SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
   B2B & Corporate Email Filters
    ◦ Microsoft
    ◦ Cloudmark
    ◦ Postini
    ◦ SpamAssassin
   Measuring Reputation
   List Hygiene
   Bounce Management
   IP & Domain Authentication
   Whitelisting & Feedback Loops
   Key Points to Remember
   Helpful Links
   Data Metrics
Microsoft Forefront for Exchange Server
9 levels of filtering (in order):
1. Connection Filtering

2. Sender Filtering

3. Recipient Filtering

4. Sender ID

5. Content Filtering

6. Sender Reputation

7. Attachment Filtering

8. Microsoft Forefront Protection (Antivirus package level)

9. Outlook Junk Email Filtering
   Cloudmark controls over 750,000 email boxes
   Some of the ISP's that rely on Cloudmark include:
        163.com
        Cablevision
        Comcast
        Shaw.com
        Swisscom
   Millions of users all over the world feed Cloudmark’s
    fingerprinting engine by voting on an email “spamminess”.
   Once identified as spam a fingerprint is created and stored to
    match future emails
   Small changes to an email will NOT be enough to slip by filters
   According to Cloudmark, spammers are becoming crafty and are
    starting to model delivery after regular senders by sending
    smaller batches and modulating their connection rates and
    lengths.
   Online based spam filtering application owned by
    Google with more than 26 million users.
   Global filter and User filter
   Has whitelist and blacklist
   Used by many B2B domains and corporations
   Device used to detect and block spam
   Big on blocking due to spam traps, user complaints
    (from their network), and content.
   The Barracuda Networks spam firewall use a digital
    Finger Print, built from the messages received by their
    spam trap network to classify spam regardless of the
    contents. Messages with the same images become easy
    to detect as all of these will have the same finger print
    and thus be easy to detect and filter. This is especially
    common in legitimate email traffic as the sender is not
    modifying the content or appearance of the image for
    each message (or group of messages), this is a common
    tactic used by spammers.
   Open source spam filter
   Right out of the box configuration for many
    domains.
   Can be customized with many different rule
    sets and “scores”
   Example:
    ◦ Word = Orange (5 points)
    ◦ Anything over 4 points, don’t allow into network
   Return Path SenderScore
    ◦ Score from 0-100 that measures your overall reputation.
      This data is pulled from many different sources.
    ◦ https://senderscore.org/
   Cisco SenderBase
    ◦ Online reputation by IP or domain.
    ◦ http://www.senderbase.org/senderbase_queries/rep_loo
      kup
   McAfee TrustedSource
    ◦ Reputation check for the McAfee network. Can check IP
      or domain.
    ◦ http://www.trustedsource.org/en/feedback/checking
   List hygiene
    ◦ Immediately remove invalid mailboxes
    ◦ Set up a soft bounce plan that works for your brand.
   List scrubbing
    ◦ Services that check for valid domains, emails, and
      possible known spam traps.
    ◦ May help cut out many of the bad email addresses and
      spam traps you would send to.
   Spam traps
    ◦ Spam Traps are real email addresses.
    ◦ Often ISPs will take over abandoned email addresses and
      turn those into spam traps. Set up and monitored by
      blacklists.
   A hard bounce is a permanent email delivery failure.
    Some reasons for a hard bounce would be sending to
    a mailbox that doesn’t exist (bad mailbox) or a
    domain that doesn’t exist (bad domain).
   A soft bounce is a temporary email delivery failure.
    Soft bounces can be caused by sending to a mailbox
    that’s full or having an ISP temporarily block emails
    being delivered from your IP due to reputation issues.
   Maintain a bounce rate of less than 10 percent, as
    recommended by most major ISPs.The lower the
    number of hard bounces you receive, the better your
    reputation.
   Don’t retry sending to “soft bounce” addresses too
    soon.
   Don’t retry sending to “soft bounce” addresses too
    often.
   SPF Compliant SenderID Record
    ◦ IP based authentication
    ◦ Email authentication methods used to prevent spam and spoofing by
      validating that the sending IP address is authorized to send mail for the
      sending domain. SPF checks are performed on the (sub)domain found in
      the Return-Path (Envelope From) email header, while Sender ID checks are
      performed on the From, Sender, Resent-From, and Resent-Sender email
      headers.
    ◦ v=spf1 ip4:209.19.23.12 -all

   DKIM
    ◦   Builds your domain reputation.
    ◦   Creates a portable reputation
    ◦   Protects your brand against phishing and spoofing.
    ◦   DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
        s=gamma; h=mime-version:x-notifications:date:message-
        id:subject:from:to :content-type;
        bh=kV8k7QXhM6nPbY7LCyVktE57+gZQVtUnDef2dnvDgmk=;
        b=NvEKD8r8DBlkdAJ0PTFK1wSzzANB3xCZfE7HMBMloJvbn2viM8VQ7OaG6
        uRv5397Ti
        FMqlRut+qZrosjSgljl6eZU6oJj/HMqIuwlqP8RXzvZ6HDWfxx2ujRayJd/1q+xU
        8S9P tSGjuCh1B8C3z31hpbvORNRUIsdYLBX7M8f6A=
Provider / ISP Name   Offer Whitelisting   Offer Feedback Loop
AOL                   Yes                  Yes
BlueTie (Excite)      No                   Yes
Comcast               No                   Yes
Cox                   No                   Yes
Earthlink             No                   Yes
Fastmail              No                   Yes
Hotmail               No                   Yes
OpenSRS               No                   Yes
Rackspace             No                   Yes
RoadRunner            No                   Yes
Synacor               No                   Yes
United                Yes                  Yes
USA.net               No                   Yes
Verizon               Yes                  Yes
Yahoo                 Yes                  Yes
   Rate limits
    ◦ Many B2B domains have connection and rate limits to their
      network to slow down the amount of emails they receive.
    ◦ Key is to send as slow as possible as many of these domains
      do not publish rate limits.
   Content
    ◦ Even for B2B senders, content is key.
    ◦ Filters still look at content, including many B2B filters.
   Add To Address Book Statement
     Local whitelisting
   Monitor Mailboxes
    ◦ abuse@, privacy@ and postmaster@ email addresses and
      respond to serious inquiries.
   “The Insider”
    ◦ As I call them! Users who work at the domain you are
      contacting that can help get your sending information
      whitelisted.
   User Engagement - Recipient behavior is what the recipient
  does with the mail once it is delivered. If the recipient clicks on
  the abuse button or deletes the message without ever reading
  the message this will negatively impact future mailings.
  Opens/clicks and moving mail from the bulk folder to the inbox
  provide the best impact towards improving IP reputation
 IP Reputation – Monitoring IP reputation from various sources
  will provide an overall view of how you look to the rest of the
  Internet. This includes SenderScore, TrustedSource, SenderBase
  and others.
 Ramp up – For large clients we recommend ramping up
  volume until the full list is reached. Because of mailbots (mail
  zombies ) the ISPs are looking at sudden spikes of volume from
  new or existing IP addresses.
 Data Protection – Always make sure that your subscriber’s
  data is kept safe and secure.
Corporate Blacklists and Spam Filters
 Fortiguard Antispam from Fortinet -
  http://www.fortiguard.com/antispam/antispam.html
 Sophoslabs - http://www.sophos.com/security/ip-lookup
 Symantec Brightmail -
  http://www.symantec.com/business/security_response/landing/spam/index.jsp
 Cisco IronPort SenderBase - http://www.senderbase.org/
 Barracuda - http://www.barracudacentral.org/lookups/ip-reputation
 McAfee TrustedSource - http://www.trustedsource.org/
 Proofpoint - https://support.proofpoint.com/rbl-lookup.cgi
Postmaster Links:
 Yahoo - http://help.yahoo.com/l/us/yahoo/mail/postmaster
 Gmail - https://mail.google.com/support/bin/answer.py?answer=81126
 Hotmail - https://postmaster.live.com/
 AOL - http://postmaster.info.aol.com/
Deliverability Links:
 Deliverability.com Blog – http://blog.deliverability.com
 Cloudmark Blog - http://blog.cloudmark.com/
 Gmail Status Dashboard - http://www.google.com/appsstatus#hl=en
 Email Marketing Reports - http://www.email-marketing-
  reports.com/deliverability/
 ReturnPath Deliverability Blog -
  http://www.returnpath.net/blog/emaildeliverability/
 Real Magnet Blog - http://blog.realmagnet.com/
 Authentication & Spam Check Test -
  http://www.port25.com/corporate/corp_news_authenticator.html
   1 spam trap can cause your SenderScore to
    drop 20 points
   Yahoo accepts only 1 out of 8 emails
   47% of subscribers use the "spam" button to
    unsubscribe
   77% of marketers experience emails being
    diverted to the spam folder
   Many URL shorteners are on blacklists. Don’t
    use them!
B2B Email Deliverability - Getting to the Inbox

