CONCEP CAMPAIGNER TECHNICAL & SECURITY DOCUMENT

Size: px
Start display at page:

Download "CONCEP CAMPAIGNER TECHNICAL & SECURITY DOCUMENT"

Transcription

1 CONCEP CAMPAIGNER TECHNICAL & SECURITY DOCUMENT Contents Introduction... 3 Overview... 3 Technical Specifications... 3 Data backup... 3 Web publishing... 3 ISP s and client software compatibility... 3 Subscriber Data and List Management... 4 Import and exporting lists of addresses... 4 Mailing groups... 4 Opt-outs... 4 Message Development... 5 HTML... 5 Message storage... 5 Images surveys & polls... 5 Event invitations... 6 SPAM compliance... 6 Message format... 6 Personalisation Capabilities... 6 Message Delivery... 7 Bounce and Response Management... 7 Reporting... 8 Training And Support... 8 Security... 8 General Security... 9 Audits... 9 Security Issue Measures... 9 Logging... 9 Cross Training on environment... 9 Physical Security Equipment Hosting Infrastructure environment Personnel access Storage and transport of media containing data Network Security Customer Separation Host Security Infrastructure security Security Vulnerability Notifications and Information Monitoring Password Policies Client account creation Web Security Disclosure of specific configuration files by the client Programming or scripting languages used Quality Assurance testing E GROUP@CONCEPGLOBAL.COM W CONCEPGLOBAL.COM

2 Security Testing and certification Code Review Confidentiality

3 INTRODUCTION Overview This document defines the technical and security standards of Concep Campaigner. TECHNICAL SPECIFICATIONS Concep works closely with and utilises the services of leading hosting and security companies to ensure the highest availability of our systems. We always monitor new technological developments to help maximise delivery. If any client has a specific requirement beyond our current offering we will always review and use that technology if a tangible benefit can be justified. Data backup No data is ever purged and all historical campaign data is kept indefinitely. Incremental backups to tape are taken every evening with full backups made on weekends. Backup tapes are held on-site. Tapes are held on-site in a secure environment. Snap-shot backups are taken in the same frequency and held on-site to online storage in case of bare metal / physical failures. These snap shots are taken of each server in its entirety so recovery time can be minimized and no re-configuration is necessary. Web publishing Each individual campaign sent from Concep campaigner automatically creates its own web version which may then be published online. Newsletters are posted on the web via a link from an external site. They can then be found via Google and other search engines if referred to by a public web site, otherwise they can not be indexed. ISP s and client software compatibility Concep has relationships and is whitelisted with all major ISP s including AOL, Hotmail, Yahoo, BT Internet and MessageLabs. We work with them and our deliverability and reputation partner, Habeas (see to constantly improve coverage and deliverability. Some formatting exceptions have been noted in older versions of Lotus Notes and Novell Groupwise but, as the HTML rendering capability of these clients improves, this is becoming less of an issue. There are several techniques employed by Concep campaigner to ensure that campaigns are viewed as intended. Two examples are links to web versions in the HTML and plain text message formats. 3

4 Concep s s have been fully tested throughout the wide spectrum of environments by external companies such as Test Partners ( and due to the quality controls in our template creation process we are able to achieve reliable results. The rendering feature within Concep campaigner allows users to test how campaigns will look across 48 variants of clients and settings. SUBSCRIBER DATA AND LIST MANAGEMENT Concep s list management functionality is both flexible and easy to operate. This means that users at all levels will be able to easily import, export and share data and results. Import and exporting lists of addresses Data can be imported and exported into the system address book from Microsoft Excel spreadsheet, CSV file format, Outlook, as well as Salesforce. If integrated (e.g. with InterAction) data import and export between the two systems would simply be at the click of a button, using XML data transfer. Lists are automatically de-duplicated and erroneous addresses are removed upon import. The results are reported separately so bad data can be corrected. Mailing groups Unlimited group lists may be maintained. Shared groups may also be set-up across system sub-accounts. Lists may be compiled from multiple sources, such as a scenario where a single list may be compiled from addresses that are imported, manually added and automatically added through a subscription form. Opt-outs Concep campaigner provides an opt-out mechanism within the to opt-out of further s from the account (or sub-account) from which the is sent. Depending on client requirements, a second facility can be created using a unsubscribe from all address or subscription management page. A central repository of all opt-out addresses can then be maintained. Concep does not allow s to be sent to any address in that account where the recipient has unsubscribed, though their record remains for reference and reporting purposes. 4

