business-email-compromise

Business Email Compromise (BEC)

INKY’s proprietary machine learning algorithms prevent business email compromise attacks.

Get INKY Today

What is a BEC Attack?

Business Email Compromise (BEC) is, unfortunately, a thriving and growing scam globally that targets organizations of any size.

According to the FBI, losses from BEC attacks total billions of dollars per year. BEC security is now a necessary responsibility of every IT department. Though examples vary, the general anatomy of the fraud is the same: an attacker identifies key executives or suppliers and impersonates them, convincing an employee to wire funds, sometimes very large amounts of funds. Their methods for brand forgeries and impersonation are sophisticated and fool even savvy employees.

Pandora_1
Inky_BrandImpersonation_1

How Much Can You Afford to Lose?

INKY isn’t adapting to yesterday’s news, she constantly learns and grows. INKYobserves the flow of mail through your organization, and creates behavioral profiles for all of your associates – she knows Bob from accounting better than Bob does.

Other email security solutions typically rely solely on a database of known attackers. INKY uses true machine learning and Computer Vision in addition to up to date databases, to block phishing emails and even catch even zero-day BEC phishing scams.

Over two dozen Computer Vision and text analysis models “see” the message much like a person would. Computer Vision allows INKY to see text-logos and catch text, type, and image anomalies that a human would miss.

What makes INKY different for BEC protection?

INKY detects zero day BEC attacks.

INKY uses computer vision algorithms to recognize brand-indicative design indicators, including fake logos that are convincing, text-only designs but no real logo image. Coupled with sender profiling and anomaly detection algorithms, INKY supplies BEC security against these attacks before they are identified and logged by traditional email protection systems. Traditional email protection systems are working from a known database of attackers and scams.

Inky_BrandImpersonation_1
BrandImpersonation

INKY learns patterns with behavior profiling.

INKY’s true machine learning develops behavior profiles and social graphs that identify suspicious behavior or identities. When INKY sees an email from a sender that doesn’t match a known profile, it sends an impersonation warning.

INKY works with any email client

Whether you’re an Outlook traditionalist, or experimenting with the latest mobile email solutions, INKY integrates into almost any email solution. With a single click, your users can react to the warning banner right in the body of the email. This unique ease of use banner is one of our clients’ favorite features.

Asset-10-1
Asset-2@4x

Report phishing attempts from any device

A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software. Most email protection software only has the capability to work from an installed instance.