DST . Product FAQs. Thank you for using our products. DST UK

Size: px
Start display at page:

Download "DST EMAIL. Product FAQs. Thank you for using our products. DST UK www.dstsystems.co.uk"

Transcription

1 EFFECTIVE PERSONALISED PRINT AND E-COMMUNICATION SOLUTIONS DESIGNED WITH YOU IN MIND DSTSYSTEMS.CO.UK DST Product FAQs version 01 Thank you for using our products. DST UK

2 DST Key Facts and FAQs What s inside? What kind of can DST create and send? What services does DST provide? Where does the client data reside? What format does data need to be provided in? How is data handled? Is secure? Can be encrypted? Will s look like they come from me? How does DST send automated s? What is a retry? What is the retry process of the DST platform? What is a soft bounce? What is a hard bounce? How is an status determined after sending? Are there constraints and limitations to delivery? What is a Spam score? Does DST sell or provide mailing lists? Can I use bought mailing lists? What is the DST client engagement process? How much does cost? p3 p3 p4 p4 p5 p5 p6 p6 p7 p7 p7 p8 p9 p9 p10 p13 p14 p14 p15 p16 Do you have questions about DST and how it works? This document looks in-depth at some frequently asked questions about the DST platform and communications. DST is a platform you can trust to deliver your campaigns and support your customer communication strategy with expertise and precision. p2 DST Product FAQs

3 What kind of can DST create and send? All communications fall broadly into three categories: Ad-hoc and regular marketing bulk mailings. Automated triggered communications. Transactional messaging. DST can develop and manage customer communications by in all of these categories and in combination with other kinds of communications to provide you with end-to-end support of your customer communication strategy. s are personalised, targeted and dynamic, with further options for attachments and encrypted attachments. What services does DST provide? DST provides a full range of professional development and creative services to support delivery from one-off ad hoc campaigns to fully automated closed loop integrations with print output and archiving. For large scale deployments, developments, and integrations, technical consulting, project management, and creative design services can be provided. This includes advising on deployment options and documenting requirements. Creative Services: Artwork and HTML for s can be provided by the client or an agency or DST creative professionals can work with clients to develop collateral. Project Management: Depending on the scale of the requirements, DST can support development and implementation through complete project management. Analysis: Where a complex bespoke product integration needs to be implemented, an architect will work with you to understand your business requirements and document these in technical specification, to the development team. Development: All development and orchestration for systems is undertaken by DST developers and supported by full quality assurance testing and development operations involvement. DST Product FAQs p3

4 Where does the client data reside? Where required, data used for creating the s and the data in the composition and tracking engine is housed in the EU. For certain kinds of large volume marketing mailings the service provider may send data outside of the EU. How is data handled? Marketing/ad-hoc What format does data need to be provided in? DST handles data for two types of marketing/ad-hoc and transactional. Marketing/ad-hoc Marketing mailing list data can be provided as a delimited file using commas or vertical bar separators. The data is mapped in the sending engine and on-going updates and imports to that data can be made automatically. Fields can be added and removed by a DST system administrator to incorporate new and changing requirements. This data can be presented directly from client systems or, if required, can be first conditioned in a bespoke data transformation process to create the appropriate format. Transactional Transactional s are usually handled as part of the DST output production process. That process will include data transformation into the handling system s proprietary format. You can provide your data as usual for output processing and the processing application will ensure the data for is formatted appropriately for the workflow. Data for marketing channels is handled mainly in two ways: ad- hoc upload and automated ingestion. For automated ingestion the data format is set up in the DST system, data is dropped in a secure FTP location where a process for ongoing imports and updates to that mailing list will pick it up and present it to the system. Data can be appended, refreshed, or completely over written depending on the settings for the recurring import. p4 DST Product FAQs

5 How is data handled? (continued) For ad-hoc ingestion the data is provided via secure FTP and is picked up by an operator and uploaded directly to the system. If you have different formats to accommodate various communications this can also be accommodated in the DST system by creating different data sources for mailings. Transactional Transactional data is provided to the system as part of the output processing workflow. Data created for by the output processing applications is dropped in a secure location for onward processing. If the data needs to be transformed it will first be dropped in a secure location to be run through a bespoke transformation application before being sent to the processing pick-up location. Is secure? Regular is not considered to be a completely secure form of communication. DST works with you to understand what kind of information you want to send as part of an communication and can give advice as to how suitable that information is for sending by that channel. DST will always recommend that information in s is kept to anything that would do no harm if aired in the public domain or is already in the public domain. EG: names, addresses, phone number, insurance premium. Information that is not suitable for is anything that could be abused or used for unscrupulous purposes should that be intercepted. EG: credit card numbers, passport numbers, medical records. This does not exclude ing customers about their credit card statements. It means that those s cannot include the full credit card number. DST Product FAQs p5

