Deliverability 101. #amplify15. 2015 International Business Machines Corporation



Similar documents
No CRM, No FTP, No Problem?

Requirements Change Management and Artifact Workflow. DOP-1027 DOORS Next Generation

ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery

Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535

IBM Watson IoT Platform Analytics Real-Time Insights. Wayne Riley

The Weakest Link: Ethically Hacking the Connected Building. Paul Ionescu IBM X-Force Ethical Hacking Team

B2B Omni-channel Marketing with IBM Marketing Cloud MCL-1825

Cryptographic Keys Life Cycle Management for your Company

Deliverability 201. #amplify International Business Machines Corporation

JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences

BBP-2665 IBM BPM Process Modeling Experience on the Web

Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer

MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India

YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions. Eddie Lin IBM STSM, DS8000 Architecture

Taking the next hot mobile video game live with Docker and IBM SoftLayer. Scott Porter, Daniel Krook, Shaun Murakami

Enterprise Java Monitoring on z/os: Discover, Alert, Optimize. Chris Walker IBM

How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience

Provably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)

Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016

Soar into the API Economy by Moving Services and Metadata. from WSRR to IBM API Connect

e-shot Unique Deliverability

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

Smart E-Marketer s Guide

Deliverability Best Practices by Tamara Gielen

Keynote: Cyber Intelligence and Cyber Security Overview

Deliverability Counts

An Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

How To Ensure Your Is Delivered

Reputation Metrics Troubleshooter. Share it!

AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Adopting IBM DevOps and the Scaled Agile Framework. Subtitle here

Unica OnDemand. Unica and deliverability. Getting to the inbox. Publication Date: January 19, 2010

DST . Product FAQs. Thank you for using our products. DST UK

deliverability: The good, the bad and the ugly

Marketing Glossary of Terms

8/4/2015 Sphere Sphere US

Blackbaud Communication Services Overview of Delivery and FAQs

INinbox Start-up Pack

IBM Enterprise Marketing Management. Domain Name Options for

YSS-1841 IBM Cloud Storage Options. Tony Pearson IBM Master Inventor and Senior Software Engineer

INBOX. How to make sure more s reach your subscribers

z/os V1R11 Communications Server system management and monitoring

Eloqua Enhanced Branding and Deliverability More s to the inbox means more opportunities and revenue.

Marketing Workshop

Best Practices: How To Improve Your Survey Invitations and Deliverability Rate

IBM Enterprise Marketing Management. Domain Name Options for

You ve got. Best practices for deliverability. Microsoft Dynamics Marketing

Anchor s Marketing Glossary and Common Terms

10 Ways to Improve B2B Deliverability:

Leveraging WebSphere Commerce for Search Engine Optimization (SEO)

IBM Tivoli Service Request Manager 7.1

DMA s Authentication Requirement: FAQs and Best Practices


Database lifecycle management

How to Stop Spam s and Bounces

6-Part Lunch Learning Series

Communications Server for Linux

DataPower z/os crypto integration

MIDDLE EAST POST BOX. - Opt-In Direct Marketing -

Reputation Monitor User Guide

A White Paper. VerticalResponse, Delivery and You A Handy Guide. VerticalResponse,Inc nd Street, Suite 700 San Francisco, CA 94107

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering through Your Web Application

Knowledge Guide: Deliverability. Your Reputation Holds the Key to Deliverability. virtualroi May by: Return Path

IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467

How to Engage Your Contacts Using Marketing

MCH Channel_e Best Practices for Marketers

Improve Deliverability: Tactics for Handling Complaints and Boosting Reputation. Sponsored by

DIGITAL MARKETING SERIES DELIVERABILITY: GETTING TO YOUR CUSTOMER S INBOX

WebSphere Commerce V7.0

Enterprise Marketing: The 8 Essential Success Factors

The Grande Guide To Deliverability and Privacy

eprism Security Suite

MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT

Marketing Do s and Don ts A Sprint Mail Whitepaper

Three pillars of successful deliverability

IBM Cognos Controller Version New Features Guide

Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:...

IBM Cognos Controller Version New Features Guide

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Get to the Inbox Ten Top Tips to Maximize Your Deliverability

CommuniGator. Avoiding spam filters

5 tips to improve your database. An Experian Data Quality white paper

Marketing Features

WHITE PAPER SEPTEMBER Make It Into the Inbox. Co-authored by Jaren Angerbauer and Shaneli Ramratan

Best Practices 101

eprism Security Suite

Data is at the heart of deliverability

New SMTP client for sending Internet mail

Top 40 Marketing Terms You Should Know

1. Introduction Deliverability-Benchmarks Working with Your Service Provider sent delivered...

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

Java and Other Languages

An Oracle Best Practice Guide March Best Practices for Marketing

Deliverability: Optimizing Your Marketing Strategy. Version : September 7, 2008 Presented by: Angela McKay CRM Business Analyst

