Skip to content

INKY EMAIL PROTECTION

Office 365 | Exchange | G-suite

TOP RATED PROTECTION

PCH offers business continuity and disaster recovery services to ensure that your business experiences no downtime if data loss occurs.

ADVANCED SECURITY

At PCH, we have the ability to eliminate your need for an in-house IT staff by handling all of your information technology support remotely.

INDUSTRY EXPERTS

We have the experience and the resources to identify and solve your IT-related problems. That’s what IT consulting is—both simple and powerful.

INKY Email Protection

INKY Email Protection is a cloud-based email security product that detects business email compromise, spam, and phishing-type emails and attacks. The product catches malicious emails by utilizing computer vision, AI, and machine learning. INKY Email Protection is fully managed and provides you with the option to either inform your users of suspicious or malicious emails through an HTML banner or block them with quarantine features. Driven, curious, mobile, and growing smarter by the subject line, INKY Email Protection adds an important layer of protection to your inbox.
The time to plan your approach to cybersecurity is now. PCH can help.

Learn how PCH Technologies can help

your business run smoother

Phishing, Zero-Day Phishing, 3rd Party Brand Impression

AI, machine learning, and computer vision identify patterns in text, image, and html to identify potential threats. The unique banner system allows for borderline threats to be flagged without compromising business functionality

Phishing, Zero-Day Phishing, 3rd Party Brand Impression

Identifies attempts to impersonate VIPs via email spoofing, typo squatting, or other malicious tactics

Personal Device & Home Attacks

Identifies attempts to impersonate VIPs via email spoofing, typo squatting, or other malicious tactics

Malicious Links

AI, machine learning, and computer vision identify patterns in text, image, and html to identify potential threats. The unique banner system allows for borderline threats to be flagged without compromising business functionality

Malicious Files

Scans for malicious links, infected PDFs, and embedded code including scripts. Analyzes text within each email and attachment(s) to determine if sensitive words or phrases are used such as: password, invoice, payment, etc.

Malicious Insider

Machine learning develops behavior profiles and social graphs that identify suspicious emails that don’t match a known profile, triggering an impersonation warning

Key Features

  • Detects VIP spoofing, brand forgery, and other attacks used in business email compromise and phishing
  • Provides user-friendly warnings in way of banners on malicious and suspicious email
  • Sanitizes embedded links to help protect users from potentially malicious websites
  • AI and Computer Vision models to catch evasion techniques
  • Easy “Report to SOC Button” for human analysis
  • Fast Deployment built into INKY dashboard

More Services From Us:

Client Testimonials

Don’t just take our word for it – hear what our clients have to say about out IT support and cyber security services:

Christopher Toppi
Compass Wire Cloth – VP Sales

Jim Donnelly
ASL Transportation – President / CEO

Interested in Learning How PCH Cyber Security can help you cut
costs and Increase Business Productivity?

Download our Free ebook to learn more