6 Can be encrypted? can be made more physically secure through encryption. It must be noted that handling encrypted adds a level of complexity that most of your customers may not appreciate, and increases costs without being of great benefit. EG: There is no particular reason to include the full credit card or bank account number in an going to a customer. This information can be excluded or partially redacted in the . This is far more cost effective and customer friendly than implementing a system for managing passwords. The documents themselves can be encrypted as PDFs and the PDF can be attached to the . The customer can be made aware of their decryption credentials in a number of ways which can be discussed as part of implementation. Attachments can result in deliverability issues due to the suspicion with which service providers and servers treat s with attachments and also due to the size that some attachments may present. With over 50% of customers opening on a mobile device, large attachments eat into mobile data plans. Any encryption will require the management and communication of keys and passwords which can result in increased support requests from customers who have lost or forgotten passwords and increased costs to build and manage systems to handle the encryption. There are third party encryption services that require integration and account sign up by the end customer. This is usually viewed as inconvenient by customers and can lead to poor adoption of edelivery services. It is a far better approach to remove any security concerns by limiting or masking the information communicated through an inherently insecure medium. Will s look like they come from me? Yes, your customer will see the as coming from the address and name of your choice. This is known as domain spoofing. This allows you to be in complete control of your branding and customer facing communication design. When templates and campaigns are created, you can specify the FROM name and FROM address that customers will see when they receive the s. You can specify different FROM names and FROM addresses for different segments of your data for one run as long as there is something in the data that identifies the segment for a particular recipient. DST architecture and development services can work with you to understand your data and advise you on how this segmentation is best managed. p6 DST Product FAQs

7 How does DST send automated s? The data is presented to the system by DST s workflow orchestration. This can be dropped directly for ingestion or may come from another DST process. The s are created and assigned a unique ID. This is indexed with other information relevant to sending the and reconciling it with a reversion process if that is required. This information must be present in the data being handed off to the composition engine. EG: Any variables to be used in the body such as Name, Brand, etc. used for populating the . Where data has come from another DST output process all of the required reversion data is provided and stored as part of the process. EG: Address, document IDs. Before the s are sent the addresses are checked to identify any that are not formatted correctly and would be impossible to deliver. These are given a particular status that identifies them as Not Sent. EG: missing After this check, s are sent out through the DST gateway. What is a retry? A retry is functionality built into the DST system. It is there to manage errors sent back from receiving domains that could be temporary in nature. EG: An inbox might be full but will later have spaced freed up to receive more No intervention is required to retry an that has encountered such an error. The DST server software has an in built process for dealing with retries. Where delivery consistently fails the is then flagged with an error. What is the retry process of the DST platform? After the initial soft bounce error being received, the is placed in a deferred queue. After 15 minutes, the system attempts to deliver the again. If that attempt fails, the system doubles the time of the last wait period. Retries occur 15, 30, 60, 120, and 240 minutes after the first deferral. If the expiration time is reached without a successful delivery, then the system marks the message as failed and adds the information to the records. DST Product FAQs p7

8 What is a soft bounce? A soft bounce is an error issued from the receiving domain that could, after a certain amount of time, be rectified. It s also equally possible that the receiving domain will not fix the issue after the set amount of time for retrying (four hours) has elapsed. The record will retain its soft bounce error code but remain undelivered. Errors that are valid for the deferred queue and retrying are: Mailbox Full: Space may or may not be freed up within the four hour window. Inactive/Disabled Account: The account could be reactivated within four hour window. Greylist: Greylisting is determined by settings on the receiving domain so that it only accepts from domains with which it has established trust. One of the ways of establishing trust is to reject an and see if it re-sends. Server Too Busy: The receiving server could be less busy within the four hour window. Other: This covers what are low incidence errors. If this code is returned in high volumes then DST will instigate a consultation with their service provider to determine the cause. What is a hard bounce? A hard bounce is any error returned by the receiving domain that cannot be rectified or remediated by retrying the message. These are permanent errors that fall into several categories: Block, Hard Bounce, Technical, Invalid. Block Block errors are the result of the receiving domain rejecting communications because of the sending domain s reputation or other indications, maintained at a server level, that an is not to be trusted, could be spam, or looks like phishing. can also be blocked if previous recipients have complained about s from the sender or sending domain, the volume of s is suspiciously high, or the sending domain has been black listed. The best remediation strategy and defense for these errors is good and data practices. p8 DST Product FAQs

9 What is a hard bounce? (continued) Hard Bounce A Hard Bounce error code indicates that a particular record is undeliverable due to address or domain errors or status. These sorts of errors are usually caused by poor data practices. Making sure that addresses are accurately recorded and keeping mailing lists up to date is the most important part of making sure an gets to its intended recipient. Technical and Invalid Technical and Invalid error codes indicate that something went wrong with the internal network, there was an issue with the data, or other backend configuration issues. Once the cause is rectified, provided it is a sending domain issue, the s can be sent as normal. Block errors: Blacklist ISP block Content filter Spam URL Excess traffic Security violation or virus Technical error Block List practices Authentication User initiated block Hard Bounce: Unknown user Bad domain Address error Close account Other How is an status determined after sending? The receiving domain (where the recipient receives their ), can accept or reject each based on rules particular to the domain itself. Where an is rejected or cannot be received, the receiving domain communicates this back to the DST gateway as part of the protocol handshake process, and the record is updated with a bounce back status. There are instances where the receiving domain itself is found to be unavailable or invalid. This is also communicated back to the DST gateway and the bounce back status is updated. There are particular errors which will tell the gateway that it may be possible to try delivering the again after a particular number of minutes or seconds. These are knows as temporary errors. After a pre-set number of retries the gateway will give up trying to send the message and the error will become a permanent status. When the recipient performs an action in an such as downloading images or clicking a link, this is communicated to the DST gateway by the receiving domain and the record can be flagged as opened. DST Product FAQs p9

10 Are there constraints and limitations to delivery? Like postal delivery, there is no 100% way of knowing that the recipient of an has received the and read it. There are many factors, many analogous to postal delivery, that contribute to how deliverable an will be and how likely it is that the recipient will get it in their inbox and read it. Cleanliness of data Just like a paper letter, an must have a valid and existing address in order to get to the customer. The address must be valid and in a valid format. The domain the is going to must exist. The address itself must also exist. Engaging and relevant on the outside A customer is more likely to open and read (and thereby indicate a delivered status) an if the sender and subject are familiar, engaging, and relevant. In postal delivery this could involve making sure the name in the address block is personalised and correct and that the envelope indicates who the material is from. This can provide a compelling reason to open it and read the contents. communications have the added bonus of, unlike a paper communication, being able to tell the sender that the communication was actually opened and, in some cases, read and interacted with. Sender reputation There are other factors that are unique to the to bear in mind if choosing to communicate with customers in this way. Sender reputation is something that servers and domains use to determine if the entity sending the on your behalf is known for good practices. They also check if the domain in the FROM address is not in the habit of sending Spam (unsolicited mass marketing ). Royal Mail, for example, does not check the FROM address or ask who produced a particular letter before they deliver it. is not the same. There are strict laws governing when and how marketing s especially can be sent to people and also how an sender can obtain and use addresses for these purposes. Senders are identified based on their IP addresses. IP addresses are the internet s way of identifying machines that are connected to it and when an is sent, the machine from which it originated is identified as part of that machine communication process. p10 DST Product FAQs

11 Are there constraints and limitations to delivery? (continued) Sender reputation These addresses can be checked by receiving domains to ensure that they send on a regular basis and send only solicited communications. DST, as an communications provider, is very aware and protective of their IP address reputation and strives to ensure that it delivers only solicited and opted-in communications to your customers. Sender reputation is a complex issue that is dependent on many factors. The biggest factor being that recipients of never flag s coming from a particular IP or FROM address as Spam. That is why DST ensures that it engages only in the delivery of legitimate and solicited communications and works with clients to promote best practices. service provider and domain rules service providers and domains (GMAIL, Hotmail, private company domains) manage how they treat incoming on an individual basis. They set up rules that will ensure that Spam and malicious s are blocked from inboxes. They may set up filters that can block any that does not come from a pre- authorised source (rare for public service providers) and that comes from a list of IP addresses in disrepute. This is why DST s reputation as an sender is very important. It ensures that service providers trust s coming from our IP addresses. The paper equivalent would be leaving a note on your door listing all of the senders you don t want to get mail from for the mail delivery person to check. can also be rejected based on a more complex series of checks on content and source that result in a Spam score over an acceptable threshold. That would involve letting the mail delivery person open your mail and make a guess as to whether or not you might want it based on a loose set of rules that you and Royal Mail agree on. And your rules may be different from your neighbours! This is why DST works with you to ensure best practices are implemented. The landscape of service provider rules is constantly changing and being updated so that those service providers can ensure the best security and experience for their customers. DST has mechanisms in place to monitor these and make sure that communications are not disrupted. DST Product FAQs p11

12 What are SPF, DKIM, and DMARC records? In simple terms domain servers like to check if the domain from which the originated (this is invisible to the recipient) matches or is authorised to send mail on behalf of the FROM domain (what the recipient sees in the FROM address) and there are technical protocols (SPF, DKIM, and DMARC) within technology that deal with this. service providers and domains are very concerned with the origin of s coming in to their servers. It has become important to providers to have a system whereby receiving domains can check that an with a particular FROM address domain was sent by a third party that has permission to do so granted by that domain s owner. EG: InsuranceCompany.com would like to policy details to their customers but do not want to set up an infrastructure in the InsuranceCompany.com domain to create and send s. They ask DST to create and send s with a policy@ insurancecompany.com FROM address. When an service provider, such as GMAIL, sees the insurancecompany.com domain in the FROM address but can also see that the did not originate from the insurancecompany.com domain, that provider can look up the FROM address domain and check if the originating domain has permission to send s on behalf of insurancecompany.com. This is becoming critical to deliverability and DST works with you to ensure that all of these settings are configured correctly to ensure maximum deliverability. Size Although higher speeds and faster bandwidth have allowed communication to expand well beyond plain text and into media rich experiences, size can be still be a consideration. Inboxes do have limits and can be maxed out. Recipients don t want to use all of their mobile device data allowances on downloading large high resolution images or attachments. Some service providers have size limitations and treat attachments with suspicion. It is important to keep these points in mind when designing the s that are going to be sent. DST will work with you to make sure that communications are optimised for the delivery channel. p12 DST Product FAQs

13 Engagement domain servers, especially big providers like GMAIL and Yahoo are evolving ever more sophisticated mechanisms and algorithms to ensure that their customers are only getting s that are relevant to them. One of these factors is engagement. If many recipients are getting a lot of from a particular company or brand, the server can tell how engaging those s are through open rates and click rates. If one person interacts with from a particular brand but another person never opens the same then it becomes increasingly more likely that former will get those s in their inbox while for the latter they will go straight to the Junk folder without that person having to do anything. The big domains will also monitor for overall engagement. If only three people from a total mail shot of 100k open an then the domain is likely to treat another mail shot from the same company or brand (and possibly sender IP address) with suspicion. What is a Spam score? A Spam score is a number assigned by an domain server to all incoming s in order to determine if they are legally sent, solicited, relevant communications. Any communication receiving a score over an arbitrary threshold would be blocked. Spam scores used to be the only way domain servers had of trying to filter out Spam and they were not particularly sophisticated or accurate. Spam scores are becoming less relevant with domain servers preferring to use other more sophisticated mechanisms, such as SPF and DMARC, as well as IP reputation and engagement analytics, to make sure that only solicited and relevant communications end up in inboxes. Does DST sell or provide mailing lists? DST does not sell, or procure for the purposes for selling, data for or other forms of communication. DST Product FAQs p13

14 Can I use bought mailing lists? The short answer to this is DST will process the data provided. A better answer is bought data is not a good way of communicating with or procuring new customers. An even better answer is that such data opens the sender up to data protection questions about where and how the data was obtained and whether or not the individuals in the data agreed that they could be sent unsolicited s. There is no way of telling, using bought lists, if any of the individuals contained in the data are even remotely interested in a particular product or service. A better way of engaging and forging relationships: 1. Make sure you know your recepient and have a permission to them. 2. Make sure there s a reason to send them an about your product or service at that particular time. 3. Make your targeted, relevant, and engaging to your target customer. 4. Give them the ability to share your content by providing links, forwarding, and sharing capabilities in your . That is why DST ensures that it engages only in the delivery of legitimate and solicited communications and works with clients to promote best practices. What is the DST client engagement process? The client representative or a business analyst will meet with the client to determine what kind of is going to be sent: marketing, transactional, ad hoc, recurring, part of other output processes. In all cases, the high level process would involve the following steps: Client confirms that they would like to start sending communications. Business analyst gathers high level requirements. Time is scheduled with the development team to discuss data, creative, DNS configuration, and targeting requirements. A brief is written by the analyst detailing these requirements. If required, a high level design and estimate for development is given. A quote for projected volumes can be given. The client signs off the requirements and estimate. Development is scheduled. p14 DST Product FAQs

15 What is the DST client engagement process? (continued) The client is boarded in DST and Channel delivery services if they have not sent s with DST before. Creative materials may be supplied by the client at this point or they are provided by the DST creative team as per the brief. The development team executes the brief. Proofs and test s are sent to the client and deliverability is assessed. The client signs off on the development. s are scheduled and sent as per the requirements. Reports are obtained by the customer representative and sent to the client or can be extracted as part of a larger automated workflow development. Where s are part of a larger output workflow, reversion and follow up processes will also be executed as per requirements. How much does cost? Many clients are pursuing an electronic delivery strategy due to the much lower cost in comparison to traditional paper communications. delivery is charged on a per volume basis for the required type of regular, with attachment, with secure attachment. This is exclusive of data processing, workflow setup involving other systems, template setup, etc. For further information and advice on any aspect of the DST platform, please contact your DST client account manager. DST Product FAQs p15

16

Plan Create Deliver OVERVIEW THIS IS HOW DST EMAIL WORKS

Plan Create Deliver OVERVIEW THIS IS HOW DST EMAIL WORKS DSTEMAIL OVERVIEW Get the most out of your email communications. Let our professional team design stunning, fully responsive emails for your brand, set up and manage your mailing lists, deliver and track

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

Smart E-Marketer s Guide

Smart E-Marketer s Guide 30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step

More information

EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT

EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT PLATFORM PEOPLE STRATEGY EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT Contents p1 E-Newsletter Overview p2 E-Newsletter Sample p3 Forward Article p4 p5 p6 p7 Print Article Read More Subscription

More information

8/4/2015 Sphere 9.4.6 Sphere Email US

8/4/2015 Sphere 9.4.6 Sphere Email US Sphere Email Guide 8/4/2015 Sphere 9.4.6 Sphere Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010 Unica OnDemand Publication Date: January 19, 2010 N10014 Getting to the inbox N40002 Sending an email is something you do every day. Even when you send a single email, occasionally the message does not

More information

Reputation Monitor User Guide

Reputation Monitor User Guide August 18, 2015 Return Path, Inc. Table of Contents What is Reputation Monitor... 3 How Reputation Monitor Works... 4 What is a Sender Score... 5 How is a Sender Score Calculated... 5 Reputation Measures

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

Email Marketing Deliverability: Getting into the Inboxes of Healthcare Professionals. A Primer On Healthcare Email Marketing Part I

Email Marketing Deliverability: Getting into the Inboxes of Healthcare Professionals. A Primer On Healthcare Email Marketing Part I Email Marketing Deliverability: Getting into the Inboxes of Healthcare Professionals A Primer On Healthcare Email Marketing Part I Imagine you ve carefully crafted and designed a fantastic email marketing

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Email deliverability: The good, the bad and the ugly

Email deliverability: The good, the bad and the ugly Email deliverability: The good, the bad and the ugly An Experian Data Quality White Paper March 2015 CONTENTS Introduction...1 The good...2 Open rate...2 Click-through rate...3 Authentication...4 The bad...4

More information

How To Filter Email From A Spam Filter

How To Filter Email From A Spam Filter Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver

More information

Fundamental Tips for Leveraging Email to Drive Restaurant Sales: Part I

Fundamental Tips for Leveraging Email to Drive Restaurant Sales: Part I Fundamental Tips for Leveraging Email to Drive Restaurant Sales: Part I Getting your email message to the recipient s inbox is the first step in driving restaurant sales with email messages. This article

More information

How To Ensure Your Email Is Delivered

How To Ensure Your Email Is Delivered Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making

More information

DMA s E-Mail Authentication Requirement: FAQs and Best Practices

DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going

More information

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

6-Part Lunch Learning Series

6-Part Lunch Learning Series Deliverability Basics Thursday, March 21, 2013 12:00pm 12:30pm EDT #asaewebinar Presented by: Jenny Lassi Professional Services, HighRoadSolution This complimentary webinar is brought to you by HighRoad

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

CommuniGator. Avoiding spam filters

CommuniGator. Avoiding spam filters CommuniGator Avoiding spam filters How to dodge the junk box; deliverability and avoiding spam filters Email marketers often have more to battle with than just creating an email and sending it to their

More information

5 tips to improve your email database. An Experian Data Quality white paper

5 tips to improve your email database. An Experian Data Quality white paper 5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers

More information

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered... 1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5

More information

Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue.

Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue. Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue. Product Description In order to provide the best possible deliverability tool set, Eloqua has

More information

Inbox Monitor User Guide

Inbox Monitor User Guide September 15, 2015 Return Path, Inc. Table of Contents What is Inbox Monitor?... 3 How Does Inbox Monitor Work... 4 Seed Data... 4 Subscriber Data... 4 Getting Started with the Seed List... 5 How to Import

More information

Deliverability Best Practices by Tamara Gielen

Deliverability Best Practices by Tamara Gielen Deliverability Best Practices by Tamara Gielen Hello, my name is Tamara Gielen Blogger Community manager Speaker Independent consultant Trainer Based in Belgium 2010 Tamara Gielen BVBA all rights reserved

More information

Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability

Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability Introduction It s estimated that 70%* of all email is spam - not just unwelcome promotional messages, but phishing scams, hoaxes and

More information

Antispam Security Best Practices

Antispam Security Best Practices Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers

More information

The Top 10 Reasons You Need an Email Marketing Service. Email Marketing from Constant Contact

The Top 10 Reasons You Need an Email Marketing Service. Email Marketing from Constant Contact Email Marketing from Constant Contact The Top 10 Reasons You Need an Email Marketing Service Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com Email marketing

More information

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you. CONFIGURING THE ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like Challenge/Response, Whitelist and Blacklist. EnterGroup Anti-Spam

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107 A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that

More information

Service Launch Guide (US Customer) SEG Filtering

Service Launch Guide (US Customer) SEG Filtering Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required

More information

How to Stop Spam Emails and Bounces

How to Stop Spam Emails and Bounces Managing Your Email Reputation For most companies and organizations, email is the most important means of business communication. The value of email today, however, has been compromised by the rampant

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

The Guide to: Email Marketing Analytics"

The Guide to: Email Marketing Analytics The Guide to: Email Marketing Analytics" This guide has been lovingly created by Sign-Up.to we provide email marketing, mobile marketing and social media tools and services to organisations of all shapes

More information

Anchor s Email Marketing Glossary and Common Terms

Anchor s Email Marketing Glossary and Common Terms Anchor s Email Marketing Glossary and Common Terms A/B Split Test: A method used for testing the response of sending two different email campaigns to two equal segments of an email list. Marketers can

More information

Migration Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER

Migration Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER Migration Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction It seems like it should be so simple to migrate from one email service provider (ESP) to another. Good

More information

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...

More information

How emails are sent from Xero

How emails are sent from Xero How emails are sent from Xero Technical discussion In June 2013 we made a change to the way emails are sent from Xero. Some of our users have asked us why the change was necessary and whether we are planning

More information

Email Deliverability. Best Practices for Getting to the Inbox

Email Deliverability. Best Practices for Getting to the Inbox Email Deliverability Best Practices for Getting to the Inbox About Real Magnet Real Magnet develops digital marketing technologies with a focus on Email and Marketing Automation. Its full-featured platform

More information

Email Marketing Do s and Don ts A Sprint Mail Whitepaper

Email Marketing Do s and Don ts A Sprint Mail Whitepaper Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations

More information

ExchangeDefender. Understanding the tool that can save and secure your business

ExchangeDefender. Understanding the tool that can save and secure your business ExchangeDefender Understanding the tool that can save and secure your business OVERVIEW The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting.

More information

INBOX. How to make sure more emails reach your subscribers

INBOX. How to make sure more emails reach your subscribers INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes

More information

USER GUIDE. Mailjet in webcrm

USER GUIDE. Mailjet in webcrm USER GUIDE Mailjet in webcrm Table of contents 1. Mailjet (mailjet.com); good news for high deliverability and excellent tracking... 2 2. Email On Behalf Of... 2 3. SPF records... 3 4. DKIM-feature for

More information

Why should I get someone else to send my email campaign when my CRM/IT Team/web host/can do it?

