, which include smart monitoring features that sense when there is an unusual spike in call traffic from a specific destination. When a suspicious spike occurs, RAID simply and automatically puts a temporary alert on the route, ensuring that fraud losses are keep to an absolute minimum without interrupting legitimate calls.

Choose How You Want Your Bypass App Deployed

Adopt the RAID platform and chose the deployment option that best fits your business needs, budget, and resources.
If your company still doesn’t have a full public cloud policy due to security and compliance issues, WeDo Technologies provides an alternative in private and hybrid cloud models to deploy RAID with its prebuilt risk management modules or apps.
Try the cloud environment for free! Get a free access to RAID.Cloud for fraud management. Just subscribe request a freetrial, load your data, and start monitoring alarms though one of our apps using the ready to go cloud-based server environment ready to go

RAID risk management software, is easy to use and highly configurable

Schedule a meeting with us and see what RAID can do for your business.

All The Necessary Tools Integrated Into One Platform To Handle The Entire Risk Management Lifecycle

Case Management
Drill down on data and alerts with ad-hoc analysis to find the root cause of fraud and make better decisions faster.
Fully configurable
Use easy-to-apply configurations, workflows and dashboards to enable simple and transparent mirroring of your required business processes. Automations and migrations let you execute this in days instead of months
Hybrid Solution
React to and stop known and unknown fraud patterns in a repeatable and auditable way by combining an extensive rules library with machine learning.
All-In-One Software
Manage the teleco fraud management lifecycle autonomously, from data loading to mitigation actions, with RAID’s complete suite of tools for fraud analysts.
Link Analysis
Quickly uncover fraudulent activities by highlighting key individuals, connections and patterns in a unique visual way. Gain a deeper understanding of data within different entity and relationship types, as well as attributes that can help uncover hidden fraud patterns.
Real Time Data Processing
Address the problem of matching continuously income events to evolving patterns like bypass fraud with RAID's complex event processing (CEP).Accelerate fraud detection and react faster to emerging threats with real time data stream analysis.

Enhanced Detection with TCG Results

Despite not working as a silver bullet for byapss fraud detection, TCG data is still a relevant data source element, it delivers unique insights on end-to-end interconnection routes by comparing the incoming calling line identity (CLI) phone number with the known originated phone number.
By combining test call generator (TCG) and signaling information, RAID delivers extra advanced layers of protection against bypass fraud. Working together with advanced data analytics, sophisticated pattern matching, and machine learning algorithms, our FMS delivers a fast and reliable multi-layered solution bypass fraud. .

Are you affected by Mobile Terminations Rates Arbitrage and CLI Spoofing?

Mobile network operators are now able to apply higher termination rates to non-EU incoming traffic. In these situations and when there is a considerable gap between the termination rates, the risk of exposure to Mobile Termination Rate (MTR) Arbitrage is very high and can cause a significant impact to your network.
In order to terminate the calls at lower costs, some carriers that are intende to pay high MTR recreate the traffic in order to pay lower MTR.
RAID provides you with a detailed information of how traffic originating from risky countries, suspicious ranges of numbers and unusual high or continuous low volumes in your network.

Future-Proof Your Fraud Management Strategy By Adopting A Hybrid Technology

Rule Based Approach
An extensive rules library provides immediate fraud awareness and increased accuracy
  • Optimize rules according to your needs
  • Greater accuracy and lower error rate
  • Immediate results
AI/Machine Learning
AI and Machine learning algorithms leverage data analysis processes to detect deviations and unknown fraud patterns
  • Rapid prediction and processing analysis
  • Past customer behaviors evaluation
  • Unlimited traffic analysis
Hybrid Solution
A hybrid approach designed to combine rules with machine learning to detect and predict fraud
  • Early and accurate fraud cases detection
  • High risk deviations identified in real time
  • Outlines new fraud patterns and emerging operating methods

Stop fraudulent activities that take advantage of zero-rating services

RAID provides the tools to detect data charging bypass and eliminates the stream of prepaid customer traffic to proceed without checking the balance, time/volume limits or deduction of funds by redirecting traffic through zero-rated websites such as customer care portals or promotional free services such as social networks traffic.
RAID Bypass Fraud ensures that all user data traffic that is not explicitly intended to be free under agreed operator policy is being measured, classified and stopped in real-time whenever fraud patterns are detected.

Helping Regulators to lead the war against Bypass fraud

In many countries, where international bypass fraud is an issue, the negative effect of it can be negative impacts on financial and customer experience, as well as a decrease in governmental tax revenues arriving from international voice traffic dropping. Specifically for telecom regulators of all over the world, WeDo has developed a solution that is currently in place in operators within the Middle East and Africa that can be set by a country’s regulator itself, or by individual (or groups of) operators (unregulated). This solution not only eliminates fraud and preserves the privacy and quality of service, for both operators and subscribers, but it also brings back the revenue from international call termination to which operators and government regulators are entitled.

How TPx Communications Is Leveraging RAID's For Telecom Fraud Detection

Formed from the merger of TelePacific and DSCI, TPx is redefining the way enterprises grow, compete and communicate.
TPx’s  Unified Communications, Managed IT services, continuity and connectivity solutions all work together to “reach a higher state of connectedness” – with customers, employees, clients, suppliers, locations, applications and more.
When TPx Communications, needed a Fraud Management solution, WeDo delivered.

WeDo Risk Consulting Services

All telcos can benefit from a proactive risk management strategy when rolling out a 5G infrastructure. This means defining key risks, weighing their probability and impact on business drivers and developing your thinking on actions to take. WeDo Technologies can support you in this. Our consultancy experts can undertake risk assessments that go beyond financial and regulatory risk to consider the wider environment in which you deploy 5G services. Additionally our consultancy experts can help you put in place effective monitoring and control tools that give you earlier warnings, and enable you to respond quickly and effectively.
  • Profitability and liquidity
  • Operational excellence
  • Compliance
  • Growth opportunities