The Inky Difference

Brand Forgery Protection

Advanced Brand Forgery Detection and Prevention

Inky sees emails “like a human does” to identify and protect against brand forgery attacks.

Attackers take advantage of users’
brand recognition for malicious purposes.

Brand forgery emails target humans’ built-in desires to see patterns and make associations. Through good marketing, many companies have trained people to associate certain images or phrases with a given brand.  Brand recognition helps sell products, but it also leaves users vulnerable to brand forgery attacks.

By including branding from companies that users trust, phishers can make their emails look more authentic and trustworthy to their targets. As these phishing schemes become more sophisticated, Inky’s advanced brand forgery detection is an increasingly important aspect of phishing protection.

Computer Vision Algorithms

Brand forgery emails rely on users identifying brand-specific images and slogans, which lull them into a false sense of security.

Learn More

Inky uses Computer Vision and advanced machine learning  to see emails like a human does.  This allows Inky to identify the company that an email is supposedly sent from, and verify that the sending address and email signatures belong to one of the company’s official domains.

Fuzzy String Matching

Most anti-phishing solutions are aware of brand forgery attacks and attempt to recognize brand-indicative text to verify authenticity.

Learn More

Phishers are aware of this and make use of similar-looking letters and that fool us while looking different to computers.  Inky uses a combination of Computer Vision and fuzzy string matching to identify the intended text despite these protections, and warns users about potential brand forgery.

Domain Verification

Just because an email is identified as claiming to come from a commonly targeted brand doesn’t mean that it isn’t a legitimate communication.

Learn More

Inky uses tools to verify a brand sent the email to you.  DKIM (Domain Keys Identified Mail) and SPF (Sender Policy Framework to prevent and detect spoofing of your domain.  In addition, Inky uses DMARC (Domain based Messaging Authentication, Reporting and Conformance) records.

Use Inky to prevent your employees from falling for
these sneaky brand forgery techniques:


The simplest way to make a convincing brand forgery email is to take a legitimate communication from the company and change a few links.  The text and imagery looks legitimate because it is legitimate.

Company Names

One of the simplest ways that phishers convince users that an email is from a certain brand is to say so.  Brand forgery emails commonly contain the name of the company being impersonated.

Company Logos

Brands have put a lot of time and money into getting people to associate their logos with their brand.  Phishers take advantage of this by including brand logos to win instant credibility.

Brand-Indicative Text

Many brands have certain phrases that they’ve developed as part of their brand. Good brand forgery emails will take advantage of this by including these phrases in their emails to add authenticity.

Email Tone

The tone and “voice” of communications is an important part of many company’s brands.  By taking advantage of this, phishers can make their brand forgery emails seem more legitimate since they “sound like” the real thing.

Email Style

Emails from certain companies look a certain way. This includes color, font, layout, and other features.  A convincing brand forgery email mimics the style of legitimate company communications.

What Sets Inky’s Brand Forgery Protection
Apart from the Rest?

Inky sees phishing emails like a human does.

Unlike most anti-phishing tools, Inky doesn’t rely on examining URLs and sender addresses to detect phishing emails. Inky’s brand forgery detection software uses Computer Vision to detect company logos and determine who the email is from. Using  dozens of algorithms and a database of companies and their associated domains, Inky verifies the legitimacy of the sender’s email address and the email’s DKIM signature.

Inky learns patterns with behavior profiling.

Inky’s true machine learning develops behavior profiles and social graphs that identify suspicious behavior or identities. When Inky sees an email from a sender that doesn’t match a known profile, it sends an impersonation warning.


Works with any mail client.

Web, mobile, or desktop.  Office 365, Outlook Exchange, or G-Suite.

Report Phishing Attempts from any device

A very unique feature is the ability to click a “Report this Email” link, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software.  Most BEC protection software only has the capability to work from an installed instance.

Want to See Inky in Action?

See Inky in action with a free scan of your inbox or get in touch to get a demo from one of our experts.

Inky® protects your organization from advanced phishing threats and other email based attacks.


Get Inky For Office 365

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.


Get Inky For Exchange

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.


Get Inky For G Suite

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.