Why should I get someone else to send my email campaign when my CRM/IT Team/web host/can do it? Why should I get someone else to send my email campaign when my CRM/IT Team/web host/can do it? The most important reason to outsource the delivery of your email campaign is often not what people consider

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

Setting up and controlling E-mail

Setting up and controlling E-mail Setting up and controlling E-mail Two methods Web based PC based Setting up and controlling E-mail Web based the messages are on the Internet accessed by dial-up or broadband at your Internet Service Provider

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

Email Reputation Metrics Troubleshooter. Share it!

Email Reputation Metrics Troubleshooter. Share it! Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,

More information

CONFIGURING FUSEMAIL ANTI-SPAM

CONFIGURING FUSEMAIL ANTI-SPAM CONFIGURING FUSEMAIL ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like FuseFilter, Challenge/Response, Whitelist and Blacklist.

More information

WEBMAIL USER MANUAL AN INTRODUCTION TO WLINK WEBMAIL. Table of content:

WEBMAIL USER MANUAL AN INTRODUCTION TO WLINK WEBMAIL. Table of content: WEBMAIL USER MANUAL Table of content: An introduction to Wlink WebMail Interface guide Read/Delete Email Compose/Send Email Attachment Searching Email Message filter Spam setting Whitelist/Blacklist Email

More information

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007 COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different

More information

Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:...

Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:... Table of Contents Recommendation Summary... 3 Technical:... 3 Creative:... 3 Introduction... 4 Formatting Recommendations... 5 JavaScript:... 5 Forms:... 5 Background Tags and Colors:... 5 Html Text:...

More information

Mastering the JangoMail Messages Tool

Mastering the JangoMail Messages Tool JangoMail Tutorial Mastering the JangoMail Messages Tool With JangoMail, you can compose and send your messages from the section labeled, Messages. Start by clicking Messages in the navigation bar. Click

More information

MIDDLE EAST POST BOX. - Opt-In Direct Marketing -

MIDDLE EAST POST BOX. - Opt-In Direct Marketing - Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other. The

More information

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know Software Solutions Digital Marketing Business Services Email Marketing What you need to know Contents Building Your Email List 1 Managing Your Email List. 2 Designing Your Emails 3 Branding Your Emails.....

More information

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail. Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform

More information

SMTPSWITCH MAILER V6 FEATURES

SMTPSWITCH MAILER V6 FEATURES SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Guidelines for E-mail Account Management and Effective E-mail Usage

Guidelines for E-mail Account Management and Effective E-mail Usage Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government

More information

Improving Email Deliverability

Improving Email Deliverability Improving Email Deliverability A focus on what happens after you hit the send button and the role of a SMTP Relay Service Provider April 2010 1 Introduction Email deliverability has become one of the hot

More information

Top 40 Email Marketing Terms You Should Know

Top 40 Email Marketing Terms You Should Know 1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion

More information

Improve Email Deliverability with a Dedicated IP

Improve Email Deliverability with a Dedicated IP WHITE PAPER Improve Email Deliverability with a Dedicated IP Improve Email Deliverability with a Dedicated IP by Chris Kolbenschlag, Director of Deliverability at Bronto Software Deliverability is a primary

More information

AntiSpam QuickStart Guide

AntiSpam QuickStart Guide IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...

More information

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

API Guide v 1.6 14/11/2013

API Guide v 1.6 14/11/2013 1 About netcore netcore is a leader in digital communications space. The mission of the company is to help clients communicate effectively for marketing and business needs. We help organizations in the

More information

The What, Why, and How of Email Authentication

The What, Why, and How of Email Authentication The What, Why, and How of Email Authentication by Ellen Siegel: Director of Technology and Standards, Constant Contact There has been much discussion lately in the media, in blogs, and at trade conferences

More information

You ve got. Best practices for email deliverability. Microsoft Dynamics Marketing

You ve got. Best practices for email deliverability. Microsoft Dynamics Marketing You ve got Best practices for email deliverability Microsoft Dynamics Marketing Table of Contents Summary & author introduction Getting into the inbox with grace If you don t know, now you know: terms

More information

turbosmtp New Dashboard Handbook

turbosmtp New Dashboard Handbook turbosmtp New Dashboard Handbook DASHBOARD Real-Time Stats This control panel gives you a quick and general sight of your mailing's results: that is, all the interactions that your recipients have made

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

INinbox Start-up Pack

INinbox Start-up Pack 2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the

More information

Email Getting Started Guide Unix Platform

Email Getting Started Guide Unix Platform Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses

More information

Track-able Bulk Management System

Track-able Bulk Management System Track-able Bulk Management System Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. WHAT IS TRACK-ABLE BULK MANAGEMENT SYSTEM?... 3 3. TRACK-ABLE BULK MANAGEMENT SYSTEM... 4 4. CONCLUSION...13

More information

Who will win the battle - Spammers or Service Providers?

