Deliverability 101. #amplify International Business Machines Corporation
|
|
- Lizbeth Ariel Harrison
- 8 years ago
- Views:
Transcription
1 Deliverability 101
2 Jeff Dellapina Deliverability and Provisioning Manager
3 Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2
4 Agenda Deliverability Terms Sends Authentication How Recipients Impact your Deliverability Improving Sender s Behavior Questions 3
5 Why is Deliverability Important? Increase Revenue Increase and protect Brand Recognition and Reputation Increase Automation Decrease Marketing Costs Reduce Risks Service Interruptions due to Blacklisting Phishing attempts that dilute brand trust Job Interruptions 4
6 Deliverability Terms 5
7 Bounce Categories Hard Bounce Permanent Failed Message Bad Mailbox Bad Domain Soft Bounce Temporary Failed Message Inactive Mailbox Everything else that is not a hard bounce. 6
8 Bounce Types In Stream Error messages provided by receiving server during the live mail transfer. Out of Stream Error messages provided by recipient server after message is successfully accepted. 7
9 Bulking, Blocking and Blacklisting Bulked - Message is delivered but sent to the Junk Folder Block - The destination server is refusing to accept due to ISP/Inbox Provider send practice violations Blacklist - List of IP addresses or domains that individuals or enterprises use to filter due to send practice violations 8
10 Spamtraps Digital Venus Flytraps A spam trap is an abandoned address that was shut down and after 6-12 months is re-activated Eliminate spam traps Inactive addresses older than 12 months should not be sent marketing mail Create Re-engagement mailing Segment inactive list by age Begin a re-engagement mailing Use a confirmed or double opt-in to prevent spamtraps Eliminate inactive addresses where you have no opt-in data for that address 9
11 IP Ramp-Up A process within the VMTA that limits the volume of during initial sends to specific ISPs. This ramping of the IP will build the reputation with different ISPs Aol is limited to 1,200 Yahoo and Hotmail are set to send 5,000 on the first send. Segmenting your data into buckets Ramp up any domain that makes up a 10 % or more of your list Sending same volume for 30 days to turn off Auto Ramp-up 10
12 Feed Back Loops Certain ISPs send recipient abuse complaint details back to Silverpop. The abuse complaint is marked in the mailing reports The problem address is added to the Master Suppression List Abuse complaints can generate weeks, months, years after the initial send. These complaints from previous mailings impact today s mailings People that click abuse do so for 3 reasons: No memory Relevant Frequency 11
13 What happens when I hit send? 12
14 Engage Builds and Sends a Mailing The list and creative gets uploaded to Engage and you hit Send Engage begins Blocking which is the blending of list/content Engage checks addresses against the Master Suppression List Engage hands off the mailings to the sending server - your VMTA The VMTA is actually 3 sending servers that connect to all ISPs. Error messages provided by receiving server during the live mail transfer. Most common Connections are made to each ISP and corporate domain. During this connection bad addresses are returned Depending on send size, mail may exit 1 server or all 3 servers at once. 13
15 After the Send All the results of the mailings are picked up by a service called Response Master Response Master manages all opens/clicks, unsubscribes and bounces. That data gets pushed back into Engage for Reporting. Other deliverability data gets moved to Deliverability tables and accessed by my team. This data includes bounce and delivery logs. This data populates the Deliverability Dashboard within the Support portal Allows our team to answer client questions and possible delivery concerns. 14
16 What to Expect with a Large Send When clients send to larger lists we can expect to see the following metrics: A higher than normal number of suppressed addresses. Overall slower delivery of depending on existing IP reputation. Greater risk of bouncing due to sending thresholds and complaints. Depending on the age/activity of the addresses, a higher than normal opt-out rate and abuse complaint rate. 15
17 Authentication 16
18 Authentication Sending authenticated means making sure proper DNS records are in place on the from or sending domain used in the mailings. SPF Record DKIM Record DMARC Record 17
19 Authentication SPF Record / Sender ID Silverpop can send on behalf of e.company.com e.company.com TXT v=spf1 ip4: all Actual Error message :: Hotmail - smtp;550 (COL0-MC4-F6) command rejected due to Sender ID test failing for IP Please ensure this IP is authorized to send mail on behalf of [companyname.com]. 18
