Enterprise Cybersecurity Solutions, Services and Training
Enterprise Cybersecurity Solutions, Services and Training
Business Email Compromise

Stop email fraud, including advanced supplier invoicing attacks

Stop the full range of BEC email fraud tactics with multilayered security controls and user awareness training. Our integrated, end-to-end solution is the industry’s most effective defense against email fraud—no matter what form it takes. Is your organization prepared? Get your free assessment.

Supplier invoicing fraud could be placing your business at risk

Attackers can use both impersonation and compromised accounts jointly in an attack. They can also go after your supply chain and partner ecosystem to launch email fraud attacks. That’s why you need a holistic solution that addresses all BEC tactics.

Business Email Compromise

Business email compromise (BEC) is sophisticated because there’s no malicious payload to detect. Attackers often pose as someone their victims trust and trick them into making fraudulent financial payments. These can include gift card scams, payment redirect, and supplier invoicing fraud. To stop these email fraud attacks, you need an integrated solution that:

  • Detects various BEC tactics and stops email fraud threats before they enter 
  • Analyzes multiple message attributes with true machine learning
  • Identifies email fraud from impersonated and compromised suppliers
  • Provides visibility into which users are most attacked and by what types of BEC scam
  • Trains end users to spot and report on suspicious BEC threats
  • Automates threat detection and response
  • Protects your brand in email fraud attacks by preventing fraudulent use of your domain
Information Protection

How Proofpoint effectively defends against email fraud

  • Gateway

    Dynamically detect and block business email compromise variants
    • Dynamically detect and block business email compromise variants
    • Identify various BEC tactics, such as the use of impersonated supplier domains and of compromised supplier accounts
    • Tag external email to alert recipients of the origin of the email
    • Analyze multiple email attributes, such as header, sender’s IP, reputation, and message body for urgency
    • Use Advanced BEC Defense, a machine learning-based detection engine that learns in real time and analyzes every detail of a message
    • Enforce email authentication, such as SPF, DMKIM, and DMARC
  • Authentication

    Implement email authentication (DMARC) and enforce it on an internet-wide basis
    • Implement email authentication (DMARC) and enforce it on an internet-wide basis
    • Block all attempts to send unauthorized emails from your trusted domains
    • Dynamically report on lookalike domains across digital channels
  • Visibility

    Identify your Very Attacked People™ (VAPs) to identify which users are being attacked with impostor threats
    • Identify your Very Attacked People™ (VAPs) to identify which users are being attacked with impostor threats
    • Provide granular business email compromise (BEC) threat details, such as gift card, payroll redirect, invoicing, and lure
    • See which suppliers pose the highest risk to your organization
    • Uncover malicious lookalikes of your domains and of your suppliers’ domains
    • Reveal who’s sending emails using your domain, including trusted third-party senders
  • Education

    Train users to spot and report on suspicious imposter threats
    • Train users to spot and report on suspicious imposter threats
    • Safely assess user vulnerability to BEC threats with real-world examples
    • Provide tailored BEC training to your VAPs
    • Enable users to make more informed decisions on uncertain emails with an email warning tag
  • Automated Response

    Quarantine or remove suspicious or unwanted messages with one click—or automatically
    • Quarantine or remove suspicious or unwanted messages with one click—or automatically
    • Automate abuse mailbox process
    • Enable users to report suspicious impostor messages directly from the warning tag