TransNexus, founded in 1997, is a software development company specializing in applications for managing wholesale VoIP networks. TransNexus provides its Operations and Billing Support System (OSS/BSS) software platform to major VoIP carriers worldwide. Important carrier features offered by TransNexus are least cost routing, number portability, fraud detection, profitability analysis and QoS controls.
TransNexus is an active contributor to open source software projects and only offers software products based on open standards. While TransNexus maintains interoperability partnerships with strategic vendors such as Broadsoft, Metaswitch, Oracle Acme Packet and Taqua, the TransNexus solution is interoperable with any SIP based VoIP system. TransNexus is located in Atlanta, GA and is a privately held Delaware C corporation.
- 1 TransNexus solutions
- 2 White papers and resources
- 3 Evolution of VoIP peering
- 4 References
- 5 External links
Telecom fraud management and fraud detection solutions
TransNexus solutions effectively eliminate the problems of traffic pumping fraud, PBX hacking, revenue sharing fraud, blind transfers, and call forwarding fraud for VoIP providers. The solution is to include smart monitoring features that sense when there is an unusual spike in call traffic to a specific destination. When a suspicious spike occurs, the TransNexus system simply and automatically blacklists the route, ensuring that fraud losses are kept to an absolute minimum without interrupting legitimate calls.
TransNexus has developed several fraud detection and prevention solutions that are compatible with Audio Codes, Broadworks, Cisco Call Manager, Metaswitch CFS and Perimeta, Oracle Acme Packet, Sansay, Sonus and Taqua platforms.
NexOSS-FC is a fraud prevention and detection solution that uses SIP Analytics™ to detect fraudulent calling trends before calls are made. The TransNexus NexOSS-FC solution scores each SIP Invite for fraud potential before it enters your network. SIP Analytics™ uses the same techniques as CDR analytics, but is much faster and uses SIP header information, not available in CDRs, for smarter fraud detection with fewer false positives.
SDReporter is a complete fraud detection and call detail record (CDR) reporting and analysis solution. Designed to be simple and efficient, SDReporter is easy to install and provides comprehensive telecom fraud, call completion, and Quality of Service (QoS) reports and alarms. Other fraud detection features include fraud blacklists, fraud scoring, call diversion, and call blocking.
Shield is a comprehensive blacklist containing a combination of premium rate number providers, known international premium rate number ranges, and industry sources. This solution is integrated in NexOSS-FC, NexOSS, and SDReporter.
Telecom Least Cost Routing
Least Cost Routing, or LCR, is a simple practice that finds the most inexpensive way to route phone calls. It is the process of analyzing, selecting and directing the path of outbound and inbound communications traffic, depending on which path delivers the best rates.
TransNexus has developed an industry-leading and innovative least cost routing solution that is compatible with Audio Codes, Broadworks, Cisco Call Manager, Metaswitch CFS and Perimeta, Oracle Acme Packet, Sansay, Sonus and Taqua platforms. It has also been the recipient of the INTERNET TELEPHONY Product of the Year Award for two consecutive years.
The TransNexus NexOSS solution saves VoIP service providers time and money with intelligent routing solutions and offers complete Call Detail Record (CDR) reporting and analysis. The NexOSS VoIP Routing, Operations, and Billing Support System is a suite of integrated back office applications which complement the operation of OSPrey Route Servers. NexOSS provides VoIP operators with an easy to use web interface for provisioning routes, rates, number translation rules and monitoring traffic analysis and billing reports. The TransNexus NexOSS solution also provides fraud detection.
White papers and resources
TransNexus has published a series of white papers and resources covering a variety of topics such as telecom fraud, the telecommunication industry, configuration guides, VoIP peering and settlements, Asterisk, OSP peering protocol, and OpenSIPS, OpenSER, Kamailio, SIP Router & SER.
