fbpx
preloader

Proofpoint Advanced BEC Defense

Stop email fraud, including advanced invoicing attacks

Proofpoint is the only vendor that provides you with an end-to-end, integrated solution to combat business email compromise (BEC). It addresses various tactics used in email fraud attacks, such as use of impersonated supplier domains, reply-to pivots, domain spoofing, display name spoofing, and lookalike domains.

The integrated Proofpoint platform uses Advanced BEC Defense, the ML/AI-powered BEC detection engine, to detect and stop email fraud attack more effectively. With this integrated platform, you get visibility across multiple threat vectors, including your supply chain, and automated threat detection and response.
Download Solution Brief

What IS BEC (Business Email Compromise)?

Business email compromise (BEC) is a type of email cyber crime scam in which an attacker targets a business to defraud the company. Business email compromise is a large and growing problem that targets organizations of all sizes across every industry around the world. BEC scams have exposed organizations to billions of dollars in potential losses.

Email account compromise (EAC), or email account takeover, is a related threat that is accelerating in an era of cloud-based infrastructure. EAC is often associated with BEC because compromised accounts are used in a growing number of BEC-like scams (though EAC is also the basis of other kinds of cyber attacks).

BEC and EAC are difficult to detect and prevent, especially with legacy tools, point products and native cloud platform defenses.

To stop these email fraud attacks, you need an integrated solution that:

  • Detects various BEC tactics and stops email fraud threats before they enter
  • Analyzes multiple message attributes with true machine learning
  • Identifies email fraud from impersonated and compromised suppliers
  • Provides visibility into which users are most attacked and by what types of BEC scam
  • Trains end users to spot and report on suspicious impostor threats
  • Automates threat detection and response
  • Protects your brand in email fraud attacks by preventing fraudulent use of your domain

How Proofpoint Effectively Defends against Email Fraud

GATEWAY

  • Dynamically detect and block business email compromise variants
  • Identify various BEC tactics, such as the use of impersonated supplier domains and of compromised supplier accounts
  • Tag external email to alert recipients of the origin of the email
  • Analyze multiple email attributes, such as header, sender’s IP, reputation, and message body for urgency
  • Use Advanced BEC Defense, a machine learning-based detection engine that learns in real time and analyzes every detail of a message
  • Enforce email authentication, such as SPF, DMKIM, and DMARC

VISIBILITY

  • Identify your Very Attacked People™ (VAPs) to identify which users are being attacked with impostor threats
  • Provide granular business email compromise (BEC) threat details, such as gift card, payroll redirect, invoicing, and lure
  • See which suppliers pose the highest risk to your organization
  • Uncover malicious lookalikes of your domains and of your suppliers’ domains
  • Reveal who’s sending emails using your domain, including trusted third-party senders

AUTHENTICATION

  • Implement email authentication (DMARC) and enforce it on an internet-wide basis
  • Block all attempts to send unauthorized emails from your trusted domains
  • Dynamically report on lookalike domains across digital channels

AUTOMATED RESPONSE

  • Quarantine or remove suspicious or unwanted messages with one click—or automatically
  • Automate abuse mailbox process
  • Enable users to report suspicious impostor messages directly from the warning tag

EDUCATION

  • Train users to spot and report on suspicious imposter threats
  • Safely assess user vulnerability to BEC threats with real-world examples
  • Provide tailored BEC training to your VAPs
  • Enable users to make more informed decisions on uncertain emails with an email warning tag

Ready to Get Started?

Let us walk you through the BEC solution and answer any questions you have about email security.
Schedule a Demo

Our clients

request a quote

    x
    c
    o
    n
    t
    a
    c
    t

    u
    s
    linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram