Skip to content
Approved Systems

INKY: An AI‑Driven Email Security System Built for all Businesses

Email is still the front door to your business – and it’s where most cyber attacks begin.

Phishing, impersonation scams and malicious attachments are now so convincing that traditional spam filters are no longer enough. That’s why Approved Systems offers INKY, our managed email security service designed to protect your people, your data and your reputation.

Approved Systems Sentinal email robot (INKY) continuously scans every email coming in and going out of your organisation.
It doesn’t just block threats – it helps your staff make safer decisions in real time.

What INKY Does for Your Business

INKY protects your organisation at every stage of email use:

  • Stops phishing, ransomware and impersonation attacks before they reach your inbox
  • Warns staff when an email looks suspicious, with clear on‑screen guidance
  • Prevents accidental data leaks and mis‑sent emails
  • Protects internal email if an account is compromised
  • Secures sensitive emails with encryption
  • Improves email deliverability and domain trust

All of this is delivered as a fully managed service by Approved Systems.

A Smarter Way to Stop Phishing

INKY uses an intelligent email robot that analyses emails the way a human would – and then goes further.

It looks at:

  • Who the email claims to be from
  • How that sender normally behaves
  • Logos, branding and visual elements
  • Links and where they really lead
  • Attachments and what they actually do

If something doesn’t add up, INKY flags the message or blocks it outright.

Real‑Time Warnings for Your Staff

Instead of silently filtering emails, INKY helps your team stay alert.

When a risky email is detected, a clear banner appears inside the message explaining what’s wrong – for example:

  • “This email is pretending to be your manager”
  • “This link goes somewhere unexpected”
  • “This attachment could be dangerous”

These warnings work on:

  • Desktop email
  • Webmail
  • Mobile phones and tablets

Over time, your staff become better at spotting threats on their own.

Protection for Incoming, Outgoing and Internal Email

Incoming Email Protection

Blocks phishing, malware and scams before they reach your inbox – including attacks that bypass standard Microsoft 365 or Google filters.

Internal Email Protection

If a user account is compromised, MailSentinal detects unusual behaviour and stops attackers from spreading internally.

Outgoing Email Protection

Prevents sensitive information from being sent to the wrong person and helps stop costly mistakes before they happen. flags the message or blocks it outright.

Secure Sensitive Emails Automatically

INKY includes built‑in email encryption.

When sensitive information is detected – or when staff choose to encrypt an email – the message is secured automatically. Recipients can open it safely without needing special software.

This helps protect:

  • Confidential business information
  • Personal information
  • Financial data
  • Legal documents

Advanced Attachment and Link Protection

INKY goes beyond basic virus scanning.

Attachments are analysed for hidden behaviour, not just known threats. Links are checked in real time to make sure they haven’t been swapped for something malicious.

This means:

  • No waiting for sandbox scansthey happen. flags the message or blocks it outright.
  • Faster email delivery
  • Protection against zero‑day attacks

Less Noise, More Productivity

Not all email is dangerous – some of it is just distracting.

INKY can automatically sort newsletters and bulk emails into a separate folder, reducing inbox clutter and constant interruptions.

Your team stays focused on real work, not endless notifications.

Why Approved Systems

INKY isn’t just software – it’s a managed service.

When you choose Approved Systems, you get:

  • Setup and configuration handled for you
  • Ongoing monitoring and tuning
  • Local Australian support
  • Clear reporting and advice
  • A solution that grows with your business

We manage the technology so you can focus on running your business.

Get Started

Email attacks aren’t slowing down – they’re getting smarter.

MailSentinal gives your business enterprise‑grade email security without the complexity, backed by Approved Systems.

Contact us today to learn how MailSentinal can protect your organisation from modern email threats..

FAQs
INKY is an email protection product that uses sophisticated machine learning and artificial intelligence to analyze incoming messages for signs of phishing, spam, and other email-based threats.
The color-coded banners are inserted by INKY to alert you of any possible threats in your emails. The banners also display the email sender’s address and mark if an email is internal (from someone in your organization) or external. If you see these banners, it means that your IT staff has deployed INKY and included you in the group of protected users.

A gray banner indicates that INKY did not find anything unusual or suspicious about the message. Even though the message was not classified as threatening, you should always check the displayed sender address and the source type to be sure it makes sense (e.g., an external webmail address for a message from a colleague may be cause for concern).

A yellow banner indicates that INKY found something unusual about the email message. It is not necessarily phishing or dangerous but something you should be aware of. For example, a request for sensitive personal information should be given extra scrutiny. Mail that seems out of the ordinary or is spammy in some way may receive a yellow banner.

A red banner indicates that INKY thinks the message is suspicious and likely to be phishing or dangerous in some other way. This includes brand impersonations (e.g., a fake “account alert” email from your IT department), blocked phishing URLs, or attempts to spoof mail to look like it came from an internal company account.

Look carefully at who the mail is from and whether it is from someone you trust. Be especially careful about clicking any links in the body of the email or opening any attachments.
In most cases, you can simply delete the message and move on. In many INKY deployments, your IT staff, security team, or email administrator will configure your mail server to quarantine or delete “red-flagged” mail before it reaches your mailbox. In other cases, the mail will still be delivered with the banner telling you to be careful.
If you think INKY has made a wrong classification, or if you just want to confirm that INKY got it correct, click the “Report This Email” link found in the bottom right corner of each banner. This will take you to a web form where you can indicate that the message is truly Safe, Spam, or Phishing. You can also provide a comment describing your assessment. This feedback is used to automatically improve INKY’s predictions in the future. Your submissions are also manually reviewed to improve the overall system and ensure INKY provides the most accurate security possible.
Part of INKY’s protection is the ability to perform real-time checks on any links you click. If this feature is enabled, clicking on links in a yellow or red banner email will take you to a page reiterating that INKY found the message to be unusual or suspicious. In some cases, a message that originally only had a gray banner contains a link that is later detected as a dangerous phishing URL. In that case, when you click the link, INKY’s real-time check will detect you clicked on a bad link, and you’ll be met with a blocker page alerting you of that fact.
Click here to learn more about the product and how it works.

Videos

General Information

What is Email phishing?

Phishing attacks, often delivered via email spam, attempt to trick individuals into giving away sensitive information or login credentials. Most attacks are “bulk attacks” that are not targeted and are instead sent in bulk to a wide audience. The goal of the attacker can vary, with common targets including financial institutions, email and cloud productivity providers, and streaming services.The stolen information or access may be used to steal money, install malware, or spear phish others within the target organization. Compromised streaming service accounts may also be sold on darknet markets.

This type of social engineering attack can involve sending fraudulent emails or messages that appear to be from a trusted source, such as a bank or government agency. These messages typically redirect to a fake login page where users are prompted to enter their credentials.

What is Spear phishing?

Spear phishing is a targeted phishing attack that uses personalised messaging, especially e‑mails, to trick a specific individual or organization into believing they are legitimate. It often utilises personal information about the target to increase the chances of success. These attacks often target executives or those in financial departments with access to sensitive financial data and services. Accountancy and audit firms are particularly vulnerable to spear phishing due to the value of the information their employees have access to.