Introduction to VoIP Fraud: Discusses the types of VoIP fraud and techniques for fighting VoIP fraud
What To Do When Telecom Fraud Occurs: Discusses the financial risk for enterprises, what to do before fraud occurs, and what to do after fraud occurs
Best Practices for VoIP Security: Discusses VoIP fraud vulnerabilities and best practices
VoIP Theft of Service - Protecting Your Network: Discusses the anatomy of International Revenue Sharing Fraud (IRSF), common International Revenue Sharing Fraud scenarios, FCC guidelines for avoiding voice mail fraud, preventing VoIP theft of service, and the future of VoIP theft of service
Hacking Premium Rate Number Schemes: Discusses the background of premium rate numbers and how service providers can protect their network from premium rate number fraud
Telecom Fraud Call Scenarios: Provides an introduction to telecom fraud and discusses traffic pumping schemes, schemes to defraud telecom service providers, and schemes conducted over the telephone
$166,000 Telecom Fraud Case Study: Describes a telecom fraud attack on a seven-person architectural firm of Norcross, Georgia that had four analog telephone lines provided by TW Telecom and were faced with a bill for $166,000 in telephone charges
Ultimate Telecom Security Checklist
The Ultimate Telecom Security Checklist covers the following topics: (1) General Vulnerability Assessments & Security Planning, (2) External Calling Threats & Cross Network Attacks, (3) Internal Threats, Attacks & Abuse, (4) Management Controls, (5) Physical Security, (6) Feature Liabilities, (7) General Administrative Issues, (8) General Staffing Issues, (9) VoIP Internal Issues (Campus VoIP), and (10) VoIP External Threats.
The Rise of SIP Trunking: Discusses the benefits of SIP trunking, the rise of SIP trunking adoption, SIP trunking mediums, and key findings between on-premise systems and cloud-based systems
Telecom Fraud Guide
The Telecom Fraud Guide describes Call Transfer Fraud, False Answer Supervision Fraud, Location Routing Number Fraud, Revenue Sharing Fraud, Multiple Call Transfer Fraud, Call Forwarding Fraud, International NANPA Telecom Fraud, International Revenue Sharing Fraud, Traffic Pumping Fraud, Voice Mail Hacking Fraud, One Ring and Cut (Wangiri) Fraud, Toll Bypass Fraud, Inter/Intra State Toll Bypass Fraud, Toll Free Fraud, Wholesale SIP Trunking Fraud, Calling Card Fraud, Lost or Stolen Phones and SIM Card Fraud, Virus Auto Dialer Fraud, Account Takeover, Telecom Denial of Service (TDoS), and Vishing.
VoIP Knowledge Base
The VoIP Knowledge Base includes: a Glossary of Telecom Terms, The Telecom Carrier Solutions Adapted for the Enterprise Report, How to Get a Location Routing Number, Session Border Controller Basics, Key Features of SBCs, SBCs and Telecom Security, SIP Trunking Basics, Benefits of SIP Trunking, SIP Trunking Considerations, and an Introduction to Unified Communications.
Telecom Carrier Solutions Adapted for the Enterprise Report: As enterprise telecom networks grow in size and sophistication, successful management requires a toolkit borrowed from telecom service providers and carriers. By implementing software traditionally only used in the telecom industry, enterprises stand to see significant cuts in the communications costs, and savings that impact their bottom line.
Key Features of Session Border Controllers (SBCs): Discusses normalizing SIP, transcoding calls, dealing with NAT traversal, fax and tone detection, and performance, scalability, resiliency, and survivability.
Other resources and white papers
The full collection of TransNexus resources and white papers can be found here.
Evolution of VoIP peering
In the beginning of the Internet, IP networks interconnected through public peering points such as Metropolitan Area Ethernet (MAE) East located on Washington DC or MAE West located in San Francisco. These public peering points soon became overwhelmed by the growing amount of data traffic being exchanged between IP networks. To address this problem, private data network operators began to privately interconnect (peer) their networks.
As VoIP technology developed, it was first deployed as a technology to bypass toll charges of the long distance telephone networks or Public Switched Telephone Network (PSTN). VoIP networks were stand alone networks interconnected only with the PSTN. VoIP peering, however, is the growing practice of directly interconnecting VoIP networks.
TransNexus, along with Cisco, 3Com and others was the creator of the ETSI Open settlement protocol (OSP). The OSP protocol is global standard for enabling secure peer to peer VoIP routing and accounting without the need of an intermediary device, such as a proxy, session border controller or Back to Back User Agent (B2BUA), in the VoIP signaling path. OSP peering is a general technique which may be used for any VoIP protocol (i.e. H323, SIP or IAX) and other IP communication transactions such as video, file sharing or short messaging.