5 MESSAGE DEVELOPMENT Concep campaigner is extremely user friendly so that it can be used at any level within an organization. It provides the controls that a corporate head office requires to ensure that corporate branding is adhered to and there are Quality Assurance mechanisms in place. HTML Concep campaigner does not require the user to have any knowledge of HTML or require them to have any other technical capacity. The campaign creation process is driven by pre-defined templates; these have switch-on/switch-off editable areas and functionality such as question/answers and comment boxes. The system is extremely intuitive, providing users with assistance via a unique messaging system at each step as well as a help and knowledge centre to answer specific queries. Text is also inserted via a Rich Text Editor so when editing content any user familiar with Microsoft Word can use it with no problem. Message storage Messages may be categorised by location, department and type. There is a search and file facility in each account to store related campaigns. Generally different departments and locations will work from different accounts. Existing messages may be copied or saved as. The user may copy messages within an account or to another user (i.e. across accounts) Images Images may be added to campaigns. These files are located on an image file storage area on one of Concep s servers. Attachments may also be added, but these are in the form of downloadable files, not physical attachments to the . The current limit is 5MB, though it is possible that this may be increased if required. Concep does not recommend that this limit is increased. Downloads of these files are tracked within the system reporting. surveys & polls Templates may incorporate a question & answer facility which can be activated easily by the user, and used as a poll or survey. Once answered the results are stored within the system for action by the system user. A thank-you message appears for the recipient after the answer/response is submitted. surveys are easily created within Concep campaigner. A survey-specific template should be developed and utilised for the purpose of an survey. The user has the option of multiple choice, multiple select and free-text answers for their survey questions. The 5

6 survey is held within the itself, not on a webpage like most other E-survey tools. This means a higher response rate is achieved. The results can then be exported as an Excel spreadsheet, and diagrams (pie charts etc) may be cut and pasted to external applications. Event invitations Concep campaigner has an intuitive ersvp functionality that can be switched on for an eventspecific campaign and allows the user to set multiple sessions for an event whilst setting guest number limits. It also provides recipients with the ability to determine their attendance (and for which session, if multiple sessions utilised), complete the details of any guests and choose their own preferences for the event. A powerful tool when combined with the Q&A functionality. SPAM compliance There is a SPAM checking device which provides feedback to the user on the various characteristics of their campaign which are SPAM-like, based on the latest edition of Spam Assassin. Messages may be previewed before they are delivered and an unlimited number of test messages may be sent prior to the campaign going live, including testing of delivery to major ISP s. Message format Concep campaigner sends two types of , but four types of are actually achievable. 1. The multi-part packet is made up of a HTML version and; 2. A plain text version. If HTML cannot be viewed, the recipient will receive a plain text message which includes a link to the live campaign as a full web page, so that all reporting elements can be activated. This plain text message can also have; 3. The entire copy of the campaign inserted if desired. There is also a; 4. Print or Mobile version, which simplifies the table structure of the full HTML version and removes the interactive functionality so that viewers can easily print out the campaigns or view on Blackberry and other PDA/mobile devices. Personalisation Capabilities marketing campaigns delivered by Concep campaigner may be as personalised as the user deems fit (e.g. Dear <Firstname> ). Concep works closely with its clients to advise on 6

7 such things as levels of personalisation required. Any information stored in the address book can be mail merged for personalisation. There is a limit of 30 personalised fields within the address book. Fields can be customised to match database fields. The subject line is customisable for each mailing. The textual from line customisable for each mailing. The from address customisable for each mailing. The from address may be setup to be a sub-domain of the client Spoofing is not allowed, DNS entries must be made for the sub-domain to point to our server so mail filters can perform reverse DNS checks and verify the sender. This leads to increased delivery rates. The will only show one recipient in the to field when delivered to the recipients Inbox. MESSAGE DELIVERY Concep ensures that the volume placed on the system is low in comparison to our competitors and that messages are always delivered in a timely fashion. Campaigns can be scheduled to be sent immediately and clients can monitor delivery as it progresses via real time reporting. The status of the campaign s own send progress is displayed, so the user will know at what point the campaign has been successfully sent based on a percentage sent monitor in the reporting area. (i.e. 20% sent, 100% sent etc). Messages may also be scheduled to be delivered on a certain day, at a certain time. BOUNCE AND RESPONSE MANAGEMENT For bounces that are unable to be classified by the rules within the system with 100% accuracy, there is a manual process undertaken every four hours to ensure that no valid comments or replies are lost. Concep campaigner differentiates between hard and soft bounces. Hard bounces are automatically set to do not mail, though the user can manually reset a bounce count to zero to restore an address if required. Bounce codes are explanations in plain English (User not found, Mailbox full etc). Out-of-office replies are automatically ignored. Both hard and soft bounces are flagged and available after every campaign is delivered. The bounce management rules are based on those provided by ListNanny ( 7

8 REPORTING Concep campaigner s reporting system captures all interactions at an individual level to empower the user to make informed follow-ups, through an extremely user-friendly interface. The following are reported on with every campaign delivered: - Number of s sent - Delivery rate - Number of s opened - Number of unique opens - Click-throughs - Unique click-throughs - Comments/replies received via the comment box - Answers to questions: free text and multiple choice - RSVP responses - Opt Outs - Files downloaded - Location viewed based on IP address - Domains viewed and not viewed - Pages viewed (Multi-page) - External Website Tracking Plain-language names may be used for tracked links and reporting is updated in real time. Reports may be exported in.xls format. TRAINING AND SUPPORT Training is delivered to new users in two hour sessions which cover basic campaign building and reporting functions. Getting Started guides are provided within the system, as well as tutorials and online footnotes so personal training is not always necessary, but an option. A help centre may be activated at no extra charge, containing both a knowledge centre and the ability to submit queries. Advanced training is supplied to clients who need to support others in their organization. Due to Concep campaigner s simplicity of use, advanced training is not often required, though an overview of the administration components of the system (such as account management and work-flow) are provided to new clients. Notification of changes to legislation to such things as spam laws are made to our clients via our Client care bulletins. The Client Care feature update newsletter is delivered every month which provides an overview of new functionality. Online help guides and tutorials are also updated. SECURITY 8

9 GENERAL SECURITY Audits Concep may grant prospects and clients to conduct non-destructive audits if necessary, and can make physical access available to hosted solutions. Non-intrusive network audits (basic port scans, etc.) may be done randomly, without prior notice. More intrusive network and physical audits will require permission, and a fee will be payable to Concep to extend technical support during the testing period. Concep solutions are held at the NTT Europe Online s state of the art hosting facility in London. Concep can arrange access to these facilities if desired by the client. Security Issue Measures In the event a security issue is identified, Concep has the abilities to perform the following functions: Disable the account for web (external) access Remove/delete all data from a specified account (all data is held in back-ups offsite) Shut-down firewall to block all external access if security breach is extreme, as this is a shared environment. These measures will only be taken if necessary and are appropriate. Logging In terms of the machines we utilise Windows Server Event Log and security auditing to record and report on server and access events (including failed and successful logins). We also use GFI to monitor and centrally maintain these logs, through the built in security in GFI we limit access to this information to the same staff which have access to the live environment. At an application level we have implemented a notes feature that records database updates to client and user settings as well as performance and failure monitoring to ensure uptime and application stability. Cross Training on environment Concep has ensured that appropriate cross training is in place to insure that the loss of a single employee or group of employees does not jeopardize the availability of the application. The software is developed and managed by truelogic Pty Ltd, who have five employees (out of a total 14) capable of supporting the application and trouble-shooting issues. The infrastructure is supported by NTT Europe Online s global support desks which comply with ISO27001 certification. 9

10 PHYSICAL SECURITY Equipment Hosting The equipment is held in a highly secure data centre provided by NTT Europe Online in London, with full access control procedures. Infrastructure environment All servers in the NTT infrastructure are held in fully secured environments with access given only to technicians. Personnel access Access to the environment hosting the application is strictly managed by NTT Europe Online. Storage and transport of media containing data Full backups are performed on a weekly cycle by NTT Europe Online by tape and stored on-site in a storage area to which NTT Europe Online technical staff only have access permission. Incremental backups are taken every 24 hours by NTT Europe Online. Snapshot backups are also taken every 24 hours by NTT Europe Online and held in on-site network storage. truelogic perform additional backups of the database to our online backup server. NETWORK SECURITY Customer Separation The ASP architecture of Concep campaigner allows for multiple clients to run on the same infrastructure. The proposition and associated pricing is based on a temporary-access licence to the existing shared infrastructure. Deploying the application on client-specific infrastructure is currently not an option due to prohibitive pricing and support requirements. HOST SECURITY Infrastructure security NB: The hosting infrastructure for Concep campaigner is not client specific. The following information relates to Campaigner s shared infrastructure. We apply all security patches for Windows Server 2003 as required/released. Our hosting provider, NTT Europe Online, keeps up-to-date on current vulnerabilities that may affect our environment, and applies patches as they become available. Critical updates are implemented within 24 hours. Administration access to the application server is monitored and audited by truelogic. The machines are also configured with a low attack horizon as well as being firewalled to only allow access on specific ports from authenticated environments (e.g. remote access is only enabled from the VPN at truelogic's office. Non-destructive penetration tests are routinely performed and the application has met and retains security certification criteria. 10

11 Security Vulnerability Notifications and Information Security monitoring is carried out through the use of NTT Europe Online s IntelliSecurity Managed Security Solutions which include: - Firewall Hardware - Setup and Configuration - Installed and Hosted in NTT Europe Online Data Centres - Secure Customer Portal - 24/7 proactive management of threats Further details are provided in the attachment provided. Monitoring NTT Europe Online monitor and alert Concep via on all availability alerts. truelogic monitor additionally and the system and checks the infrastructure and application specific metrics to ensure correct functioning of the application. Password Policies Infrastructure Only truelogic developers and approved NTT Europe Online employees have access through the firewall to the application infrastructure. Application Due to the diverse range of users, no password policy is enforced centrally by Concep for the Campaigner application itself however if a basic password is detected the application alerts the user upon every login. Client account creation Accounts are created by the admin (master) account upon request and receipt of account information via from the end user. Account creation is a manual input exercise through the development administration system, to which only key personnel have access. Accounts are set up with an expiry date equivalent to the licence agreement and period defined. Expired accounts are automatically blocked from accessing the system. Accounts can be terminated immediately upon request to Concep. WEB SECURITY Disclosure of specific configuration files by the client Concep will review requests upon receipt, but in principle have no objection to client requests for such information. However, we would need clarification of the extent of configuration files as we would not be prepared to disclose any confidential source code of the application. 11

12 Programming or scripting languages used The solution is built using Microsoft ASP technology. ActiveX controls are used in the rich text editor and graphing (ChartFX - reporting) software. Javascript is also used for some elements of the user interface. The backend is a combination of VBScript (the active server pages) and a compiled DLL s written in VB and C. The database is SQL Quality Assurance testing The development team perform numerous tests on the system internally to ensure security of the architecture. These tests are done using the exploits which are published that relate to any of our technology pieces and our detailed knowledge of the internal workings of the system. This includes tests for SQL injection, form injection, IIS exploits, URL injection, etc. We also ensure that any development is done to a set of standards to ensure session information is never passed to the client interface, thus preventing user impersonation. Further elaboration can be provided here based on specific requirements. Security Testing and certification The application is tested by Security Alliance on an annual basis for certification. Code Review The development team employs a peer review process, whereby the code written by one developer is reviewed by another before being placed onto the staging environment. The review focuses on a number of aspects including performance, and security. Any questions/concerns are discussed and appropriate resolutions made to the code. CONFIDENTIALITY This area is covered by the standard contract between Concep and our clients. 12

EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT

EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT PLATFORM PEOPLE STRATEGY EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT Contents p1 E-Newsletter Overview p2 E-Newsletter Sample p3 Forward Article p4 p5 p6 p7 Print Article Read More Subscription

More information

How To Create A Campaign On Facebook.Com

How To Create A Campaign On Facebook.Com Seriously powerful email marketing, made easy Table of Contents DOTMAILER QUICK START GUIDE... 3 Main Screen... 4 Getting Started... 6 STEP 1: CAMPAIGN SETTINGS... 7 STEP 2: CAMPAIGN CONTENT... 8 Editing

More information

Anchor s Email Marketing Glossary and Common Terms

Anchor s Email Marketing Glossary and Common Terms Anchor s Email Marketing Glossary and Common Terms A/B Split Test: A method used for testing the response of sending two different email campaigns to two equal segments of an email list. Marketers can

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Smart E-Marketer s Guide

Smart E-Marketer s Guide 30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step

More information

G-Lock WPNewsman WordPress Plugin Reviewer s Guide

G-Lock WPNewsman WordPress Plugin Reviewer s Guide G-Lock WPNewsman WordPress Plugin Reviewer s Guide 1 Table of Contents This document is your reviewer's guide for G-Lock WPNewsman WordPress Plugin. It is designed to provide you with information you need

More information

The Essential Email Marketing Glossary

The Essential Email Marketing Glossary By Ryan P. M. Allis ASP - Application Service Provider. ASP s provide internet based software. Access - Database software. Part of the Microsoft Office Suite. Organizations often store customer data in

More information

Table of Contents. Table of Contents 3

Table of Contents. Table of Contents 3 User Guide EPiServer 7 Mail Revision A, 2012 Table of Contents 3 Table of Contents Table of Contents 3 Introduction 5 About This Documentation 5 Accessing EPiServer Help System 5 Online Community on EPiServer

More information

dotmailer for Dynamics Frequently Asked Questions v 6,0

dotmailer for Dynamics Frequently Asked Questions v 6,0 for Dynamics Frequently Asked Questions v 6,0 Page 1 Contents Introduction... 2 Why should I use the Microsoft Dynamics CRM Connector for dotmailer?... 3 What software needs to be installed?... 3 Can I

More information

G-Lock EasyMail7. Startup Guide. Client-Server Email Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit http://easymail7.

G-Lock EasyMail7. Startup Guide. Client-Server Email Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit http://easymail7. G-Lock EasyMail7 Client-Server Email Marketing Solution for Windows Startup Guide 1 Table of Contents This document is your startup guide for G-Lock EasyMail7 product. It is designed to provide you with

More information

SMTPSWITCH MAILER V6 FEATURES

SMTPSWITCH MAILER V6 FEATURES SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor

More information

BackupAssist Settings tab User guide

BackupAssist Settings tab User guide User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Settings overview... 2 2. Settings tab selections... 3 Backup user identity... 3 Email server settings... 4 Email address list...

More information

E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6

E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6 E-Mail Campaign Manager 2.0 Marketer's Guide Rev: 2014-06-11 E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6 Marketer's Guide User guide for marketing analysts and business users Table of Contents Chapter

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

8/4/2015 Sphere 9.4.6 Sphere Email US

8/4/2015 Sphere 9.4.6 Sphere Email US Sphere Email Guide 8/4/2015 Sphere 9.4.6 Sphere Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,

More information

How to Create and Send Newsletter Using G-Lock EasyMail

How to Create and Send Newsletter Using G-Lock EasyMail How to Create and Send Newsletter Using G-Lock EasyMail Beginner s Guide 1 Page Table of Contents 1. Create E-Mail Account 3 2. Create Contact Group. 5 3. Import Contacts from External Database. 6 4. Compose

More information

Exchange mailbox users can access their email from anywhere using the Outlook Web Access

Exchange mailbox users can access their email from anywhere using the Outlook Web Access EXCHANGE EMAIL CONFIGURATION Outlook Web Access and Outlook Anywhere Outlook Web Access Exchange mailbox users can access their email from anywhere using the Outlook Web Access (OWA) facility. This may

More information

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

Email Marketing System Options

Email Marketing System Options System Options Different Systems for Different Users We run various different types of systems for different users based on their email marketing requirements. If you have your own email marketing system

More information

Employee Active Directory Self-Service Quick Setup Guide

Employee Active Directory Self-Service Quick Setup Guide Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:

More information

Penetration Test Report

Penetration Test Report Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System

More information

Top 40 Email Marketing Terms You Should Know

Top 40 Email Marketing Terms You Should Know 1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion

More information

Optus EmailSMS for MS Outlook and Lotus Notes

Optus EmailSMS for MS Outlook and Lotus Notes Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights

More information

The Top 10 Reasons You Need an Email Marketing Service. Email Marketing from Constant Contact

The Top 10 Reasons You Need an Email Marketing Service. Email Marketing from Constant Contact Email Marketing from Constant Contact The Top 10 Reasons You Need an Email Marketing Service Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com Email marketing

More information

An overview of designing HTML emails for Hotmail, Yahoo, Outlook, Lotus Notes and AOL

An overview of designing HTML emails for Hotmail, Yahoo, Outlook, Lotus Notes and AOL An Emailcenter briefing: Can your customers read your email newsletters? An overview of designing HTML emails for Hotmail, Yahoo, Outlook, Lotus Notes and AOL November, 2004 Emailcenter research has shown

More information

The Challenge. The Solution: Yesmail Deliverability Intelligence

The Challenge. The Solution: Yesmail Deliverability Intelligence The Challenge As digital marketing continues to grow, email remains one of the most popular, successful and cost-effective digital channels. Due to the ever-increasing volume of marketing emails, however,

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

Vector HelpDesk - Administrator s Guide

Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

2. Consultancy and Support

2. Consultancy and Support G-Cloud Services 4 Service Definition Grant Management Services Lot 3 1. CC Grant Tracker 2. Consultancy and Support Submitted By: Dave Allan CC Technology Ltd 375 West George St Glasgow G2 4LW dave.allan@cctechnology.com

More information

By the end of this section, you will be able to: Create an Email Campaign Link Email Campaign to Interest Category. Populate Initial Campaign Audience

By the end of this section, you will be able to: Create an Email Campaign Link Email Campaign to Interest Category. Populate Initial Campaign Audience Email Campaigns Overview...2 EXERCISE 4.1: View an Email Message...3 Review: Constituent360 Groups...4 Key Concept: Email Campaigns...6 Email Campaigns...8 Email Calendar...9 Creating a New Campaign...

More information

SimplyCast emarketing Email User Guide

SimplyCast emarketing Email User Guide SimplyCast emarketing Email User Guide Email User Guide Page 1 Contents 1. Email Overview... 3 2. Features Overview... 3 3. Email Editor Features... 8 4. How to Create an Email Campaign?... 5 5. Additional

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Benefits to you. Account & Contact Management. Sales & Quotations Marketing & Campaigns Customer Service & Support Project & Event Management

Benefits to you. Account & Contact Management. Sales & Quotations Marketing & Campaigns Customer Service & Support Project & Event Management Account & Contact Management Sales & Quotations Marketing & Campaigns Customer Service & Support Project & Event Management Benefits to you Work as a team see a unified view of each customer accessible

More information

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au info@ezims.com.au

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

Unsubscribe and Bounce Management

Unsubscribe and Bounce Management JangoMail Summary and Overview Tutorial Unsubscribe and Bounce Management JangoMail provides robust and flexible unsubscribe and bounce management capabilities. Individual addresses or entire domains can

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

Microsoft Exchange Online from BT. Service Description (Shared Platform)

Microsoft Exchange Online from BT. Service Description (Shared Platform) Microsoft Exchange Online from BT Version 5.1 January 2004 Confidentiality statement All information contained in this document is provided in confidence for the sole purpose of adjudication, and shall