20 Authentication DKIM Record Original Message Sent was the Same Message Received Reduces Screen Scraping Used by Yahoo for Feed Back Loops to manage abuse processing spop1024._domainkey.e.example.com. IN TXT "k=rsa; p=mfwwdqyjkozihvcnaqebbqadswawsajbalrpcztsoe3y863bclav91ft XKrLUymFwH9nOxFkJmMKdCRdcQo3dcIKDPn1lZqdXVfa7TFVVQVs 19
21 Authentication DMARC Record Domain-based Message Authentication, Reporting & Conformance Text Record that monitors the listed domain against various Spoofing and Phishing attempts Implemented in Stages None Monitor Don t do anything but report what is happening Quarantine Push aside any message that fails DMARC Reject Delete any message from any source not listed within DMARC 20
22 Authentication DMARC Record _dmarc.silverpop.com TXT What domain do we want to monitor? What do we do with failures? What percentage of mail do we want monitored? Where do we send these reports? 21
23 Authentication DMARC Record DMARC Report 22
24 Authentication DMARC Record - Agari The largest ISPs are now pushing next-gen authentication (DMARC) hard Google, Y!, Hotmail/Microsoft, AOL, etc have all adopted DMARC Over 2Bn mailboxes: 85% of US consumers and 70% International consumer are covered Better deliverability and classification by ISPs By authenticating properly Get ahead of the curve authentication will be a de facto necessity soon Stop criminals from using your brand to abuse your consumers Achieve better tracking and visibility globally 23
25 Authentication DMARC Record - Agari Seeing Threats from Around the World 24
26 How Recipients Impact your Deliverability 25
27 Recipient Behavior IP Reputation Delivery Rate - Throttling Placement Bulk Folder or Inbox 26
28 Recipient Behavior IP Reputation Opens build the IP reputation Opens tell the ISP that the mailings are wanted Moving message from Bulk folder to Inbox Forwarding the message 27
29 Recipient Behavior - Throttling 3 Types of Throttling At the Engage Level At the VMTA Level At the ISP Level The first 2 listed are outbound throttling. The ISP is inbound throttling ISPs use Internal / External IP reputation scores to determine throughput This is very important for clients sending time sensitive mailings 28
30 Recipient Behavior Inbox Placement Positive Behavior = Inbox placement Opening Moving from Bulk folder to Inbox Negative Behavior = Bulk folder or bounced Deleting without reading Clicking the Abuse Button Placement Bulk Folder or Inbox 29
31 Improving Sender s Behavior 30
32 Improving Sender Behavior Lead Source Frequency Send Time Optimization Call to Action 31
33 Improving Sender Behavior Lead Source Organic Double Opt-in Send Confirmation s No Pre-Populated Check Boxes Avoid List Purchases and Affiliate Marketing 32
34 Improving Sender Behavior - Frequency Set Expectations - At the time of sign-up Preference Center - Allow self management Snooze Feature Take a break Polling or Engagement Campaign Create Interest When in Doubt- Don t Send 33
35 Improving Sender Behavior Send Time Optimization Shortens Idle Time - Between Sends and Opens Conversation - The quick turnaround looks like a discussion Staggered Sends Throughout the day versus a blast Pavlov s Dog Mail is sent and mail is opened 34
36 Improving Sender Behavior Assorted Items Why Should I click Brand Development Subscribed/Unsubscribe Change up Mailings - A/B Subject Line and Content Testing Why Buy the Cow? - Preview Pane 35
37 HouseKeeping 36
38 Silverpop Engage Certification Self Improvement Add personal value / Job Search Product Knowledge/Features Currently Free to complete at your own pace Attend a 3 day dedicated boot-camp for faster certification 37
39 Links SPF DKIM DMARC Gmail Bulk Senders Guidelines CASL - fightspam.gc.ca/eic/site/030.nsf/eng/home CAN-SPAM
40 39
41 Tell us what you think! Be on the lookout for a survey in the follow up later this week. We appreciate your feedback! 40
42 Notices and Disclaimers Copyright 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. 41
43 Notices and Disclaimers (con t) Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera, Bluemix, Blueworks Live, CICS, Clearcase, Cognos, DOORS, Emptoris, Enterprise Document Management System, FASP, FileNet, Global Business Services, Global Technology Services, IBM ExperienceOne, IBM SmartCloud, IBM Social Business, Information on Demand, ILOG, Maximo, MQIntegrator, MQSeries, Netcool, OMEGAMON, OpenPower, PureAnalytics, PureApplication, purecluster, PureCoverage, PureData, PureExperience, PureFlex, purequery, purescale, PureSystems, QRadar, Rational, Rhapsody, Smarter Commerce, SoDA, SPSS, Sterling Commerce, StoredIQ, Tealeaf, Tivoli, Trusteer, Unica, urban{code}, Watson, WebSphere, Worklight, X-Force and System z Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: 42
No CRM, No FTP, No Problem?
No CRM, No FTP, No Problem? Everyone can build a customer journey. Chris Beaven Email Marketing Coordinator Towergate Insurance Direct 1 Mapping your ideal journey 2 TIP 1: Find out what your ideal customer
More informationRequirements Change Management and Artifact Workflow. DOP-1027 DOORS Next Generation
Requirements Change Management and Artifact Workflow DOP-1027 DOORS Next Generation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
More informationADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery
ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery Carm Janneteau, Product Manager, Watson Analytics Robert Hatfield, Development Manager, Watson
More informationTransformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535
Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535 Ryan Dennings Auto-Owners Insurance Company October 28, 2015 2015 IBM Corporation Overview Auto-Owners Insurance
More informationIBM Watson IoT Platform Analytics Real-Time Insights. Wayne Riley
IBM Watson IoT Platform Analytics Real-Time Insights Wayne Riley What Does IoT Real-Time Insights Do? Performs analytics on IoT data as in arrives at the IBM Watson IoT Platform Analytics applied immediately
More informationThe Weakest Link: Ethically Hacking the Connected Building. Paul Ionescu IBM X-Force Ethical Hacking Team
The Weakest Link: Ethically Hacking the Connected Building Paul Ionescu IBM X-Force Ethical Hacking Team Please Note: IBM s statements regarding its plans, directions, and intent are subject to change
More informationB2B Omni-channel Marketing with IBM Marketing Cloud MCL-1825
B2B Omni-channel Marketing with IBM Marketing Cloud MCL-1825 Dale Price, Sr. Offering Manager, IBM Nickolas Wyatt, Marketing Manager, SUPPLY.com B2B Marketing and Buying Trends B2B Customers Customers
More informationCryptographic Keys Life Cycle Management for your Company
Cryptographic Keys Life Cycle Management for your Company Session: SAD-6800 Torben Aaes-Jørgensen, Crypto Competency Center Agenda 1 Relevance of Encryption technologies 2 IBM Crypto Competency Center
More informationDeliverability 201. #amplify15. 2015 International Business Machines Corporation
Deliverability 201 Jeff Dellapina Deliverability and Provisioning Manager Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at
More informationJOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences
JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences 09/09/2015 #ibmamplify @elianetozman and @jbrett 2015 IBM Corporation PLEASE NOTE: IBM s statements regarding its plans, directions,
More informationBBP-2665 IBM BPM Process Modeling Experience on the Web
BBP-2665 IBM BPM Process Modeling Experience on the Web Victor Chan STSM, IBM BPM Tools & User Interface Thu, 25-Feb 11:30 AM - 12:15 PM Mandalay Bay SOUTH - Reef Ballroom D Please Note: IBM s statements
More informationBring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer
Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer Please Note: IBM s statements regarding its plans, directions,
More informationMNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India
MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India Abhijit Thosar, ICICI Bank Limited Nishant Kulkarni, IBM Introduction ICICI Bank is an is an Indian
More informationYS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions. Eddie Lin IBM STSM, DS8000 Architecture edlin@us.ibm.
YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions Eddie Lin IBM STSM, DS8000 Architecture edlin@us.ibm.com Please Note: IBM s statements regarding its plans, directions,
More informationTaking the next hot mobile video game live with Docker and IBM SoftLayer. Scott Porter, Daniel Krook, Shaun Murakami
Taking the next hot mobile video game live with Docker and IBM SoftLayer Scott Porter, Daniel Krook, Shaun Murakami Agenda Mobile video gaming on the cloud The video gaming market in 2016 Typical mobile
More informationEnterprise Java Monitoring on z/os: Discover, Alert, Optimize. Chris Walker IBM
Enterprise Java Monitoring on z/os: Discover, Alert, Optimize Chris Walker IBM Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
More informationHow IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience
How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience MBM-5829 Thorsten Gau (@tgau) IBM Distinguished Engineer v04 Zurich Insurance is... helping customers understand and protect
More informationProvably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)
Provably Secure Data Protection in the Cloud ICDES (IBM Cloud Data Encryption Services) Agenda Cloud Security and Intro to ICDES Manish Aggarwal, IBM, Offering Manager Cloud Client Case Study: Crohn s
More informationHelp!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016
Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016 Notices and Disclaimers Copyright 2016 by International
More informationSoar into the API Economy by Moving Services and Metadata. from WSRR to IBM API Connect
Soar into the API Economy by Moving Services and Metadata from WSRR to IBM API Connect Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
More informatione-shot Unique Deliverability
e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is
More informationSCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
More informationSmart E-Marketer s Guide
30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step
More informationDeliverability Best Practices by Tamara Gielen
Deliverability Best Practices by Tamara Gielen Hello, my name is Tamara Gielen Blogger Community manager Speaker Independent consultant Trainer Based in Belgium 2010 Tamara Gielen BVBA all rights reserved
More informationKeynote: Cyber Intelligence and Cyber Security Overview
3/08/205 Keynote: Cyber and Cyber Security Overview David Waxman Executive Architect EIA Bob Stasio EIA for Cyber Security Product Manager Ralph Klaassen Senior Architect EIA 3/08/205 Important Disclaimer
More informationDeliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
More informationAn Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
More informationHow To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
More informationEmail Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
More informationEmail AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
More informationPlanning@Scale: Adopting IBM DevOps and the Scaled Agile Framework. Subtitle here
Ro Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework Subtitle here Please Note: Ro IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
More informationUnica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010
Unica OnDemand Publication Date: January 19, 2010 N10014 Getting to the inbox N40002 Sending an email is something you do every day. Even when you send a single email, occasionally the message does not
More informationDST EMAIL. Product FAQs. Thank you for using our products. DST UK www.dstsystems.co.uk
EFFECTIVE PERSONALISED PRINT AND E-COMMUNICATION SOLUTIONS DESIGNED WITH YOU IN MIND DSTSYSTEMS.CO.UK DST EMAIL Product FAQs version 01 Thank you for using our products. DST UK www.dstsystems.co.uk DST
More informationEmail deliverability: The good, the bad and the ugly
Email deliverability: The good, the bad and the ugly An Experian Data Quality White Paper March 2015 CONTENTS Introduction...1 The good...2 Open rate...2 Click-through rate...3 Authentication...4 The bad...4
More informationEmail Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
More information8/4/2015 Sphere 9.4.6 Sphere Email US
Sphere Email Guide 8/4/2015 Sphere 9.4.6 Sphere Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,
More informationBlackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
More informationINinbox Start-up Pack
2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the
More informationIBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the products that it supports, read the information in Notices on page 3. This document applies
More informationYSS-1841 IBM Cloud Storage Options. Tony Pearson IBM Master Inventor and Senior Software Engineer
YSS-1841 IBM Cloud Storage Options Tony Pearson IBM Master Inventor and Senior Software Engineer Cloud Storage Taxonomy Ephemeral Storage Typically boot volumes, page files and temporary data Goes away
More informationINBOX. How to make sure more emails reach your subscribers
INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes
More informationz/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
More informationEloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue.
Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue. Product Description In order to provide the best possible deliverability tool set, Eloqua has
More informationEmail Marketing Workshop
Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation
More informationBest Practices: How To Improve Your Survey Email Invitations and Deliverability Rate
Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Below, you will find some helpful tips on improving your email invitations and the deliverability rate from a blog post
More informationIBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all
More informationYou ve got. Best practices for email deliverability. Microsoft Dynamics Marketing
You ve got Best practices for email deliverability Microsoft Dynamics Marketing Table of Contents Summary & author introduction Getting into the inbox with grace If you don t know, now you know: terms
More informationAnchor s Email Marketing Glossary and Common Terms
Anchor s Email Marketing Glossary and Common Terms A/B Split Test: A method used for testing the response of sending two different email campaigns to two equal segments of an email list. Marketers can
More information10 Ways to Improve B2B Email Deliverability:
From First Click to Lifetime Customer 10 Ways to Improve B2B Email Deliverability: Expert Insights on How You Can Better Deliverability 10 WAYS TO IMPROVE B2B EMAIL DELIVERABILITY: Expert insights on how
More information2792 - Leveraging WebSphere Commerce for Search Engine Optimization (SEO)
2792 - Leveraging WebSphere Commerce for Search Engine Optimization (SEO) Walfrey Ng, Development Manger, WebSphere Commerce Srini Rangaswamy, Product Manager, WebSphere Commerce IBM s statements regarding
More informationIBM Tivoli Service Request Manager 7.1
IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager
More informationDMA s E-Mail Authentication Requirement: FAQs and Best Practices
DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going
More informationEnhanced Customer Engagement through Email - A Croma & Experian CheetahMail Success Story Experian Marketing Services Experian and the marks used herein are service marks or registered trademarks of Experian
More informationDatabase lifecycle management
Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand
More informationHow to Stop Spam Emails and Bounces
Managing Your Email Reputation For most companies and organizations, email is the most important means of business communication. The value of email today, however, has been compromised by the rampant
More information6-Part Lunch Learning Series
Deliverability Basics Thursday, March 21, 2013 12:00pm 12:30pm EDT #asaewebinar Presented by: Jenny Lassi Professional Services, HighRoadSolution This complimentary webinar is brought to you by HighRoad
More informationCommunications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
More informationDataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
More informationMIDDLE EAST POST BOX. - Opt-In Direct Marketing -
Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other. The
More informationReputation Monitor User Guide
August 18, 2015 Return Path, Inc. Table of Contents What is Reputation Monitor... 3 How Reputation Monitor Works... 4 What is a Sender Score... 5 How is a Sender Score Calculated... 5 Reputation Measures
More informationA White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107
A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that
More informationCS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
More informationWHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application
WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the
More informationKnowledge Guide: Deliverability. Your Reputation Holds the Key to Deliverability. virtualroi May 2009. by: Return Path
Knowledge Guide: Deliverability Your Reputation Holds the Key to Deliverability virtualroi May 2009 by: Return Path Your Reputation Holds the Key to Deliverability Twenty percent of legitimate email never
More informationIBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467
IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467 Brian E Wilson IBM Cloud Middleware Connectivity & Integration Solution Architect Member of the
More informationHow to Engage Your Contacts Using Email Marketing
How to Engage Your Contacts Using Email Marketing We will be starting at 2:00 pm EST. Use the Question Pane in GoToWebinar to Ask Questions! CHAT WITH US: 1 Using the question pane shown above 2 Use the
More informationMCH Channel_e Email Best Practices for Marketers
MCH Channel_e Email Best Practices for Marketers Best Practices for Marketers Communicating with your prospects and customers through email is a popular channel that provides almost immediate response.
More informationImprove Email Deliverability: Tactics for Handling Complaints and Boosting Reputation. Sponsored by
Improve Email Deliverability: Tactics for Handling Complaints and Boosting Reputation Sponsored by Introductions Adam T. Sutton, Senior Reporter MarketingSherpa / MECLABS Primary Research @AdamTSutton
More informationDIGITAL MARKETING SERIES DELIVERABILITY: GETTING TO YOUR CUSTOMER S INBOX
DELIVERABILITY: GETTING TO YOUR CUSTOMER S INBOX DIGITAL MARKETING SERIES EMAIL RULE #1 If it doesn't make it to the inbox, it's a wasted effort. How do you avoid the digital black hole? With tested best
More informationWebSphere Commerce V7.0
IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version
More informationEnterprise Email Marketing: The 8 Essential Success Factors
Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing
More informationThe Grande Guide To Email Deliverability and Privacy
The Grande Guide To Email Deliverability and Privacy What s a Grande Guide? We know what the typical day is like for marketers. After all, we are marketers ourselves. Between strategy sessions, impromptu
More informationeprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
More informationEMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT
PLATFORM PEOPLE STRATEGY EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT Contents p1 E-Newsletter Overview p2 E-Newsletter Sample p3 Forward Article p4 p5 p6 p7 Print Article Read More Subscription
More informationEmail Marketing Do s and Don ts A Sprint Mail Whitepaper
Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations
More informationThree pillars of successful email deliverability
Three pillars of successful email deliverability Ensuring safe arrival and optimum placement in the inbox An Experian Marketing Services white paper Contents Introduction...1 Data integrity...2 Relevance...3
More informationIBM Cognos Controller Version 10.2.1. New Features Guide
IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies
More informationTable of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:...
