Understanding Phishing:

Computer Vision

Computer vision is a key part of INKY’s ability to determine whether an email is safe or not. But few people understand how a computer can “see” the way a human does. It’s not enough to reproduce a picture of the object in question. Computer vision involves deriving meaning from that image. This guide explains how INKY uses visual analysis to figure out important features of each incoming email and matches it with other information to ward off phishing attacks.

comp vision

INKY, an in-line software module that monitors traffic from a secure email gateway (SEG) before it gets to the recipient, is super good at stopping phishing attacks. An important feature of INKY, one that sets it apart from the competition, is that it analyzes an email (in less than 2 seconds!) both as a machine would and as a human would. In order to do the human part of the analysis, INKY needs to “see” the email. This “seeing” is done with computer vision

What's inside this guide:

  • An under-the-hood look at real-life phishing examples
  • Tips for how to mitigate these types of phishing attacks
  • A look at the techniques INKY uses to detect these types of attacks
  • And more!

Download your free copy today.

Cybercrime Expected To Cost The World $10.5 Trillion Annually By 2025.

INKY is a cloud-based email security solution that blocks spam, malware, and — most importantly — phishing attacks. Utilizing computer vision, artificial intelligence, and machine learning INKY catches everything. Driven, curious, mobile, and growing smarter by the subject line, INKY adds a thin—but powerful— layer of protection like no other.