1-833-727-4659 sales@inky.com
The Inky Difference
Email Impersonation

See Through Email Impersonation with Inky

Inky takes a unique approach in verifying email senders’ identities, using Computer Vision that “see” the message much like a person would.

Do you know who really sent that email?

A key element of a successful phishing attack is pretending to be someone else. No one is going to click on a link or open an attachment that is obviously from a spammer.  Attackers pretend to be someone that you know and trust in order to trick you into doing what the attacker wants.  Phishers commonly impersonate suppliers requesting payment of an outstanding invoice.  Pretending to be an airline confirming an airline reservation has a 90% success rate for attackers.  All phishing emails involve email impersonation, and Inky has developed state-of-the-art defenses to protect against even the most advanced phishing attacks.

Inky builds a profile for each member of your organization capturing behavior elements such as frequency, writing style, common expressions, and general email habits (like using Gmail as your mail client).  When a new email comes in, Inky compares it against the sender’s profile and warns you if it looks suspicious.  In most organizations, there are people that regularly talk to each other and ones that don’t.  For example, you probably talk to your boss more often than the department intern emails the CEO.  Inky utilizes machine learning to track of these relationships and marks emails that break the trend as suspicious.

Instead of solely relying on known malicious attackers, Inky catches never before seen scams. It scans every facet of the email instantly against dozens of algorithms. Computer Vision “sees” the email like a human would, identifying the brand, recognizing brand-indicative imagery, HTML, colors, etc.  Inky can even spot logo-like text (logo types) where there is only text and no image. 

Emails contain much more than the addressing information and content visible to the recipient.  These email headers provide information like the mail client that the sender uses and the sender’s location.  Since these rarely change, they can be used as a fingerprint for a given sender.  If an email from that sender doesn’t match the fingerprint, Inky will mark it as potentially suspicious.

Your Employees May Fall Victim to Email Impersonation with Many Faces

Coworkers

Employees are accustomed to receiving emails and requests for aid from other members of their organization.  Attackers will take advantage of this by pretending to be a colleague asking for a favor.

Management

A common form of email impersonation involves attackers impersonating the CEO or other authority figure within a company and instructing employees to send money or data to the attacker.

Vendors

In some phishing attacks, phishers impersonate a vendor and claim that the next or an outstanding invoice should be paid to a new account under the control of the attacker.

Trusted Brands

Users trust certain organizations like banks, lawyers, ecommerce stores and service providers.  Phishers take advantage of this trust by impersonating a trusted organization and instructing users to take actions that reveal sensitive data.

Government Organizations

People instinctively obey instructions coming from authority figures.  Phishers will use fear of authority to control people by claiming that they did something illegal and must immediately pay a fine or face legal action.

Spot Email Impersonation That Other Systems Miss

True Machine Learning

Inky’s behavioral models and social graph construction detect inconsistencies between the sender’s normal behavior and a phishing email and warn the recipient to be alert. This unique approach makes Inky smartest solutions on the market.

Catches Even Zero Day Phishing Attacks that Slip Through Other Systems

Inky’s Computer Vision runs dozens of algorithms, as well as utilizing true machine learning, identifying abnormalities in not only text or email addresses, but entire behavior profiles.

Inky On Any Device

Inky integrates with the mail server and doesn’t need any software installed on your users’ devices.  Use any mail client and be fully protected by Inky.

Easily report phishing attempts

Inky inserts a “Report this Email” link into the body of every email.  This allows users to quickly and easily report phishing attempts without requiring admins to deploy client-specific software to each device.

Deep Link Inspection

As well as looking up URLs in known threat feeds, Inky performs deep link inspection. This means Inky simulates a click through to the linked site and examines the destination page for evidence of phishing and other security risks.

Inky® protects your organization from advanced phishing threats and other email based attacks.

Asset

Get Inky For Office 365

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.

Asset

Get Inky For Exchange

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.

Asset

Get Inky For G Suite

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.