Table of Contents Recommendation Summary... 3 Technical:... 3 Creative:... 3 Introduction... 4 Formatting Recommendations... 5 JavaScript:... 5 Forms:... 5 Background Tags and Colors:... 5 Html Text:...
More informationIBM Cognos Controller Version 10.2.0. New Features Guide
IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies
More informationMicrosoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
More informationGet to the Inbox Ten Top Tips to Maximize Your Email Deliverability
Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability Introduction It s estimated that 70%* of all email is spam - not just unwelcome promotional messages, but phishing scams, hoaxes and
More informationCommuniGator. Avoiding spam filters
CommuniGator Avoiding spam filters How to dodge the junk box; deliverability and avoiding spam filters Email marketers often have more to battle with than just creating an email and sending it to their
More information5 tips to improve your email database. An Experian Data Quality white paper
5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers
More informationEmail Marketing Features
Email Marketing Features JPC s Email Marketer includes everything you need to create, send and track professional HTML emails. It is fullyfeatured email marketing software which has been developed by marketing
More informationWHITE PAPER SEPTEMBER 2008. Make It Into the Inbox. Co-authored by Jaren Angerbauer and Shaneli Ramratan
THE DIGITAL MARKETING COMPANY WHITE PAPER SEPTEMBER 2008 The 10 Commandments of Email Delivery Make It Into the Inbox Co-authored by Jaren Angerbauer and Shaneli Ramratan In the world of email marketing
More informationEmail Best Practices 101
Email Best Practices 101 15 Proven Tactics for Boosting Deliverability and Engagement BY KATE NOWROUZI Email Best Practices 101 Boosting your inbox rates begins with an understanding of how your tactics
More informationeprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
More informationData is at the heart of deliverability
FOR ADESTRA CLIENTS ONLY! Page 1 of 5 Data is at the heart of deliverability Introduction Following an in-depth project by Adestra into deliverability in the UK a common theme has emerged. Your data management
More informationNew SMTP client for sending Internet mail
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server New SMTP client for sending Internet mail z/os Communications Server Development, Raleigh, North Carolina This presentation
More informationTop 40 Email Marketing Terms You Should Know
1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion
More information1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...
1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5
More informationz/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
More informationJava and Other Languages
Java and Other Languages Chris Bailey: STSM, IBM Runtime Monitoring 2015 IBM Corporation A Quick Survey 2 Percentage of Audience What languages do you use? 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Java
More informationAn Oracle Best Practice Guide March 2012. Best Practices for E-Mail Marketing
An Oracle Best Practice Guide March 2012 Best Practices for E-Mail Marketing Introduction... 1 Ensuring E-Mail Marketing Success Through Best Practices... 2 1. Design Processes to Facilitate Your Marketing
More informationEmail Deliverability: Optimizing Your Email Marketing Strategy. Version 1.0.08: September 7, 2008 Presented by: Angela McKay CRM Business Analyst
: Optimizing Your Email Marketing Strategy Version 1.0.08: September 7, 2008 Presented by: Angela McKay CRM Business Analyst Version 1.0.08 Table of Contents Table of Contents... 2 About this Document...
More informationeprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
More informationEmail Marketing Features
Email Marketing Features intouch Email Marketer is a true all-in-one communications platform and includes everything you need to create, send and track professional HTML emails, autoresponders, surveys,
More informationE-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
More informationEnsure holiday emails reach the inbox
Ensure holiday emails reach the inbox 2013 2014 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Information
More informationName: Srinivasan Govindaraj Title: Big Data Predictive Analytics
Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics Please note the following IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
More information