Sign in
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Tuesday, February 7, 2023
  • Sign in / Join
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Home News INKY Enhances Next-Gen Email Phishing Protection Solution with Account Takeover Protection
  • News

INKY Enhances Next-Gen Email Phishing Protection Solution with Account Takeover Protection

By
ITsec Bureau
-
October 21, 2020
56
INKY

INKY Technology Corporation, a pioneer in next-gen email phishing protection, today announced the addition of Account Takeover (ATO) Protection to the company’s INKY Phish Fence Platform. Email is an inherently trusted means of communicating for business, if cybercriminals compromise just one email account, they can gain trusted access to an organization’s whole network.

INKY is the only vendor in the cybersecurity industry that uses innovative machine learning techniques referred to as stylometry, and social graphing, to create individual sender profiles and block ATO attacks for users and most importantly, third-parties.

“We are seeing cybercriminals routinely use ATO attacks to evade SEG reputational filters and even impersonate the specific people whose accounts they’ve compromised. Outside of employees, the real concern is third-party ATO, as organizations can’t force vendors to implement multi-factor authentication,” said Dave Baggett, CEO at INKY. “With INKY’s new ATO Protection approach, organizations can stop these attacks in their tracks before they wreak havoc and steal proprietary information.”

Read More: How Can Enterprises Combat Insider Threats

ATO attacks allow adversaries to impersonate employees and leverage that access to exploit third-party vulnerabilities which can cause widespread collateral loss.  Because these attacks appear to be coming from a trusted source, they are inherently difficult to detect. INKY solves this problem by using stylometry and other elements from emails to build sender profiles and catch attempts to forge email from known users — even when those forgeries come from the real senders’ actual email accounts.

“INKY’s approach to protecting against account takeover attacks is the only real solution I’ve seen on the market-to-date. Many vendors are claiming the ability to solve this problem, but lack the technological advancement to back it up,” said Ron Gula, President & Co-Founder at Gula Tech Adventures. “This is the biggest development I’ve seen in the email security market in recent years.”

  • TAGS
  • Account Takeover Protection
  • INKY
  • multi-factor authentication
  • next-gen email phishing protection
  • Next-Gen Email Phishing Protection Solution
Previous articleBlue Hexagon Integrates with AWS Security Hub for AI-powered Cloud Security and Accelerating Digital Transformation of the Global Economy
Next articleGenus Power and NanoLock Security Partner to Secure Smart Meters and Prevent Utility Cyberattacks and Fraud
ITsec Bureau
https://itsecuritywire.com/

RELATED ARTICLESMORE FROM AUTHOR

Secure I.T. Environments Announces Completion of Data Centre Works for Top 10 Retailer

Secure I.T. Environments Announces Completion of Data Centre Works for Top 10 Retailer

Neustar Security Services introduces UltraPlatform to safeguard enterprises’ digital assets

Neustar Security Services introduces UltraPlatform to safeguard enterprises’ digital assets

New DNS detection and response service safeguards user internet traffic and enforces enterprise acceptable use policies

New DNS detection and response service safeguards user internet traffic and enforces enterprise acceptable use policies

Latest posts

Strengthening Security as Threat Actors Recycle Ransomware

Strengthening Security as Threat Actors Recycle Ransomware

August 3, 2022
OpenText Strengthens Security _ Protection Cloud with Network Detection _ Response

OpenText Strengthens Security & Protection Cloud with Network Detection & Response

November 29, 2021
Manquen Vance Provides Notice Of Data Privacy Incident

Manquen Vance Provides Notice Of Data Privacy Incident

April 5, 2021
CompTIA Introduces New

CompTIA Introduces New Cybersecurity Advisory Council

January 18, 2021
ESET Launches Partner Phishing Derby for Channel to Ensure Best Cybersecurity Practices

ESET Launches Partner Phishing Derby for Channel to Ensure Best Cybersecurity Practices

October 4, 2021


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • Secure I.T. Environments Announces Completion of Data Centre Works for Top 10 Retailer
  • Neustar Security Services introduces UltraPlatform to safeguard enterprises’ digital assets
  • New DNS detection and response service safeguards user internet traffic and enforces enterprise acceptable use policies
  • Twenty Million Users Affected by Data Breach at Instant Checkmate, According to Truth Finder
  • Ransomware Attack Targets VMware ESXi Servers Using an Old Vulnerability

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy