SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
   B2B & Corporate Email Filters
    ◦ Microsoft
    ◦ Cloudmark
    ◦ Postini
    ◦ SpamAssassin
   Measuring Reputation
   List Hygiene
   Bounce Management
   IP & Domain Authentication
   Whitelisting & Feedback Loops
   Key Points to Remember
   Helpful Links
   Data Metrics
Microsoft Forefront for Exchange Server
9 levels of filtering (in order):
1. Connection Filtering

2. Sender Filtering

3. Recipient Filtering

4. Sender ID

5. Content Filtering

6. Sender Reputation

7. Attachment Filtering

8. Microsoft Forefront Protection (Antivirus package level)

9. Outlook Junk Email Filtering
   Cloudmark controls over 750,000 email boxes
   Some of the ISP's that rely on Cloudmark include:
        163.com
        Cablevision
        Comcast
        Shaw.com
        Swisscom
   Millions of users all over the world feed Cloudmark’s
    fingerprinting engine by voting on an email “spamminess”.
   Once identified as spam a fingerprint is created and stored to
    match future emails
   Small changes to an email will NOT be enough to slip by filters
   According to Cloudmark, spammers are becoming crafty and are
    starting to model delivery after regular senders by sending
    smaller batches and modulating their connection rates and
    lengths.
   Online based spam filtering application owned by
    Google with more than 26 million users.
   Global filter and User filter
   Has whitelist and blacklist
   Used by many B2B domains and corporations
   Device used to detect and block spam
   Big on blocking due to spam traps, user complaints
    (from their network), and content.
   The Barracuda Networks spam firewall use a digital
    Finger Print, built from the messages received by their
    spam trap network to classify spam regardless of the
    contents. Messages with the same images become easy
    to detect as all of these will have the same finger print
    and thus be easy to detect and filter. This is especially
    common in legitimate email traffic as the sender is not
    modifying the content or appearance of the image for
    each message (or group of messages), this is a common
    tactic used by spammers.
   Open source spam filter
   Right out of the box configuration for many
    domains.
   Can be customized with many different rule
    sets and “scores”
   Example:
    ◦ Word = Orange (5 points)
    ◦ Anything over 4 points, don’t allow into network
   Return Path SenderScore
    ◦ Score from 0-100 that measures your overall reputation.
      This data is pulled from many different sources.
    ◦ https://senderscore.org/
   Cisco SenderBase
    ◦ Online reputation by IP or domain.
    ◦ http://www.senderbase.org/senderbase_queries/rep_loo
      kup
   McAfee TrustedSource
    ◦ Reputation check for the McAfee network. Can check IP
      or domain.
    ◦ http://www.trustedsource.org/en/feedback/checking
   List hygiene
    ◦ Immediately remove invalid mailboxes
    ◦ Set up a soft bounce plan that works for your brand.
   List scrubbing
    ◦ Services that check for valid domains, emails, and
      possible known spam traps.
    ◦ May help cut out many of the bad email addresses and
      spam traps you would send to.
   Spam traps
    ◦ Spam Traps are real email addresses.
    ◦ Often ISPs will take over abandoned email addresses and
      turn those into spam traps. Set up and monitored by
      blacklists.
   A hard bounce is a permanent email delivery failure.
    Some reasons for a hard bounce would be sending to
    a mailbox that doesn’t exist (bad mailbox) or a
    domain that doesn’t exist (bad domain).
   A soft bounce is a temporary email delivery failure.
    Soft bounces can be caused by sending to a mailbox
    that’s full or having an ISP temporarily block emails
    being delivered from your IP due to reputation issues.
   Maintain a bounce rate of less than 10 percent, as
    recommended by most major ISPs.The lower the
    number of hard bounces you receive, the better your
    reputation.
   Don’t retry sending to “soft bounce” addresses too
    soon.
   Don’t retry sending to “soft bounce” addresses too
    often.
   SPF Compliant SenderID Record
    ◦ IP based authentication
    ◦ Email authentication methods used to prevent spam and spoofing by
      validating that the sending IP address is authorized to send mail for the
      sending domain. SPF checks are performed on the (sub)domain found in
      the Return-Path (Envelope From) email header, while Sender ID checks are
      performed on the From, Sender, Resent-From, and Resent-Sender email
      headers.
    ◦ v=spf1 ip4:209.19.23.12 -all