Mais conteúdo relacionado

Mais procurados

Internet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessInternet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessSmall Business Trends
 
The Path to the Inbox Part 1
The Path to the Inbox Part 1The Path to the Inbox Part 1
The Path to the Inbox Part 1Infusionsoft
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address HarvestingMichael Lamont
 
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCYour Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCStephen Mitchell
 
Conde Nast Email Production Process
Conde Nast   Email Production ProcessConde Nast   Email Production Process
Conde Nast Email Production ProcessRandall Bennington
 
How to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start GuideHow to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start GuideJoan Mullally
 
How to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with AmazonHow to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with AmazonTiti Wangsa Damhore
 
Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2guestde489f
 
The Path to the Inbox Part 2
The Path to the Inbox Part 2The Path to the Inbox Part 2
The Path to the Inbox Part 2Infusionsoft
 
NWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching PresentationNWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching Presentationstoosepp
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use GmailJoel May
 
Increasing Your Response Rate
Increasing Your Response RateIncreasing Your Response Rate
Increasing Your Response RateEmail Delivered
 
Werksmail pitch
Werksmail pitchWerksmail pitch
Werksmail pitchwerksmail
 
Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd Anton Shulke
 

Mais procurados (20)

Internet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessInternet Communications - How to Use in Your Business
Internet Communications - How to Use in Your Business
 
The Path to the Inbox Part 1
The Path to the Inbox Part 1The Path to the Inbox Part 1
The Path to the Inbox Part 1
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address Harvesting
 
ENTP Mail
ENTP MailENTP Mail
ENTP Mail
 
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCYour Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
 
Conde Nast Email Production Process
Conde Nast   Email Production ProcessConde Nast   Email Production Process
Conde Nast Email Production Process
 
Entp mail
Entp mailEntp mail
Entp mail
 
How to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start GuideHow to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start Guide
 
How to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with AmazonHow to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with Amazon
 
79 Ways to Make Money Online in 2015
79 Ways to Make Money Online in 201579 Ways to Make Money Online in 2015
79 Ways to Make Money Online in 2015
 
Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2
 
Solving E-mail Problems
Solving E-mail ProblemsSolving E-mail Problems
Solving E-mail Problems
 
The Path to the Inbox Part 2
The Path to the Inbox Part 2The Path to the Inbox Part 2
The Path to the Inbox Part 2
 
NWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching PresentationNWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching Presentation
 
werksmail
werksmailwerksmail
werksmail
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Increasing Your Response Rate
Increasing Your Response RateIncreasing Your Response Rate
Increasing Your Response Rate
 
Emma Presentation
Emma PresentationEmma Presentation
Emma Presentation
 
Werksmail pitch
Werksmail pitchWerksmail pitch
Werksmail pitch
 
Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd
 

Semelhante a B2B Email Deliverability - Getting to the Inbox

Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsGabriella Davis
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works Pinpointe On-Demand
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityChris Arrendale
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email DeliverabilityGetResponse
 
SMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInSMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInFranck Martin
 
"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentationThe_IPA
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLaboraDK
 
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...Amazon Web Services
 
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...Amazon Web Services
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedDryden Geary
 
B2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's GuideB2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's GuideMatthew Albert
 
Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022RecruitingDaily.com LLC
 
How to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionHow to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionPeter Schmidt
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection SystemApollo_n
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Railsibelmonte
 

Semelhante a B2B Email Deliverability - Getting to the Inbox (20)

Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation Requirements
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email Deliverability
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
 
Sendgrid Deliverability Guide
Sendgrid Deliverability GuideSendgrid Deliverability Guide
Sendgrid Deliverability Guide
 
SMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInSMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedIn
 
"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
 
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
B2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's GuideB2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's Guide
 
Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022
 
How to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionHow to deploy Exchange Online Protection
How to deploy Exchange Online Protection
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Rails
 

Mais de B2BCamp

B2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based MarketingB2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based MarketingB2BCamp
 
B2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First SyndromeB2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First SyndromeB2BCamp
 
B2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B salesB2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B salesB2BCamp
 
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...B2BCamp
 
B2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimizationB2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimizationB2BCamp
 
Cadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development ProcessCadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development ProcessB2BCamp
 
Using what youve got
Using what youve gotUsing what youve got
Using what youve gotB2BCamp
 
5 minutes of power
5 minutes of power5 minutes of power
5 minutes of powerB2BCamp
 
Social gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problemSocial gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problemB2BCamp
 
Metrics driven sales prospecting
Metrics driven sales prospectingMetrics driven sales prospecting
Metrics driven sales prospectingB2BCamp
 
Have Leads Forever
Have Leads ForeverHave Leads Forever
Have Leads ForeverB2BCamp
 
Objection handling 201
Objection handling 201Objection handling 201
Objection handling 201B2BCamp
 
Story of a tomato
Story of a tomatoStory of a tomato
Story of a tomatoB2BCamp
 
In App Engagement
In App EngagementIn App Engagement
In App EngagementB2BCamp
 
Seduce your prospect with stories
Seduce your prospect with storiesSeduce your prospect with stories
Seduce your prospect with storiesB2BCamp
 
7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketingB2BCamp
 
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!B2BCamp
 
Strategic snooping
Strategic snoopingStrategic snooping
Strategic snoopingB2BCamp
 
Using curation in content marketing to drive traffic
Using curation in content marketing to drive trafficUsing curation in content marketing to drive traffic
Using curation in content marketing to drive trafficB2BCamp
 
Using Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media MarketingUsing Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media MarketingB2BCamp
 

Mais de B2BCamp (20)

B2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based MarketingB2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
 
B2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First SyndromeB2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First Syndrome
 
B2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B salesB2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B sales
 
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
 
B2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimizationB2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimization
 
Cadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development ProcessCadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development Process
 
Using what youve got
Using what youve gotUsing what youve got
Using what youve got
 
5 minutes of power
5 minutes of power5 minutes of power
5 minutes of power
 
Social gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problemSocial gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problem
 
Metrics driven sales prospecting
Metrics driven sales prospectingMetrics driven sales prospecting
Metrics driven sales prospecting
 
Have Leads Forever
Have Leads ForeverHave Leads Forever
Have Leads Forever
 
Objection handling 201
Objection handling 201Objection handling 201
Objection handling 201
 
Story of a tomato
Story of a tomatoStory of a tomato
Story of a tomato
 
In App Engagement
In App EngagementIn App Engagement
In App Engagement
 
Seduce your prospect with stories
Seduce your prospect with storiesSeduce your prospect with stories
Seduce your prospect with stories
 
7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing
 
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
 
Strategic snooping
Strategic snoopingStrategic snooping
Strategic snooping
 
Using curation in content marketing to drive traffic
Using curation in content marketing to drive trafficUsing curation in content marketing to drive traffic
Using curation in content marketing to drive traffic
 
Using Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media MarketingUsing Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media Marketing
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

