Search company, investor...
INKY company logo


Founded Year



Series B | Alive

Total Raised


Last Raised

$20M | 3 yrs ago

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

+60 points in the past 30 days

About INKY

INKY is a cloud-based email security platform designed to be far more than just artificially intelligent. INKY recognizes logos, brand colors, and email signatures. It understands email, searches for signs of fraud, and can spot impostors by a pixel. The company was formerly known as New Arcode and changed its name to INKY. The company was founded in 2008 and is based in College Park, Maryland.

Headquarters Location

5825 University Research Court Suite 200

College Park, Maryland, 20740,

United States


ESPs containing INKY

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

Financial Services / Cybersecurity

In this market, companies reduce the risk associated with the cybersecurity X-factor — human behavior — by providing cyber training solutions, insider risk detection, phishing defense, and employee risk mapping.

INKY named as Challenger among 8 other companies, including Proofpoint, IRONSCALES, and Rangeforce.

Compete with INKY?

Ensure that your company and products are accurately represented on our platform.

INKY's Products & Differentiators

    Inbound Mail Protection

    Uses AI, ML, computer vision, and other techniques to detect and defend against brand impersonation.

Research containing INKY

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned INKY in 3 CB Insights research briefs, most recently on Jun 8, 2020.

Expert Collections containing INKY

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

INKY is included in 3 Expert Collections, including Artificial Intelligence.


Artificial Intelligence

10,110 items

This collection includes startups selling AI SaaS, using AI algorithms to develop their core products, and those developing hardware to support AI workloads.



4,937 items


AI 100

100 items

Winners of CB Insights' 5th annual AI 100, a list of the 100 most promising private AI companies in the world.

INKY Patents

INKY has filed 1 patent.

The 3 most popular patent topics include:

  • Email
  • Machine learning
  • Postal system
patents chart

Application Date

Grant Date


Related Topics



Email, Spamming, Spam filtering, Machine learning, Postal system


Application Date


Grant Date


Related Topics

Email, Spamming, Spam filtering, Machine learning, Postal system



Latest INKY News

INKY Finds New Phishing Attack Technique Spoofing Netflix

Sep 26, 2022

INKY Finds New Phishing Attack Technique Spoofing Netflix Community Chats Webinars Library INKY Finds New Phishing Attack Technique Spoofing Netflix A report published this week by INKY Technology, a provider of an email security platform, suggested cybercriminals have found yet another way to impersonate the web pages of a popular brand to harvest credentials—this time, it’s Netflix. INKY discovered instances of malicious HTML attachments compressed in zip files; when opened, the malware rendered a local copy of a web page that looked identical to what an end user would normally encounter online. In the example INKY cited, cybercriminals created a form that appeared to be sent from Netflix to an end user. All sender email addresses were spoofed to look like they came from Netflix’s actual domain. In actuality, the phishing emails came from a compromised mail server controlled by a Peruvian university, INKY said. Bukar Alibe, data curator for INKY, said he hoped end users would be suspicious of any zip file sent to them but unfortunately there are likely to be plenty of end users that would be tricked into giving up personally identifiable information (PII), especially if they assumed the request came from an online brand they trust. Additionally, INKY is advising end users to make sure they are visiting web sites directly and to hover over links to make sure they go to an actual web site rather than a local file. SMTP servers should also not be configured to accept and forward emails from non-local IP addresses to non-local mailboxes by unauthenticated and unauthorized users, INKY advised. Brand impersonation is, of course, not a new attack vector. It’s apparent that cybercriminals are experimenting with new techniques they hope will evade existing anti-phishing tools that organizations have implemented. In effect, it’s a continuous arms race between providers of those tools and cybercriminals looking to evade detection, noted Alibe. It will be up to each individual organization to determine how and how severely they will penalize end users for falling victim to phishing attacks, However, as phishing attacks become more sophisticated, they are becoming increasingly difficult for the average end user to detect. In fact, end user cybersecurity training needs to be ongoing to enable them to better recognize phishing attacks that are becoming increasingly difficult to detect. The days when phishing attacks could easily be detected because of misspellings, for example, are long over, noted Alibe. INKY Technology is making a case for a platform that employs machine learning algorithms to make it easier to discover phishing attacks. Those algorithms may not replace the need to train end users, but they do help lower the chances an end user will be presented with an authentic-looking email through which attacks are introduced into an IT environment. In the meantime, cybersecurity teams should expect to see the volume of phishing attacks continue to increase during a global economic downturn. After all, the number of individuals inclined to engage in illicit activities always increases any time the opportunities for making money by more legitimate means declines. Recent Articles By Author

INKY Frequently Asked Questions (FAQ)

  • When was INKY founded?

    INKY was founded in 2008.

  • Where is INKY's headquarters?

    INKY's headquarters is located at 5825 University Research Court, College Park.

  • What is INKY's latest funding round?

    INKY's latest funding round is Series B.

  • How much did INKY raise?

    INKY raised a total of $31.84M.

  • Who are the investors of INKY?

    Investors of INKY include ClearSky, Connetic Ventures, Insight Partners, Gula Tech Adventures, Blackstone and 3 more.

  • Who are INKY's competitors?

    Competitors of INKY include Vade, Mimecast, IRONSCALES, SlashNext, Tessian and 9 more.

  • What products does INKY offer?

    INKY's products include Inbound Mail Protection and 4 more.

Compare INKY to Competitors


IRONSCALES enables organizations to mitigate the risk associated with the technological, operational and human challenges inherent to phishing attacks. The company's multi-layered and automated approach to prevent, detect, and respond to phishing emails combines micro-learning phishing simulation and awareness training (IronSchool), with mailbox-level phishing detection (IronSights), automated incident response (IronTraps) and real-time automated intelligence sharing (Federation) technologies.

Valimail Logo

Valimail delivers fully automated email authentication as a cloud service, bringing easy, accessible, and trusted messaging to all organizations. Valimail, using its patented technology, delivers it in fast time. Additionally, email authentication strengthens existing SEGs, adding a highly effective layer of protection, reducing the overall threat surface.

Cofense Logo

Cofense provides threat management for organizations concerned about human susceptibility to advanced targeted attacks. Cofense's intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. The company's open approach ensures that Cofense integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process.

Vade Logo

Vade offers a complete solution to secure emails and users and their data. Vade's technology includes anti-phishing, spear phishing, malware, and ransomware filtering. Its technology is available as a native, API-based offering for Microsoft 365 or as lightweight, extensible APIs for enterprise SOCs. The company was formerly known as Vade Secure. It was founded in 2008 and is based in Hem France.

Abnormal Security Logo
Abnormal Security

Abnormal Security provides a cloud email security platform that protects enterprises from targeted email attacks. Powered by Abnormal Behavior Technology (ABX), the platform combines the Abnormal Identity Model, the Abnormal Relationship Graph, and Abnormal Content Analysis to stop attacks that lead to account takeover, financial damage, and organizational mistrust. It was founded in 2018 and is based in San Francisco, California.

Proofpoint Logo

Proofpoint is a company that develops security and compliance solutions. It offers email, mobile, desktop, cloud, digital risk, and information protection products as well as provides security awareness training, archiving, and compliance solutions. The company serves the federal government, higher education, financial services, healthcare, and other markets. In August 2021, Proofpoint was acquired by Thoma Bravo at a valuation of $12.3B.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.