INKY's Behavioral Email Security PlatformBlock threats, prevent data leaks, and coach users to make smart decisions.Explore the platform.
INKY's Behavioral Email Security PlatformBlock threats, prevent data leaks, and coach users to make smart decisions.Explore the platform.
Find answers to common questions in the categories below.
If you have other questions not answered here, please contact us.
Pricing is per mailbox per month. Volume discounts apply. We are proud to offer both better protection and better pricing than our competitors. Request a demo to take a look at the product and get a quote.
Yes. In a typical customer deployment, we run servers in the cloud that automatically process every mail the customer receives.
Yes, INKY Phish Fence can quarantine or drop mail that it determines is malicious. Mail that is merely suspicious or unusual can be marked with a prominent warning right in the body of the message explaining in user-friendly terms what was wrong with the message. It’s entirely customer-configurable which messages are delivered and which are quarantined.
Mail protection solutions generally guard against bad links or malware attachments, but do not excel at preventing phishing attacks. INKY Phish Fence identifies more phishing attacks than any other solution, using over two dozen computer vision and machine learning algorithms to “see” each email much like a human cyber-security expert would. This gives INKY Phish Fence the unique ability to catch zero-day phishing attacks that haven’t been reported yet. It also means that INKY Phish Fence can catch realistic-looking forgeries even when they come from high-reputation senders like G Suite and Office 365. No other solution can do this.
No. Unlike other mail protection solutions, you don’t need to change your DNS records or make other public, disruptive changes to protect yourself with INKY Phish Fence. We use the latest Microsoft technologies to vastly simplify setup and deployment; most customers are up and running in under an hour. And unlike other solutions, INKY Phish Fence supports a staged roll-out to groups of users at a time, rather than requiring a single “big bang” cut-over.
We recommend Exchange 2013, Exchange 2016, or Office 365. Both hosted and on-prem Exchange are supported. We also support G Suite.
No. INKY Phish Fence performs its analysis in milliseconds, so it doesn’t slow anything down.
INKY Phish Fence includes state-of-the-art spam and malware protection at no additional cost. Malware sandboxing and static analysis are available for an additional fee.
INKY Phish Fence works with any mail client at all — warnings appear right above the body of the message and thus display everywhere (desktop, web, and mobile).
INKY Phish Fence warns about all of these and more:
Yes. If a particular check or warning is unsuitable for your user community, you may disable it. Users may also request — and admins may optionally approve — whitelisting of external senders that would otherwise be flagged as likely spear-phishing attempts. For example, if an employee routinely uses her personal Gmail account for work communication, an admin can whitelist that address if it is deemed safe to do so.
Improvements automatically stream from our data centers to INKY Phish Fence deployments without you or your users doing anything.
Yes. INKY Phish Fence is deployed last in the email protection chain, so it blocks anything the previous filters allow through. It does not interfere with any protection, archival, or e-discovery software.
Give INKY a free test run on your inbox now at our demo page here.
Absolutely. We’ll set you up, free of charge, so a subset of your users can try it out and see how much INKY Phish Fence can protect them.