Proofpoint Email Protection stops malware and non-malware threats such as impostor email (also known as business email compromise, or BEC). Deployed as a cloud service or on-premises, it provides granular filtering to control bulk "graymail" and other unwanted email. And business continuity capabilities keep email communications flowing, even when your email server fails.
Protection against impostor email (BEC)
Dynamically classify impostor email (BEC) other threats that don't involve malware. These low volume, hard-to-detect threats have cost businesses more than $2.3 billion and cannot be detected by solutions that detect only malware. We detect and classify impostor email through a combination of authentication (DMARC), pre-defined rules, and dynamic classification. Our technology actively assesses the reputation of the sender for accurate protection without additional administration overhead. We analyze:
- Sender-recipient relationship
- Domain reputation
- Email headers and envelope attributes
- Email content
Protect your people from impostor email threats
Impostor email, also known as business email compromise (BEC) or CEO fraud, has bilked more $2.3 billion from more than 17,642 known victims so far.
Granular filtering and control
Email Protection can control all aspects of inbound and outbound email. Our policy engine gives you complete flexibility. Custom rules support global, group and user-level controls to meet the needs of even the most complex enterprise. Individual quarantines enable you to separate email types to allow your people to access their email digest and quarantine while keeping malicious emails away. Quarantines include:
- Low Priority
"Not only does it keep spam out of our users' mailboxes, it actually keeps spam from hitting our servers in the first place, saving precious resources such as disk space."
— Sam Shoen, WebTeam Manager, U-Haul
Email Protection gives you a wealth of data and search tools. Our advanced message tracing features a high-performance search engine to help you quickly pinpoint hard-to-find log data based on dozens of search criteria.
With more than 60 real-time reports for detailed visibility into mail flow and trends, Email Protection provides the data that can help address issues and trends as they emerge.
Give your people self-service control over their email preferences such as:
- Safe and block lists
- Bulk mail delivery
These services are also easy to brand, providing familiarity for users who access these tools. And with support for numerous languages, you can deploy them globally.
The Impostor in the Machine
Understand the motives and mayhem of impostors emails.
Support, Services & Training
We offer world-class support, services and training to maximize your investment.