Proofpoint Fraud Defense

Additional Info

CompanyProofpoint
Websitehttps://www.proofpoint.com/us
Company size (employees)1,000 to 4,999

Overview

Proofpoint provides a unified fraud defense solution to protect against security, brand, and compliance risks across email, web, mobile, and social media. It effectively detects and blocks business email compromise (BEC); dynamically identifies lookalike domains registered by outside 3rd party; reveals fraudulent social accounts; trains end-users to spot identity deception tactics. It is the only solution that provides a holistic defense for all channels.

To protect organizations’ reputation from email fraud attacks, Proofpoint authenticates all emails delivered to and sent from its customers. It dynamically detects newly registered domains posing as its customers’ brand in email attacks or by phishing websites, and it notifies organizations when a lookalike brand domain is sent as a malicious URL. By simplifying DMARC implementation with guided workflow and detecting and blocking impostor threats at the gateway with dynamic analysis, Proofpoint helps prevent fraudulent emails from being sent and mitigate risk of email fraud.

Proofpoint provides unmatched visibility into all emails being sent using its customers’ trusted domains. This includes emails that are destined for consumer mailboxes, business gateways and customers’ own gateway. With the recently introduced feature, Proofpoint provides visibility into supplier risk. It automatically identifies an organization’ suppliers, validates their DMARC records and uncovers the risk they pose to the organization, including impostor threats. It also reveals the messages delivered from the lookalikes of those suppliers’ domain.

Additionally, Proofpoint allows organizations to centrally discover, audit, and protect its social media presence. With just a few clicks, they can discover their brand’s presence. It identifies fraudulent social accounts imitating executives and brand; detects account takeovers in real-time and locks down compromised accounts; controls connected 3rd party applications. Using machine-learning and artificial intelligence, Proofpoint analyzes a vast body of domain data to uncover infringing domains that pose a risk to an organization’s brand and customers.

How we are different

• Comprehensive solution for multiple channels: Only Proofpoint provides a holistic fraud defense solution that addresses threats across both email and digital engagement channels. Proofpoint accurately detects impostor emails with NexusAI, our dynamic, multi-layered threat detection engines that continuously learn from the threats we analyze. And it uses a highly scalable detection system that provides in-depth scanning across various digital channels, including social media, surface web, and the deep and dark web. We continuously update our detection engines to address changes in the threat landscape. Through product evaluations against other vendors, Proofpoint always identifies a host of fraudulent threats evading existing systems.


• Unmatched Visibility: Proofpoint provides visibility into the human attack surface, revealing VAPs and peer group comparisons to help organizations assess, prioritize, and mitigate risk. We help organizations understand which of their users are being attacked with impostor threats and who are vulnerable to email fraud attacks. We reveal the lookalike domains that are registered by outside 3rd party and that are used to send malicious emails or used by phishing website. We also uncover 3rd party fraudulent social accounts. We’re the first to provide a supplier-centric view of email fraud attacks. The feature released recently automatically identifies organizations’ suppliers. It provides insights into impostor threats posed by suppliers and uncovers the lookalike domains of theirs.


• Automated Response: Proofpoint automates threat response, saving organizations money by improving operational effectiveness. Suspicious impostor emails reported by end-users are automatically quarantined and analyzed. Security professionals can remove impostor emails with just one click or automatically, even if they were forwarded or received by others. Proofpoint also automatically removes unsanctioned content or locks down an account if account tampering has been detected. Organizations can easily designate approved account configurations, including authorized owners, images, credentials, and third-party applications.