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

Marketing Features

FILTERING FAQ

Ensure holiday s reach the inbox

Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics

Transcription:

Deliverability 101

Jeff Dellapina Deliverability and Provisioning Manager

Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2

Agenda Deliverability Terms Sends Email Authentication How Recipients Impact your Deliverability Improving Sender s Behavior Questions 3

Why is Deliverability Important? Increase Revenue Increase and protect Brand Recognition and Reputation Increase Automation Decrease Marketing Costs Reduce Risks Service Interruptions due to Blacklisting Phishing attempts that dilute brand trust Job Interruptions 4

Deliverability Terms 5

Bounce Categories Hard Bounce Permanent Failed Message Bad Mailbox Bad Domain Soft Bounce Temporary Failed Message Inactive Mailbox Everything else that is not a hard bounce. 6

Bounce Types In Stream Error messages provided by receiving server during the live mail transfer. Out of Stream Error messages provided by recipient server after message is successfully accepted. 7

Bulking, Blocking and Blacklisting Bulked - Message is delivered but sent to the Junk Folder Block - The destination email server is refusing to accept email due to ISP/Inbox Provider send practice violations Blacklist - List of IP addresses or domains that individuals or enterprises use to filter email due to send practice violations 8

Spamtraps Digital Venus Flytraps A spam trap is an email abandoned address that was shut down and after 6-12 months is re-activated Eliminate spam traps Inactive addresses older than 12 months should not be sent marketing mail Create Re-engagement mailing Segment inactive list by age Begin a re-engagement mailing Use a confirmed or double opt-in to prevent spamtraps Eliminate inactive addresses where you have no opt-in data for that address 9

IP Ramp-Up A process within the VMTA that limits the volume of email during initial sends to specific ISPs. This ramping of the IP will build the reputation with different ISPs Aol is limited to 1,200 Yahoo and Hotmail are set to send 5,000 on the first send. Segmenting your data into buckets Ramp up any domain that makes up a 10 % or more of your list Sending same volume for 30 days to turn off Auto Ramp-up 10

Feed Back Loops Certain ISPs send recipient abuse complaint details back to Silverpop. The abuse complaint is marked in the mailing reports The problem address is added to the Master Suppression List Abuse complaints can generate weeks, months, years after the initial send. These complaints from previous mailings impact today s mailings People that click abuse do so for 3 reasons: No memory Relevant Frequency 11

What happens when I hit send? 12

Engage Builds and Sends a Mailing The list and creative gets uploaded to Engage and you hit Send Engage begins Blocking which is the blending of list/content Engage checks addresses against the Master Suppression List Engage hands off the mailings to the sending server - your VMTA The VMTA is actually 3 sending servers that connect to all ISPs. Error messages provided by receiving server during the live mail transfer. Most common Connections are made to each ISP and corporate domain. During this connection bad addresses are returned Depending on send size, mail may exit 1 server or all 3 servers at once. 13

After the Send All the results of the mailings are picked up by a service called Response Master Response Master manages all opens/clicks, unsubscribes and bounces. That data gets pushed back into Engage for Reporting. Other deliverability data gets moved to Deliverability tables and accessed by my team. This data includes bounce and delivery logs. This data populates the Deliverability Dashboard within the Support portal Allows our team to answer client questions and possible delivery concerns. 14

What to Expect with a Large Send When clients send to larger lists we can expect to see the following metrics: A higher than normal number of suppressed addresses. Overall slower delivery of email depending on existing IP reputation. Greater risk of bouncing due to sending thresholds and complaints. Depending on the age/activity of the addresses, a higher than normal opt-out rate and abuse complaint rate. 15

Email Authentication 16

Email Authentication Sending authenticated email means making sure proper DNS records are in place on the from or sending domain used in the mailings. SPF Record DKIM Record DMARC Record 17

Email Authentication SPF Record / Sender ID Silverpop can send email on behalf of e.company.com e.company.com TXT v=spf1 ip4:208.85.1.0 all Actual Error message :: Hotmail - smtp;550 (COL0-MC4-F6) command rejected due to Sender ID test failing for IP 208.1.1.1. Please ensure this IP is authorized to send mail on behalf of [companyname.com]. 18

Email Authentication DKIM Record Original Message Sent was the Same Message Received Reduces Screen Scraping Used by Yahoo for Feed Back Loops to manage abuse processing spop1024._domainkey.e.example.com. IN TXT "k=rsa; p=mfwwdqyjkozihvcnaqebbqadswawsajbalrpcztsoe3y863bclav91ft XKrLUymFwH9nOxFkJmMKdCRdcQo3dcIKDPn1lZqdXVfa7TFVVQVs 19

