1-833-727-4659 sales@inky.com
The Inky Difference

Whaling Attack Protection

Whaling Attack Protection

Inky Stops Whaling Attacks Targeting Key Users

Inky prevents your business from falling victim to costly whaling attacks.

Inky provides protection for whale phishing attacks
targeting high-profile users.

Whaling is a type of attack whereby the criminal impersonates C-level executives and higher-ranking politicians.  (the ‘whales’ of an organization or government agency).  By assimilating into a believable, trusted figure, the attacker builds rapport, usually using tricks like social engineering to encourage employees to follow directions. After the attacker believes the employees are completely comfortable, the criminal will use email to steal important information, acquire account credentials, or request a financial transfer for their personal gain, at the company’s expense. 

Inky builds and references behavior profiles for all communications

Every communication is dissected, analyzed, then retained in a profiling system that learns patterns to warn users when a message appears to be an impersonation.

Visual investigation of image elements

Whale phishing attacks often include graphics, like company logos, that appear genuine – Inky uses Computer Vision to cross-reference these elements against dozens of modeling systems to uncover forgery other solutions miss.


Our service runs in its own computing instance, fielding both incoming and outgoing mail. It won’t bog down your machines, is compatible with other email filters you’re using, and is simple to deploy.

High-profile users like your CEO require whaling protection

Unlike regular phishing attacks, whaling attacks are decidedly trickier than their more general counterparts. Attackers rely on the fact we’re too busy to digest each individual element of an email, whether it’s the language, or a fake domain. These rogues get through to busy, employees with communications that look real, circumventing any indication of threat. 

Spoofing an email address with a non-existent sender.

The email sender reads john@inky.com but in the underlying code, the actual return address reads fake_name@newly-registered-domain.net.


Similar fonts and characters.

Certain fonts and foreign alphabets have characters that appear to be specific letters in email addresses or URLs, barely detectable by the human eye. Inky’s Computer Vision tracks and sees these to warn you.

An email looks close to a trusted contact.

Because you exchange messages with john@inky.com several times a week, you pay little to the fact you’ve recently been replying to john@inxy.com instead.

In multi-pronged attacks, an attacker gains access to a real company email

In chess, your carefully take you opponent’s pieces before going after the king. Some email fraud begins with a spear phishing attack that compromises an official account which eludes traditional detection systems.


Why Inky Whaling Protection is the Smartest for your Business 

State of the Art Executive Protection Inky sees phishing emails like a human does.

Unlike most anti-phishing tools, Inky doesn’t rely on examining URLs and sender addresses to detect phishing emails.  Inky’s brand forgery detection software uses Computer Vision to detect company logos and determine who the email pretends to originate from.  Using  dozens of algorithms and a curated set of brand data, Inky verifies the legitimacy of the sender’s email address and the email’s DKIM signature.

Inky learns patterns with behavior profiling.

Inky’s true machine learning develops behavior profiles and social graphs that identify suspicious behavior or identities. When Inky sees an email from a sender that doesn’t match a known profile, it sends an impersonation warning.


Works with any mail client.

Web, mobile, or desktop.  Office 365, Outlook Exchange, or G-Suite.

Report Phishing Attempts from any device

A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software.  Most BEC protection software only has the capability to work from an installed instance.

Inky® protects your organization from advanced phishing threats and other email based attacks.

Get Inky For Office 365

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.

Get Inky For Exchange

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.

Get Inky For G Suite

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.