   DKIM
    ◦   Builds your domain reputation.
    ◦   Creates a portable reputation
    ◦   Protects your brand against phishing and spoofing.
    ◦   DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
        s=gamma; h=mime-version:x-notifications:date:message-
        id:subject:from:to :content-type;
        bh=kV8k7QXhM6nPbY7LCyVktE57+gZQVtUnDef2dnvDgmk=;
        b=NvEKD8r8DBlkdAJ0PTFK1wSzzANB3xCZfE7HMBMloJvbn2viM8VQ7OaG6
        uRv5397Ti
        FMqlRut+qZrosjSgljl6eZU6oJj/HMqIuwlqP8RXzvZ6HDWfxx2ujRayJd/1q+xU
        8S9P tSGjuCh1B8C3z31hpbvORNRUIsdYLBX7M8f6A=
Provider / ISP Name   Offer Whitelisting   Offer Feedback Loop
AOL                   Yes                  Yes
BlueTie (Excite)      No                   Yes
Comcast               No                   Yes
Cox                   No                   Yes
Earthlink             No                   Yes
Fastmail              No                   Yes
Hotmail               No                   Yes
OpenSRS               No                   Yes
Rackspace             No                   Yes
RoadRunner            No                   Yes
Synacor               No                   Yes
United                Yes                  Yes
USA.net               No                   Yes
Verizon               Yes                  Yes
Yahoo                 Yes                  Yes
   Rate limits
    ◦ Many B2B domains have connection and rate limits to their
      network to slow down the amount of emails they receive.
    ◦ Key is to send as slow as possible as many of these domains
      do not publish rate limits.
   Content
    ◦ Even for B2B senders, content is key.
    ◦ Filters still look at content, including many B2B filters.
   Add To Address Book Statement
     Local whitelisting
   Monitor Mailboxes
    ◦ abuse@, privacy@ and postmaster@ email addresses and
      respond to serious inquiries.
   “The Insider”
    ◦ As I call them! Users who work at the domain you are
      contacting that can help get your sending information
      whitelisted.
   User Engagement - Recipient behavior is what the recipient
  does with the mail once it is delivered. If the recipient clicks on
  the abuse button or deletes the message without ever reading
  the message this will negatively impact future mailings.
  Opens/clicks and moving mail from the bulk folder to the inbox
  provide the best impact towards improving IP reputation
 IP Reputation – Monitoring IP reputation from various sources
  will provide an overall view of how you look to the rest of the
  Internet. This includes SenderScore, TrustedSource, SenderBase
  and others.
 Ramp up – For large clients we recommend ramping up
  volume until the full list is reached. Because of mailbots (mail
  zombies ) the ISPs are looking at sudden spikes of volume from
  new or existing IP addresses.
 Data Protection – Always make sure that your subscriber’s
  data is kept safe and secure.
Corporate Blacklists and Spam Filters
 Fortiguard Antispam from Fortinet -
  http://www.fortiguard.com/antispam/antispam.html
 Sophoslabs - http://www.sophos.com/security/ip-lookup
 Symantec Brightmail -
  http://www.symantec.com/business/security_response/landing/spam/index.jsp
 Cisco IronPort SenderBase - http://www.senderbase.org/
 Barracuda - http://www.barracudacentral.org/lookups/ip-reputation
 McAfee TrustedSource - http://www.trustedsource.org/
 Proofpoint - https://support.proofpoint.com/rbl-lookup.cgi
Postmaster Links:
 Yahoo - http://help.yahoo.com/l/us/yahoo/mail/postmaster
 Gmail - https://mail.google.com/support/bin/answer.py?answer=81126
 Hotmail - https://postmaster.live.com/
 AOL - http://postmaster.info.aol.com/
Deliverability Links:
 Deliverability.com Blog – http://blog.deliverability.com
 Cloudmark Blog - http://blog.cloudmark.com/
 Gmail Status Dashboard - http://www.google.com/appsstatus#hl=en
 Email Marketing Reports - http://www.email-marketing-
  reports.com/deliverability/
 ReturnPath Deliverability Blog -
  http://www.returnpath.net/blog/emaildeliverability/
 Real Magnet Blog - http://blog.realmagnet.com/
 Authentication & Spam Check Test -
  http://www.port25.com/corporate/corp_news_authenticator.html
   1 spam trap can cause your SenderScore to
    drop 20 points
   Yahoo accepts only 1 out of 8 emails
   47% of subscribers use the "spam" button to
    unsubscribe
   77% of marketers experience emails being
    diverted to the spam folder
   Many URL shorteners are on blacklists. Don’t
    use them!
B2B Email Deliverability - Getting to the Inbox

Más contenido relacionado

La actualidad más candente

Conde Nast Email Production Process
Conde Nast   Email Production ProcessConde Nast   Email Production Process
Conde Nast Email Production Process
Randall Bennington
 
Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2
guestde489f
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
Joel May
 
Werksmail pitch
Werksmail pitchWerksmail pitch
Werksmail pitch
werksmail
 

La actualidad más candente (20)

Internet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessInternet Communications - How to Use in Your Business
Internet Communications - How to Use in Your Business
 
The Path to the Inbox Part 1
The Path to the Inbox Part 1The Path to the Inbox Part 1
The Path to the Inbox Part 1
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address Harvesting
 
ENTP Mail
ENTP MailENTP Mail
ENTP Mail
 
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCYour Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
 
Conde Nast Email Production Process
Conde Nast   Email Production ProcessConde Nast   Email Production Process
Conde Nast Email Production Process
 
Entp mail
Entp mailEntp mail
Entp mail
 
How to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start GuideHow to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start Guide
 
How to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with AmazonHow to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with Amazon
 
79 Ways to Make Money Online in 2015
79 Ways to Make Money Online in 201579 Ways to Make Money Online in 2015
79 Ways to Make Money Online in 2015
 
Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2
 
Solving E-mail Problems
Solving E-mail ProblemsSolving E-mail Problems
Solving E-mail Problems
 
The Path to the Inbox Part 2
The Path to the Inbox Part 2The Path to the Inbox Part 2
The Path to the Inbox Part 2
 
NWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching PresentationNWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching Presentation
 
werksmail
werksmailwerksmail
werksmail
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Increasing Your Response Rate
Increasing Your Response RateIncreasing Your Response Rate
Increasing Your Response Rate
 
Emma Presentation
Emma PresentationEmma Presentation
Emma Presentation
 
Werksmail pitch
Werksmail pitchWerksmail pitch
Werksmail pitch
 
Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd
 

Similar a B2B Email Deliverability - Getting to the Inbox

Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
GetResponse
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
Apollo_n
 

Similar a B2B Email Deliverability - Getting to the Inbox (20)

Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation Requirements
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email Deliverability
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
 
Sendgrid Deliverability Guide
Sendgrid Deliverability GuideSendgrid Deliverability Guide
Sendgrid Deliverability Guide
 
SMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInSMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedIn
 
"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
 
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
B2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's GuideB2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's Guide
 
Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022
 
How to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionHow to deploy Exchange Online Protection
How to deploy Exchange Online Protection
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Rails
 

Más de B2BCamp

7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing
B2BCamp
 
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
B2BCamp
 
Strategic snooping
Strategic snoopingStrategic snooping
Strategic snooping
B2BCamp
 

Más de B2BCamp (20)

B2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based MarketingB2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
 
B2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First SyndromeB2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First Syndrome
 
B2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B salesB2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B sales
 
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
 
B2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimizationB2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimization
 
Cadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development ProcessCadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development Process
 
Using what youve got
Using what youve gotUsing what youve got
Using what youve got
 
5 minutes of power
5 minutes of power5 minutes of power
5 minutes of power
 
Social gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problemSocial gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problem
 
Metrics driven sales prospecting
Metrics driven sales prospectingMetrics driven sales prospecting
Metrics driven sales prospecting
 
Have Leads Forever
Have Leads ForeverHave Leads Forever
Have Leads Forever
 
Objection handling 201
Objection handling 201Objection handling 201
Objection handling 201
 
Story of a tomato
Story of a tomatoStory of a tomato
Story of a tomato
 
In App Engagement
In App EngagementIn App Engagement
In App Engagement
 
Seduce your prospect with stories
Seduce your prospect with storiesSeduce your prospect with stories
Seduce your prospect with stories
 
7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing
 
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
 
Strategic snooping
Strategic snoopingStrategic snooping
Strategic snooping
 
Using curation in content marketing to drive traffic
Using curation in content marketing to drive trafficUsing curation in content marketing to drive traffic
Using curation in content marketing to drive traffic
 
Using Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media MarketingUsing Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media Marketing
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

B2B Email Deliverability - Getting to the Inbox

  • 1.
  • 2. B2B & Corporate Email Filters ◦ Microsoft ◦ Cloudmark ◦ Postini ◦ SpamAssassin  Measuring Reputation  List Hygiene  Bounce Management  IP & Domain Authentication  Whitelisting & Feedback Loops  Key Points to Remember  Helpful Links  Data Metrics
  • 3. Microsoft Forefront for Exchange Server 9 levels of filtering (in order): 1. Connection Filtering 2. Sender Filtering 3. Recipient Filtering 4. Sender ID 5. Content Filtering 6. Sender Reputation 7. Attachment Filtering 8. Microsoft Forefront Protection (Antivirus package level) 9. Outlook Junk Email Filtering
  • 4. Cloudmark controls over 750,000 email boxes  Some of the ISP's that rely on Cloudmark include:  163.com  Cablevision  Comcast  Shaw.com  Swisscom  Millions of users all over the world feed Cloudmark’s fingerprinting engine by voting on an email “spamminess”.  Once identified as spam a fingerprint is created and stored to match future emails  Small changes to an email will NOT be enough to slip by filters  According to Cloudmark, spammers are becoming crafty and are starting to model delivery after regular senders by sending smaller batches and modulating their connection rates and lengths.
  • 5. Online based spam filtering application owned by Google with more than 26 million users.  Global filter and User filter  Has whitelist and blacklist  Used by many B2B domains and corporations
  • 6. Device used to detect and block spam  Big on blocking due to spam traps, user complaints (from their network), and content.  The Barracuda Networks spam firewall use a digital Finger Print, built from the messages received by their spam trap network to classify spam regardless of the contents. Messages with the same images become easy to detect as all of these will have the same finger print and thus be easy to detect and filter. This is especially common in legitimate email traffic as the sender is not modifying the content or appearance of the image for each message (or group of messages), this is a common tactic used by spammers.
  • 7. Open source spam filter  Right out of the box configuration for many domains.  Can be customized with many different rule sets and “scores”  Example: ◦ Word = Orange (5 points) ◦ Anything over 4 points, don’t allow into network
  • 8. Return Path SenderScore ◦ Score from 0-100 that measures your overall reputation. This data is pulled from many different sources. ◦ https://senderscore.org/  Cisco SenderBase ◦ Online reputation by IP or domain. ◦ http://www.senderbase.org/senderbase_queries/rep_loo kup  McAfee TrustedSource ◦ Reputation check for the McAfee network. Can check IP or domain. ◦ http://www.trustedsource.org/en/feedback/checking
  • 9. List hygiene ◦ Immediately remove invalid mailboxes ◦ Set up a soft bounce plan that works for your brand.  List scrubbing ◦ Services that check for valid domains, emails, and possible known spam traps. ◦ May help cut out many of the bad email addresses and spam traps you would send to.  Spam traps ◦ Spam Traps are real email addresses. ◦ Often ISPs will take over abandoned email addresses and turn those into spam traps. Set up and monitored by blacklists.
  • 10.
  • 11.
  • 12. A hard bounce is a permanent email delivery failure. Some reasons for a hard bounce would be sending to a mailbox that doesn’t exist (bad mailbox) or a domain that doesn’t exist (bad domain).  A soft bounce is a temporary email delivery failure. Soft bounces can be caused by sending to a mailbox that’s full or having an ISP temporarily block emails being delivered from your IP due to reputation issues.  Maintain a bounce rate of less than 10 percent, as recommended by most major ISPs.The lower the number of hard bounces you receive, the better your reputation.  Don’t retry sending to “soft bounce” addresses too soon.  Don’t retry sending to “soft bounce” addresses too often.
