Talk to sales

Ask a member of our sales team about our products or services:

Protect Against Business Email Compromise (BEC)

Block attacks with a layered solution that protects you against every type of BEC threat

Overview

Business email compromise (BEC), or impostor email, doesn't use malware attachments or malicious URLs, making it invisible to even "next-generation" email defences. Our layered approach stops this evolving threat before it reaches your employees, partners, and customers. Safeguard your critical information and secure all the avenues that BEC attackers pursue.

BEC puts every email-based relationship at risk

Stop attacks before they reach the inbox

Proofpoint Email Protection provides pre-defined anti-spoofing rules and subject tagging to flag emails as potential BEC.

For even deeper protection, our dynamic Impostor Classifier uses machine-learning technology to analyse relevant information such as email content, sender reputation, and email address manipulation.

These insights are used to set an Impostor Email Score. This score is configurable and protects you from multiple types of BEC attacks.

Authenticate Your Email with Confidence

Authentication methods such as DMARC, SPF, and DKIM can prevent domain spoofing, the most common BEC technique. But authentication can be difficult and may end up blocking legitimate email.  

Proofpoint Email Fraud Defense makes it easy to authorize legitimate senders and block the fraudulent ones—before they reach the inbox.

Prevent outbound communication to impostors

Should a BEC threat reach your organisation, you can still prevent sensitive information from leaving. Proofpoint Email Data Loss Prevention proactively finds, classifies, and stops outbound communication associated with BEC—all automatically.

Protect tax information, employee records, wire transfers, and other critical data from impostors.

Email Protection

Protect your people from spam, malware, and non-malware threats with accurate classification, granular control, and visibility into all email communication.

Email Fraud Defense

Block fraudulent emails before they reach your employees and customers.

Email Data Loss Prevention

Mitigate the risk of email data loss and protect against business email compromise.

cyber security

White Paper

The BEC Survival Guide

What you need to know about BEC and impostor email to recognise and stop attacks.

Read More
cyber security

Infographic

Business Compromised

How BEC attacks are escalating and who's being targeted.

View Infographic
cyber security

Authentication

Email Authentication Kit

Learn how to build your SPF record, sign with DKIM, and implement DMARC.

Read More
next generation email security

The Human Factor Report

How Today’s Threats Prey on the Human Factor

Last year social engineering was the #1 attack technique. People replaced exploits as attackers favorite way to beat cybersecurity.

Read More