B2B Email Deliverability - Getting to the Inbox

  • 1.
  • 2. B2B & Corporate Email Filters ◦ Microsoft ◦ Cloudmark ◦ Postini ◦ SpamAssassin  Measuring Reputation  List Hygiene  Bounce Management  IP & Domain Authentication  Whitelisting & Feedback Loops  Key Points to Remember  Helpful Links  Data Metrics
  • 3. Microsoft Forefront for Exchange Server 9 levels of filtering (in order): 1. Connection Filtering 2. Sender Filtering 3. Recipient Filtering 4. Sender ID 5. Content Filtering 6. Sender Reputation 7. Attachment Filtering 8. Microsoft Forefront Protection (Antivirus package level) 9. Outlook Junk Email Filtering
  • 4. Cloudmark controls over 750,000 email boxes  Some of the ISP's that rely on Cloudmark include:  163.com  Cablevision  Comcast  Shaw.com  Swisscom  Millions of users all over the world feed Cloudmark’s fingerprinting engine by voting on an email “spamminess”.  Once identified as spam a fingerprint is created and stored to match future emails  Small changes to an email will NOT be enough to slip by filters  According to Cloudmark, spammers are becoming crafty and are starting to model delivery after regular senders by sending smaller batches and modulating their connection rates and lengths.
  • 5. Online based spam filtering application owned by Google with more than 26 million users.  Global filter and User filter  Has whitelist and blacklist  Used by many B2B domains and corporations
  • 6. Device used to detect and block spam  Big on blocking due to spam traps, user complaints (from their network), and content.  The Barracuda Networks spam firewall use a digital Finger Print, built from the messages received by their spam trap network to classify spam regardless of the contents. Messages with the same images become easy to detect as all of these will have the same finger print and thus be easy to detect and filter. This is especially common in legitimate email traffic as the sender is not modifying the content or appearance of the image for each message (or group of messages), this is a common tactic used by spammers.
  • 7. Open source spam filter  Right out of the box configuration for many domains.  Can be customized with many different rule sets and “scores”  Example: ◦ Word = Orange (5 points) ◦ Anything over 4 points, don’t allow into network
  • 8. Return Path SenderScore ◦ Score from 0-100 that measures your overall reputation. This data is pulled from many different sources. ◦ https://senderscore.org/  Cisco SenderBase ◦ Online reputation by IP or domain. ◦ http://www.senderbase.org/senderbase_queries/rep_loo kup  McAfee TrustedSource ◦ Reputation check for the McAfee network. Can check IP or domain. ◦ http://www.trustedsource.org/en/feedback/checking
  • 9. List hygiene ◦ Immediately remove invalid mailboxes ◦ Set up a soft bounce plan that works for your brand.  List scrubbing ◦ Services that check for valid domains, emails, and possible known spam traps. ◦ May help cut out many of the bad email addresses and spam traps you would send to.  Spam traps ◦ Spam Traps are real email addresses. ◦ Often ISPs will take over abandoned email addresses and turn those into spam traps. Set up and monitored by blacklists.
  • 10.
  • 11.
  • 12. A hard bounce is a permanent email delivery failure. Some reasons for a hard bounce would be sending to a mailbox that doesn’t exist (bad mailbox) or a domain that doesn’t exist (bad domain).  A soft bounce is a temporary email delivery failure. Soft bounces can be caused by sending to a mailbox that’s full or having an ISP temporarily block emails being delivered from your IP due to reputation issues.  Maintain a bounce rate of less than 10 percent, as recommended by most major ISPs.The lower the number of hard bounces you receive, the better your reputation.  Don’t retry sending to “soft bounce” addresses too soon.  Don’t retry sending to “soft bounce” addresses too often.