  • 13. SPF Compliant SenderID Record ◦ IP based authentication ◦ Email authentication methods used to prevent spam and spoofing by validating that the sending IP address is authorized to send mail for the sending domain. SPF checks are performed on the (sub)domain found in the Return-Path (Envelope From) email header, while Sender ID checks are performed on the From, Sender, Resent-From, and Resent-Sender email headers. ◦ v=spf1 ip4:209.19.23.12 -all  DKIM ◦ Builds your domain reputation. ◦ Creates a portable reputation ◦ Protects your brand against phishing and spoofing. ◦ DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=gamma; h=mime-version:x-notifications:date:message- id:subject:from:to :content-type; bh=kV8k7QXhM6nPbY7LCyVktE57+gZQVtUnDef2dnvDgmk=; b=NvEKD8r8DBlkdAJ0PTFK1wSzzANB3xCZfE7HMBMloJvbn2viM8VQ7OaG6 uRv5397Ti FMqlRut+qZrosjSgljl6eZU6oJj/HMqIuwlqP8RXzvZ6HDWfxx2ujRayJd/1q+xU 8S9P tSGjuCh1B8C3z31hpbvORNRUIsdYLBX7M8f6A=
  • 14. Provider / ISP Name Offer Whitelisting Offer Feedback Loop AOL Yes Yes BlueTie (Excite) No Yes Comcast No Yes Cox No Yes Earthlink No Yes Fastmail No Yes Hotmail No Yes OpenSRS No Yes Rackspace No Yes RoadRunner No Yes Synacor No Yes United Yes Yes USA.net No Yes Verizon Yes Yes Yahoo Yes Yes
  • 15. Rate limits ◦ Many B2B domains have connection and rate limits to their network to slow down the amount of emails they receive. ◦ Key is to send as slow as possible as many of these domains do not publish rate limits.  Content ◦ Even for B2B senders, content is key. ◦ Filters still look at content, including many B2B filters.  Add To Address Book Statement  Local whitelisting  Monitor Mailboxes ◦ abuse@, privacy@ and postmaster@ email addresses and respond to serious inquiries.  “The Insider” ◦ As I call them! Users who work at the domain you are contacting that can help get your sending information whitelisted.
  • 16. User Engagement - Recipient behavior is what the recipient does with the mail once it is delivered. If the recipient clicks on the abuse button or deletes the message without ever reading the message this will negatively impact future mailings. Opens/clicks and moving mail from the bulk folder to the inbox provide the best impact towards improving IP reputation  IP Reputation – Monitoring IP reputation from various sources will provide an overall view of how you look to the rest of the Internet. This includes SenderScore, TrustedSource, SenderBase and others.  Ramp up – For large clients we recommend ramping up volume until the full list is reached. Because of mailbots (mail zombies ) the ISPs are looking at sudden spikes of volume from new or existing IP addresses.  Data Protection – Always make sure that your subscriber’s data is kept safe and secure.
  • 17. Corporate Blacklists and Spam Filters  Fortiguard Antispam from Fortinet - http://www.fortiguard.com/antispam/antispam.html  Sophoslabs - http://www.sophos.com/security/ip-lookup  Symantec Brightmail - http://www.symantec.com/business/security_response/landing/spam/index.jsp  Cisco IronPort SenderBase - http://www.senderbase.org/  Barracuda - http://www.barracudacentral.org/lookups/ip-reputation  McAfee TrustedSource - http://www.trustedsource.org/  Proofpoint - https://support.proofpoint.com/rbl-lookup.cgi Postmaster Links:  Yahoo - http://help.yahoo.com/l/us/yahoo/mail/postmaster  Gmail - https://mail.google.com/support/bin/answer.py?answer=81126  Hotmail - https://postmaster.live.com/  AOL - http://postmaster.info.aol.com/ Deliverability Links:  Deliverability.com Blog – http://blog.deliverability.com  Cloudmark Blog - http://blog.cloudmark.com/  Gmail Status Dashboard - http://www.google.com/appsstatus#hl=en  Email Marketing Reports - http://www.email-marketing- reports.com/deliverability/  ReturnPath Deliverability Blog - http://www.returnpath.net/blog/emaildeliverability/  Real Magnet Blog - http://blog.realmagnet.com/  Authentication & Spam Check Test - http://www.port25.com/corporate/corp_news_authenticator.html
  • 18.
  • 19. 1 spam trap can cause your SenderScore to drop 20 points  Yahoo accepts only 1 out of 8 emails  47% of subscribers use the "spam" button to unsubscribe  77% of marketers experience emails being diverted to the spam folder  Many URL shorteners are on blacklists. Don’t use them!