IP connection between your physical PBX and the global telephone network without changing your infrastructure

logo tecsens

call center voice
  • Transparent Caller ID.
  • Guaranteed scalability with dozens of simultaneous conversations.
  • Full incoming and outgoing IP call service.
  • Transcoding.
  • Anti-fraud security.
call center ivr
  • Own numbering and title page.
  • High call quality, superior to a traditional call.
  • Possibility to have SIP Trunk in other countries.
  • Call recording.
  • Tailor-made rates.

Additional services

sip trunk wholesale


Service for operators looking for a reliable provider with first class routes, maximum security, high availability and rates adapted to your needs.

sip trunk db cleanup


Eliminates erroneous, incomplete or repeated records from a database in order to optimise time and improve ROI.

sip trunk mobile rotation


Automatic Caller ID rotation in outbound campaigns.

Your company in the hands of specialists


Keep track and manage your calls

VoIP monitoring

VoIP monitor analyses the quality of VoIP calls based on network parameters: delay variation and packet loss.

It is a network packet sniffer with a commercial interface for VoIP, SIP, RTP/RTCP, SKINNY (SCCP), MGCP, WebRTC protocols running on Linux.

  • Monitors and analyses SIP VoIP call quality issues.
  • Archiving of all calls, including SIP, WebRTC, SKINNY RTP, T.38 and T.30 FAX (PDF) in the CDR database.
  • Decodes and plays calls directly from the GUI or displays T.38 FAX as PDF.
  • Surveillance to prevent fraudulent calls.
  • Monitoring of call centres.
  • Advanced call reporting.
sip trunk monitoring


  • Comprehensive filters to find specific CDRs based on IP, phone numbers, qualitative parameters (loss / delay / MOS).
  • Detailed SIP messages flow with the WIRESHARK style view.
  • Complete call analysis with information on dropped packets, Jitter, MOS, per communication legs, etc…
  • Possibility to listen to calls directly from the web interface.
  • Real-time and CDR-based anti-fraud rules.
  • Multi-user access allowing only certain IPs / phone numbers to be seen.
  • Native PCAP file downloadable via the web GUI.
  • Graph of loss and delay distribution for each call.
  • Live calls and live sniffer, in GUI.

Find out more…

What is a DNS attack and how to prevent it

What is a DNS attack and how to prevent it

In recent years we have experienced the incessant growth of attacks on all kinds of companies, but especially on large and well-known companies, which a priori seemed unbreakable. According to the International Security Council (NISC) 72% of these organizations have...

El Cloud Storage de Tecsens

El Cloud Storage de Tecsens

We have seen that in the world of Cloud Storage there are several types of solutions, all of them based on data storage, but designed for different needs and challenges. We are going to focus specifically on one of them: Object Storage, the Cloud Storage that we...

We are backed up by their acknowledgements

We want to be recognised for excellence by maintaining the highest standards in all facets of our organisation, processes and execution. We don’t settle for obvious solutions, we strive for excellence.

Member of CISQ Federation