More information

Membership Management

Membership Management Membership Management MEMNET is an Australian owned and built Membership and Event Management Solution designed to streamline your administration and to enhance member experience. MEMNET has extensive

More information

Create, attract, retain and delight customers, profitably. HubSpot Connector

Create, attract, retain and delight customers, profitably. HubSpot Connector CRM for Marketing Create, attract, retain and delight customers, profitably Maximizer s built-in marketing tools mean you can simply and effectively plan, budget, execute, analyse and optimise all aspects

More information

Guardian Digital Secure Mail Suite Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................

More information

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010 Unica OnDemand Publication Date: January 19, 2010 N10014 Getting to the inbox N40002 Sending an email is something you do every day. Even when you send a single email, occasionally the message does not

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Microsoft Office 365 from Vodafone. Administrator s Guide for Midsize Businesses and Enterprises

Microsoft Office 365 from Vodafone. Administrator s Guide for Midsize Businesses and Enterprises Microsoft Office 365 from Vodafone Administrator s Guide for Midsize Businesses and Enterprises Contents Footer bar Return to contents page Go to next of section Return to start of section Previous page

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

Email Marketing Features

Email Marketing Features Email Marketing Features intouch Email Marketer is a true all-in-one communications platform and includes everything you need to create, send and track professional HTML emails, autoresponders, surveys,

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

Email Marketing Solution

Email Marketing Solution Create, Send and Track perfect email campaigns. Our solution is the quickest, safest and easiest method of doing all three. Create your email with a custom built templates and our easy to use editor or

More information

Technical specifications

Technical specifications Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

The Guide to: Email Marketing Analytics"

The Guide to: Email Marketing Analytics The Guide to: Email Marketing Analytics" This guide has been lovingly created by Sign-Up.to we provide email marketing, mobile marketing and social media tools and services to organisations of all shapes

More information

How To Understand The History Of A Webmail Website On A Pc Or Macodeo.Com

How To Understand The History Of A Webmail Website On A Pc Or Macodeo.Com iservice Business Intelligence Reports Guide A guide for users of the iservice Customer Interaction Solution. This user guide is intended for users of the iservice system. It is not intended to provide

More information

How to choose the right email marketing partner for you

How to choose the right email marketing partner for you How to choose the right email marketing partner for you Over the past 3 years, there has been a 15% year on year increase in visitors who are interested in email marketing at the Technology for Marketing

More information

The Beginner s Guide to G-Lock WPNewsman Plugin for WordPress: Installation and Configuration

The Beginner s Guide to G-Lock WPNewsman Plugin for WordPress: Installation and Configuration The Beginner s Guide to G-Lock WPNewsman Plugin for WordPress: Installation and Configuration Summary G-Lock WPNewsman is a nice WordPress plugin for collecting subscribers using the confirmed opt-in method

More information

SECURE MESSAGING PLATFORM

SECURE MESSAGING PLATFORM SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

NetWrix Exchange Mail Archiver Version 1.5 Administrator Guide

NetWrix Exchange Mail Archiver Version 1.5 Administrator Guide NetWrix Exchange Mail Archiver Version 1.5 Administrator Guide Contents 1. Introduction... 3 1.1. What is the NetWrix Exchange Mail Archiver?...3 1.2. Product Architecture...4 1.3. Licensing...5 1.4. System

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Forfront, Renaissance House, 32 Upper High Street, Epsom KT17 4QJ www.forfront.com 020 3320 8777

Forfront, Renaissance House, 32 Upper High Street, Epsom KT17 4QJ www.forfront.com 020 3320 8777 e-shot tm features Forfront, Renaissance House, 32 Upper High Street, Epsom KT17 4QJ www.forfront.com 020 3320 8777 CONTENT Campaigns --------------------------------------------- 3 Creation Tools ----------------------------------------

More information

Your guide to email marketing

Your guide to email marketing Your guide to email marketing Precept 2016 Entering the world of email marketing can seem pretty daunting. Especially if your business has never done email marketing. But emails are actually a great way

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Document Revision Date: Sept. 11, 2012 Policy Based Encryption Gateway Admin Guide i Contents Description of Policy Based Encryption... 1 Policy Based

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:...

Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:... Table of Contents Recommendation Summary... 3 Technical:... 3 Creative:... 3 Introduction... 4 Formatting Recommendations... 5 JavaScript:... 5 Forms:... 5 Background Tags and Colors:... 5 Html Text:...

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Successful Email Marketing

Successful Email Marketing Successful Email Marketing Twitter: susanhallam Web: www.hallam.biz Blog: www.hallam.biz/blog LinkedIn: susanhallam Email: Susan@Hallam.biz Digital Marketing Agency 2011 Hallam Communications Ltd Page

More information

Vodafone Email Plus. User Guide for Windows Mobile

Vodafone Email Plus. User Guide for Windows Mobile Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...

More information

EVERYTHING YOU NEED TO KNOW ABOUT EMAILCONDUCTOR

EVERYTHING YOU NEED TO KNOW ABOUT EMAILCONDUCTOR EVERYTHING YOU NEED TO KNOW ABOUT EMAILCONDUCTOR (AND THEN SOME...) General Information EmailConductor is a mature application now in its seventh major release, and is being used by more than 60 financial

More information

datatrac Want to maximize your online ROI? ABOUT datatrac you ve come to the right place.

datatrac Want to maximize your online ROI? ABOUT datatrac you ve come to the right place. ABOUT datatrac Datatrac is a leading ASP of hosted e-mail marketing software that allows permission-based marketers to manage, send, track, and grow their e-mail campaigns. Leading marketers have incorporated

More information

Email Marketing Features

Email Marketing Features Email Marketing Features JPC s Email Marketer includes everything you need to create, send and track professional HTML emails. It is fullyfeatured email marketing software which has been developed by marketing

More information

Email Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) 834-7577 x125

Email Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) 834-7577 x125 Email Marketing 201 How a SPAM Filter Works Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) 834-7577 x125 Mark Feldman NetProspexVP Marketing mfeldman@netprospex.com (781) 290-5714 www.twitter.com/pinpointe

More information

Email Reputation Metrics Troubleshooter. Share it!

Email Reputation Metrics Troubleshooter. Share it! Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

Statement of Service Enterprise Services - AID Microsoft IIS

Statement of Service Enterprise Services - AID Microsoft IIS Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Cybersecurity Health Check At A Glance

Cybersecurity Health Check At A Glance This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange

More information

Cloud Services. Cloud Control Panel. Admin Guide

Cloud Services. Cloud Control Panel. Admin Guide Cloud Services Cloud Control Panel Admin Guide 10/18/2014 CONTENTS Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 3 Creating an Encryption

More information

Hosted Email Managed by Email Specialists

Hosted Email Managed by Email Specialists Hosted Email Managed by Email Specialists The Mailtrust email system is the premium hosted email platform that provides your business with powerful, secure, and reliable email with absolutely no maintenance

More information

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions. Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds

More information

WHAT IS EMAIL MARKETING

WHAT IS EMAIL MARKETING Intelligent VC provide industry leading email marketing solutions, including an easy to use in-house platform as well as a host of managed solutions and services. Create and send visually engaging HTML

More information

Platform Overview WWW.GETRESPONSE.COM

Platform Overview WWW.GETRESPONSE.COM Platform Overview WWW.GETRESPONSE.COM Enterprise Solutions Quick Facts 300+ staff Offices in Warsaw, Gdansk, Moscow, Halifax and Wilmington GetResponse is an Email Marketing and Online Campaign Management

More information

Sending an email through Convio can be accomplished by the following six steps:

Sending an email through Convio can be accomplished by the following six steps: Convio Training Table of Contents Overview... 5 Getting Started... 5 Logging into Convio... 5 Six Steps to Convio Success... 5 Adding Names to the Convio Database... 5 Preparing/Formatting your List for

More information

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact Email Marketing from Constant Contact Top 25 Email Marketing Terms You Should Know Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com If you have ever felt out

More information