Protect Against Malware & Ransomware

Cybercriminals often successfully place malware — software that produces a harmful outcome — on victims' systems. Ransomware, a recent evolution of malware, is particularly pernicious.


Why should you be concerned about ransomware?

A widespread tool hackers use to attack their targets is email laced with links to malware (or containing malware in an attachment). They design phishing emails that set the recipient up for malware injection. From there, the malware may perform any number of tasks, including spreading itself throughout the network, data exfiltration, surveillance, and business disruption.


Screen Shot 2019-05-30 at 6.52.12 AM

How does INKY work?

INKY unleashes its swarm of mathematical and behavioral models on every email that leaves the secure email gateway (SEG) on its way to recipients’ inboxes. These models all operate in parallel, completing their full analysis in less than two seconds and giving each message a grade. The result is communicated to the recipient by an inserted HTML banner — colored-coded gray (safe), orange (caution), or red (dangerous).

When an email hits a tripwire in any of the dozens of models in INKY’s arsenal, that result is surfaced to the banner. The recipient sees why INKY threw a flag, training them while keeping them safe (e.g., INKY sandboxes all live links, among other measures). Key models perform first-principles analysis while others make database references. Visual analysis is performed in a headless browser, and detected brand elements (e.g., logos) are compared to the real domain of the sender, which is determined by analyzing the header information.

INKY learns patterns with behavior profiling.

Immediately after installation, INKY begins to track who sends an email to whom, establishing a social graph of sender profiles within a week or so. These profiles accumulate not just senders' identities but their detailed attributes as well. For each recipient, INKY stores a stylometry profile of their senders. This profile could contain their usual signoff, types of punctuation typically used, primary location, email platform, or device type. Then, INKY undertakes cluster analysis to decide if the set of attributes of any incoming email fits with the known sender profile. If the style is too far out of line, INKY warns of an impersonation.

Social Graphic Email Example - 03

INKY warns users before taking any action.

For example, If the chief financial officer never uses ellipses when he’s sending email to you, and one day an ellipse-festooned email comes in, looking on a smartphone like it’s from him, INKY notices the difference and flags it with a Potential VIP Impersonation in the banner.

With its wide array of complementary analyses, INKY catches even the faintest whiff of phish.

Learn More

Report phishing attempts from any device.

A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software. Most email protection software only has the capability to work from an installed instance.



Ready to see how INKY is the smartest investment you'll make in email security?

Learn More