Certification from Telmex
Back to Articles
News SIP Software Telecom Regulation Mexico

Certification from Telmex

March 15, 2018 1 min
Aivis Olsteins

Aivis Olsteins

During the third and fourth quarters of the last year we were busy working on making our DTL SAARA platform compliant to interconnect with Telmex, Mexico largest telecommunications operator. It resulted with successful certification, and our locally branded product called Longbow MX is now homologized by Telmex for interconnection with their infrastructure over SIP protocol.

Telmex, based in Mexico City is Mexico's largest fixed line telecommunications operator. Of all fixed lines in the country, more than 80% are served by Telmex, and in the capital city this number reaches 90%. That amounts to millions of lines connected and billions of minutes carried monthly. Telmex has also presence in other Latin American countries, like Argentina, Chile, Colombia and others. The company is more than 70 years old.

The certification focused on interoperability on the SIP protocol level. Telmex requires strict adherance to the way how specific details of SIP protocol is implemented to ensure it's customers receives flawless and quality service when calls are either originated or terminated outside its network. In particular, it is essential to address several points, like:

  1. proper identity declaration- to ensure the caller identity matches with that it declares;
  2. number portability - to make use of features of carrier selection;
  3. availability - to comply with technical standards mandating processing of signals designed to indicate status of partner platform and status of particular calls.

The work was conducted in close coordination with our exclusive partner in Mexico, Telinkcom LLC. The changes we implemented were confirmed in various laboratory tests where our systems were interconnected with Telmex equipment, and two way testing procedure was conducted. It resulted with the success and issuance of compliance certificate.

Our product designed for Mexico market is branded as Longbow MX. Please visit a our documentation page dedicated to this product for additional technical details, as well as our local partner details.

Share this article

Aivis Olsteins

Aivis Olsteins

An experienced telecommunications professional with expertise in network architecture, cloud communications, and emerging technologies. Passionate about helping businesses leverage modern telecom solutions to drive growth and innovation.

Related Articles

How Voice AI Reduces Agent Burnout and Boosts Satisfaction

How Voice AI Reduces Agent Burnout and Boosts Satisfaction

Reduce Burnout with Voice AI: Offload Repetitive Calls, Real‑Time Agent Assist, 40–80% Less ACW, Calmer Escalations, Healthier Occupancy, Proactive Deflection & PCI‑Safe Flows—Happier Agents, Faster Resolutions, Better Coaching, Faster Ramp

Read Article
Seamless Voice AI Integrations: Salesforce, HubSpot, and ERP Systems

Seamless Voice AI Integrations: Salesforce, HubSpot, and ERP Systems

Seamless Voice AI Integrations with Your Stack: Salesforce & HubSpot CRM + SAP/Oracle/NetSuite/Dynamics ERP; OAuth2 & mTLS Security; Real‑Time Read/Write (Cases, Orders, Payments, Scheduling); Warm Transfers, Context; Audit Logs, SLAs, iPaaS Support

Read Article
Measuring Voice AI Success: The KPIs That Matter—CSAT, Containment, Speed, Accuracy, Reliability, and ROI

Measuring Voice AI Success: The KPIs That Matter—CSAT, Containment, Speed, Accuracy, Reliability, and ROI

Voice AI KPI Scorecard: CSAT/NPS, FCR & Containment, Time‑to‑First‑Word & p95 Latency, Intent/Slot Accuracy & ASR WER, Groundedness, Tool Success (Payments/IDV/Scheduling), Warm Xfers, Uptime/Reliability, Consent/Redact, Cost per Resolution & ROI

Read Article
Sensitive Data in Voice AI: PCI‑Safe Payments, HIPAA‑Compliant PHI, Redaction & Tokenization

Sensitive Data in Voice AI: PCI‑Safe Payments, HIPAA‑Compliant PHI, Redaction & Tokenization

Managing Sensitive Data in Voice AI: PCI‑Safe Payments (DTMF Masking, Tokenization), HIPAA‑Compliant PHI Segregation, Redaction/De‑Identification, End‑to‑End Encryption, Zero‑Trust Access, Residency/Retention, DSAR Deletion, SIEM‑Audited Trails

Read Article

SUBSCRIBE TO OUR NEWSLETTER

Stay up to date with the latest news and updates from our telecom experts