• slide
  • slide
  • slide
  • slide
  • slide

Overview

Phishing and the other fraud tactics used today are compromising email’s integrity and crushing organizations. Yet most people think the problem is either solved or unsolvable. It’s neither. We set out to fix this. We know the complexities and challenges of email from every conceivable perspective, and we know conventional solutions and existing phishing software technologies are simply not enough.

Implementing a phishing solution is not like building a bridge – the threat landscape shifts overnight and cobbled solutions are simply not the answer. We’re inventing the future, and that requires a very unique mindset and approach. We question everything here, explore new ideas like crazy, and the moment we solve a complex challenge, we seek out the bigger one that was lurking beneath it.

This is how we think.

Products

Phish Fence

INKY Phish Fence leads the industry in mail protection powered by unique computer vision, artificial intelligence, and machine learning. It’s an affordable cloud-based email security platform designed catch everything from spam and malware, to the deepest and darkest threats.

News

Latest News

INKY Technology Corporation, an email protection startup that leverages the power of unique computer vision and artificial intelligence (AI), today announced the release of the company’s 2019 ...
READ MORE >
COVID-19 phishing emails have been bombarding inboxes since the virus began to spread in December and January. Cybercriminals have tried to push all kinds of scams to the masses using ...
READ MORE >
A phishing campaign using Office 365 voicemail lures to trick them into visiting landing pages designed to steal their personal information or infect their computers with malware.The phishing emails ...
READ MORE >
As email security providers strengthen their defenses, attackers develop new ways to work around them. A new report from Inky sheds light on how these techniques are evolving to become more complex ...
READ MORE >

Resources

Datasheet

In this datasheet, we will outline how INKY’s sophisticated technology can complement these legacy solutions, offering a crucial additional layer of protection from today’s sophisticated threats.

INKY Technology Corporation (INKY) is committed to protecting the information of its customers and to preventing unauthorized disclosure, use, modification, or access to such information stored within INKY services.

Resources

INKY spots thousands of dangerous emails that slip through legacy email gateways.

We know attackers will continue to up their game, and that we’re sure to see ever more clever ways to hide from mail protection software like INKY Phish Fence. Our approximate matching engine gives us a tool that thwarts the entire class of deception based on confusable letters and typos.

Scammers have been sending malicious attachments for decades. These are files delivered alongside an email that do something bad when opened, and most mail protection systems have multiple countermeasures against them. Recently, however, we’ve seen a new trend: malicious fake attachments.

You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. But what exactly is this technique, and why do attackers use it? In this brief we’ll explain both the why and how of hidden text and zero font.

Solutions Brief

This solution brief provides an overview of how INKY seamlessly integrates with Microsoft Exchange in order to provide an unparalleled barrier against incoming phishing threats.

This solution brief provides an overview of how INKY integrates with Office 365 in order to provide an unparalleled barrier against incoming phishing threats.

INKY Phish Fence is a mail protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system. INKY stops phish before it reaches your users!

Whitepaper

When it comes to global security, phishing in a top concern. The vast majority of CISOs surveyed believe their company is likely to become a victim of a cyber attack sometime during the year.