Who will win the battle - Spammers or Service Providers? Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. (pranaya.enugulapally@tcs.com) Abstract Spam is abuse

More information

Email Marketing Buyer's Guide

Email Marketing Buyer's Guide Knowledge Guide: Email Marketing Buyer's Guide In-House Versus Hosted Email Marketing Solution virtualroi May 2009 by: Sally Lowery Online Marketing Manager Email Marketing Buyer's Guide This whitepaper

More information

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the

More information

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Current mail infrastructure Mail service in numbers: ~18 000 mailboxes ~ 18 000 mailing lists (e-groups)

More information

Why Content Filters Can t Eradicate spam

Why Content Filters Can t Eradicate spam WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate

More information

Email List Cleansing: Questions Answered

Email List Cleansing: Questions Answered Email List Cleansing: Questions Answered 1. Introduction to email cleansing 2. How do email addresses become invalid? 3. How is Sender Reputation determined? 4. How does an email address validator check

More information

The Guardian Digital Control and Policy Enforcement Center

The Guardian Digital Control and Policy Enforcement Center Protects Against The Guardian Digital Control and Policy Enforcement Center P R O T E C T S A G A I N S T : Viruses Unsolicited Junk Email Malicious Code Internet Fraud & Phishing Hazardous File Attachments

More information

Understanding & Improving. Email Deliverability

Understanding & Improving. Email Deliverability Understanding & Improving Email Deliverability Table of Contents What is Email Deliverability? 3 The Importance of Email Deliverability 4 The 4 Stages of Email Deliverability 4 1. Network Level 5 2. Server

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE

SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE SIMPLE STEPS TO AVOID SPAM FILTERS SECTION 1 UNDERSTANDING THE BASICS Marketing emails account for most this is spam complaints, 70% in fact, which explains the scrutiny some marketers see applied to their

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Feature Comparison Guide

Feature Comparison Guide Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...

More information

DMARC and your.bank Domain. September 2015 v

DMARC and your.bank Domain. September 2015 v DMARC and your.bank Domain September 2015 v EMAIL MAKES IT EASY FOR CRIMINALS TO REACH YOUR CUSTOMERS USING YOUR BRAND Phishing and brand abuse erode consumer trust Attacks cause lasting brand damage Fallout

More information

The Power of Email Marketing

The Power of Email Marketing The Power of Email Marketing Connect. Inform. Grow. Copyright 2008 Constant Contact Inc. Introduction This presentation has three parts Connect, Inform, and Grow Connecting to build customer relationships

More information

Email Data Management Best Practices

Email Data Management Best Practices Email Data Management Best Practices September 17, 2008 These Best Practices have been developed by the IAB Email Committee. About the IAB Email Committee: The Email Committee is dedicated to removing

More information

Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER

Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER CONTENT FILTERS 2 Introduction Content- based filters are a key method for many ISPs and corporations to filter incoming email..

More information

Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH.

Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH. Consequences of Spam and Virus Filtering for the E-Mail System 22C3 Introduction 12 years of spam... 24 years of SMTP... Things have changed: SMTP is no longer enough. Spam filters, virus filters are part

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

A quick guide to... Permission: Single or Double Opt-in?

A quick guide to... Permission: Single or Double Opt-in? A quick guide to... Permission: Single or Double Opt-in? In this guide... Learn how to improve campaign results by sending new contacts a confirmation email to verify their intention to join. Table of

More information

How To Use Neolane

How To Use Neolane Neolane White Paper: Neolane s Email Leadership Simplify your 360 degree email process, from targeting, creation and content management, automation, one-to-one personalization, routing onto deliverability

More information

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets

More information

The top 10 reasons to use Constant Contact s Email Marketing Service

The top 10 reasons to use Constant Contact s Email Marketing Service The top 10 reasons to use Constant Contact s Email Marketing Service Email marketing is one of the most powerful marketing tools available for developing customer and client relationships. To do effective

More information