Email Authentication DMARC Record Domain-based Message Authentication, Reporting & Conformance Text Record that monitors the listed domain against various Spoofing and Phishing attempts Implemented in Stages None Monitor Don t do anything but report what is happening Quarantine Push aside any message that fails DMARC Reject Delete any message from any source not listed within DMARC 20

Email Authentication DMARC Record _dmarc.silverpop.com TXT v=dmarc1;p=none;pct=100;rua=mailto:abuse@deliver.silverpop.com;ruf=ma ilto:abuse@deliver.silverpop.com What domain do we want to monitor? What do we do with failures? What percentage of mail do we want monitored? Where do we send these reports? 21

Email Authentication DMARC Record DMARC Report 22

Email Authentication DMARC Record - Agari The largest ISPs are now pushing next-gen authentication (DMARC) hard Google, Y!, Hotmail/Microsoft, AOL, etc have all adopted DMARC Over 2Bn mailboxes: 85% of US consumers and 70% International consumer are covered Better deliverability and classification by ISPs By authenticating email properly Get ahead of the curve authentication will be a de facto necessity soon Stop criminals from using your brand to abuse your consumers Achieve better tracking and visibility globally 23

Email Authentication DMARC Record - Agari Seeing Threats from Around the World 24

How Recipients Impact your Deliverability 25

Recipient Behavior IP Reputation Delivery Rate - Throttling Email Placement Bulk Folder or Inbox 26

Recipient Behavior IP Reputation Opens build the IP reputation Opens tell the ISP that the mailings are wanted Moving message from Bulk folder to Inbox Forwarding the message 27

Recipient Behavior - Throttling 3 Types of Throttling At the Engage Level At the VMTA Level At the ISP Level The first 2 listed are outbound throttling. The ISP is inbound throttling ISPs use Internal / External IP reputation scores to determine throughput This is very important for clients sending time sensitive mailings 28

Recipient Behavior Inbox Placement Positive Behavior = Inbox placement Opening email Moving from Bulk folder to Inbox Negative Behavior = Bulk folder or bounced Deleting without reading Clicking the Abuse Button Email Placement Bulk Folder or Inbox 29

Improving Sender s Behavior 30

Improving Sender Behavior Lead Source Frequency Send Time Optimization Call to Action 31

Improving Sender Behavior Lead Source Organic Double Opt-in Send Confirmation Emails No Pre-Populated Check Boxes Avoid List Purchases and Affiliate Marketing 32

Improving Sender Behavior - Frequency Set Expectations - At the time of sign-up Preference Center - Allow self management Snooze Feature Take a break Polling or Engagement Campaign Create Interest When in Doubt- Don t Send 33

Improving Sender Behavior Send Time Optimization Shortens Idle Time - Between Sends and Opens Conversation - The quick turnaround looks like a discussion Staggered Sends Throughout the day versus a blast Pavlov s Dog Mail is sent and mail is opened 34

Improving Sender Behavior Assorted Items Why Should I click Brand Development Subscribed/Unsubscribe Change up Mailings - A/B Subject Line and Content Testing Why Buy the Cow? - Preview Pane 35

HouseKeeping 36

Silverpop Engage Certification Self Improvement Add personal value / Job Search Product Knowledge/Features Currently Free to complete at your own pace Attend a 3 day dedicated boot-camp for faster certification 37

Links SPF DKIM DMARC http://www.openspf.org/ http://www.dkim.org/ http://dmarc.org/ Gmail Bulk Senders Guidelines https://support.google.com/mail/answer/81126?hl=en CASL - fightspam.gc.ca/eic/site/030.nsf/eng/home CAN-SPAM - http://www.fcc.gov/guides/spam-unwanted-text-messages-andemail 38

39

Tell us what you think! Be on the lookout for a survey in the follow up email later this week. We appreciate your feedback! 40

Notices and Disclaimers Copyright 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. 41

Notices and Disclaimers (con t) Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera, Bluemix, Blueworks Live, CICS, Clearcase, Cognos, DOORS, Emptoris, Enterprise Document Management System, FASP, FileNet, Global Business Services, Global Technology Services, IBM ExperienceOne, IBM SmartCloud, IBM Social Business, Information on Demand, ILOG, Maximo, MQIntegrator, MQSeries, Netcool, OMEGAMON, OpenPower, PureAnalytics, PureApplication, purecluster, PureCoverage, PureData, PureExperience, PureFlex, purequery, purescale, PureSystems, QRadar, Rational, Rhapsody, Smarter Commerce, SoDA, SPSS, Sterling Commerce, StoredIQ, Tealeaf, Tivoli, Trusteer, Unica, urban{code}, Watson, WebSphere, Worklight, X-Force and System z Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml. 42