  • 13. SPF Compliant SenderID Record ◦ IP based authentication ◦ Email authentication methods used to prevent spam and spoofing by validating that the sending IP address is authorized to send mail for the sending domain. SPF checks are performed on the (sub)domain found in the Return-Path (Envelope From) email header, while Sender ID checks are performed on the From, Sender, Resent-From, and Resent-Sender email headers. ◦ v=spf1 ip4:209.19.23.12 -all  DKIM ◦ Builds your domain reputation. ◦ Creates a portable reputation ◦ Protects your brand against phishing and spoofing. ◦ DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=gamma; h=mime-version:x-notifications:date:message- id:subject:from:to :content-type; bh=kV8k7QXhM6nPbY7LCyVktE57+gZQVtUnDef2dnvDgmk=; b=NvEKD8r8DBlkdAJ0PTFK1wSzzANB3xCZfE7HMBMloJvbn2viM8VQ7OaG6 uRv5397Ti FMqlRut+qZrosjSgljl6eZU6oJj/HMqIuwlqP8RXzvZ6HDWfxx2ujRayJd/1q+xU 8S9P tSGjuCh1B8C3z31hpbvORNRUIsdYLBX7M8f6A=
  • 14. Provider / ISP Name Offer Whitelisting Offer Feedback Loop AOL Yes Yes BlueTie (Excite) No Yes Comcast No Yes Cox No Yes Earthlink No Yes Fastmail No Yes Hotmail No Yes OpenSRS No Yes Rackspace No Yes RoadRunner No Yes Synacor No Yes United Yes Yes USA.net No Yes Verizon Yes Yes Yahoo Yes Yes
  • 15. Rate limits ◦ Many B2B domains have connection and rate limits to their network to slow down the amount of emails they receive. ◦ Key is to send as slow as possible as many of these domains do not publish rate limits.  Content ◦ Even for B2B senders, content is key. ◦ Filters still look at content, including many B2B filters.  Add To Address Book Statement  Local whitelisting  Monitor Mailboxes ◦ abuse@, privacy@ and postmaster@ email addresses and respond to serious inquiries.  “The Insider” ◦ As I call them! Users who work at the domain you are contacting that can help get your sending information whitelisted.
  • 16. User Engagement - Recipient behavior is what the recipient does with the mail once it is delivered. If the recipient clicks on the abuse button or deletes the message without ever reading the message this will negatively impact future mailings. Opens/clicks and moving mail from the bulk folder to the inbox provide the best impact towards improving IP reputation  IP Reputation – Monitoring IP reputation from various sources will provide an overall view of how you look to the rest of the Internet. This includes SenderScore, TrustedSource, SenderBase and others.  Ramp up – For large clients we recommend ramping up volume until the full list is reached. Because of mailbots (mail zombies ) the ISPs are looking at sudden spikes of volume from new or existing IP addresses.  Data Protection – Always make sure that your subscriber’s data is kept safe and secure.
  • 17. Corporate Blacklists and Spam Filters  Fortiguard Antispam from Fortinet - http://www.fortiguard.com/antispam/antispam.html  Sophoslabs - http://www.sophos.com/security/ip-lookup  Symantec Brightmail - http://www.symantec.com/business/security_response/landing/spam/index.jsp  Cisco IronPort SenderBase - http://www.senderbase.org/  Barracuda - http://www.barracudacentral.org/lookups/ip-reputation  McAfee TrustedSource - http://www.trustedsource.org/  Proofpoint - https://support.proofpoint.com/rbl-lookup.cgi Postmaster Links:  Yahoo - http://help.yahoo.com/l/us/yahoo/mail/postmaster  Gmail - https://mail.google.com/support/bin/answer.py?answer=81126  Hotmail - https://postmaster.live.com/  AOL - http://postmaster.info.aol.com/ Deliverability Links:  Deliverability.com Blog – http://blog.deliverability.com  Cloudmark Blog - http://blog.cloudmark.com/  Gmail Status Dashboard - http://www.google.com/appsstatus#hl=en  Email Marketing Reports - http://www.email-marketing- reports.com/deliverability/  ReturnPath Deliverability Blog - http://www.returnpath.net/blog/emaildeliverability/  Real Magnet Blog - http://blog.realmagnet.com/  Authentication & Spam Check Test - http://www.port25.com/corporate/corp_news_authenticator.html
  • 18.
  • 19. 1 spam trap can cause your SenderScore to drop 20 points  Yahoo accepts only 1 out of 8 emails  47% of subscribers use the "spam" button to unsubscribe  77% of marketers experience emails being diverted to the spam folder  Many URL shorteners are on blacklists. Don’t use them!