SlideShare a Scribd company logo
1 of 50
Download to read offline
Master version 0.0.2
DMARC
Domain-based Message
Authentication Reporting & Conformance
Martijn Groeneweg General Manager Europe, dmarcian
Wesley Rietveld Sales Director Europe, dmarcian
Marco Franceschetti, Head of Deliverability, Contactlab
2
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Why you should care!
DMARC?
Should you as an email marketer care about DMARC?
Why is domain authentication important? Why are there always new standards coming from the email ecosystem?
Is it a mandatory requirement?
Is it about security?
3
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Gmail wants it
Source: https://support.google.com/mail/answer/81126?hl=en
4
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Gmail wants it
5
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Authentication: SPF
SPF – Path based on email’s path from the Sender (Contactlab) to the Mailbox provider.
Works on "Envelope From" domain. Not on the "From" domain.
Is it 100% sure?
Sender /
@example.com
IP address DNS Server/
SPF Record
Valid authentication? Yes / No MBP – filter
mix
6
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Authentication: DKIM
DKIM – "validating a domain name identity that is associated with a message through cryptographic
authentication".
"DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message that is in
transit. The organization is a handler of the message, either as its originator or as an intermediary. Their
reputation is the basis for evaluating whether to trust the message for further handling, such as delivery. "
www.dkim.org
Is it a 100% sure method?
7
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
What DMARC brings
Source: https://support.google.com/a/answer/2466580
“You'll receive a daily report from each participating email provider so you can see how
often your messages are authenticated, how often invalid messages are identified,
and policy actions requested and taken by IP address.”
Protect your domain with DMARC
• Who we are
• Why DMARC?
• How DMARC works
• Let’s phish Polizia di Stato and Banca d’Italia
• PostNL case
• Questions
Agenda
Who we are
• Started in 2012
• dmarcian is the leading “Full Service” provider of
DMARC Services
• dmarcian has a regionalized European operations that
meets European data requirements
• dmarcian offers
– Web based tooling
– Deployment support
– Support packages
Who we are
• Customers
– Banks, top internet properties, marketing agencies, telecoms
and commercial enterprises of all sizes
– More than 19.000 companies and organizations
– More than 2.000.000 domains
• About 25 people
– CEO and founder Tim Draegen is primary author of DMARC
spec and currently one of the chairs of the IETF DMARC
working group
– Scott Kitterman is one of the primary authors of SPF
Who we are
Why DMARC?
Why DMARC?
For any given email:
Real or Not Real?
Why DMARC?
Why DMARC?
“95% of all attacks on enterprise networks are the results from
successful spear phishing”
Allen Paller, Director of Research - SANS Institute
“The FBI reports a $2.3 Billion Loss to Spear Phishing
and CEO Email Scams from Oct 2013 to Aug 2016.
Since January 2015, the FBI has seen a 270% increase
in Cybersecurity attacks.”
fbi.gov
Why DMARC?
Phishing is threat for online trust
• Monetary loss
• Remediation cost
• Reputation cost
Cost of phishing
DMARC fixes email
Gmail question mark
Why DMARC
• Delivery
Use the same modern plumbing that mega
companies use to deliver email.
• Security
Disallow unauthorized use of your email domain to
protect people from spam, fraud, and phishing.
• Visibility
Gain visibility into who and what across the
Internet is sending email using your email domain.
• Identity
Make your email easy to identify across the huge
and growing footprint of DMARC-capable receivers.
How DMARC works
• DNS entry (TXT record _dmarc.example.com)
• Builds on existing email authentication technology
(SPF and DKIM)
• Provides feedback data to Domain Owners
• Allows for blocking of unauthorized email
How DMARC works
DMARC Policy
1. p=none
Monitoring, no impact on mailflows
2. p=quarantine
Deliver to spam folder
3. p=reject
Block email that fails the DMARC check
Return-Path: <foe@SAMPLE.net>
Delivered-To: friend@example.org
Authentication-Results: mail.example.org; spf=pass (example.org: domain
of foe@sample.net designates 1.2.3.4 as permitted sender)
smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net
Received: from ..
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=SAMPLE.net;
s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= ..
Date: Wed, 19 Feb 2014 12:39:06 -0500
From: “Fred“ <foe@CLIENT.net>
To: “Frank Riend” <friend@example.org>
Subject: REMINDER – don’t mess this up, Frank!
Hi, please don’t forget about the meeting. It’s very important!
Your friend,
Fred
DMARC on From domain
DKIM: d= domain
SPF on Envelope domain = Mail From = Return Path
misalignment
DMARC
To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s
From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature.
If the domains match, receivers can safely assert that the email did come from the domain that it purports to come
from. This is how easy-to-identify email is made possible.
FAIL
Return-Path: <foe@CLIENT.net>
Delivered-To: friend@example.org
Authentication-Results: mail.example.org; spf=pass (example.org: domain
of foe@sample.net designates 1.2.3.4 as permitted sender)
smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net
Received: from ..
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=CLIENT.net;
s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= ..
Date: Wed, 19 Feb 2014 12:39:06 -0500
From: “Fred“ <foe@CLIENT.net>
To: “Frank Riend” <friend@example.org>
Subject: REMINDER – don’t mess this up, Frank!
Hi, please don’t forget about the meeting. It’s very important!
Your friend,
Fred
DMARC on From domain
DKIM: d= domain
SPF on Envelope domain = Mail From = Return Path
alignment
DMARC
To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s
From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature.
If the domains match, receivers can safely assert that the email did come from the domain that it purports to come
from. This is how easy-to-identify email is made possible.
PASS on SPF & DKIM
Let’s phish Polizia di Stato
and Banca d’Italia
Polizia di Stato
Polizia di Stato
Polizia di Stato
Polizia di Stato
Polizia di Stato
Internet.nl
Internet.nl
Internet.nl
Internet.nl
Do it the right way
PostNL case
PostNL
Other customer
PostNL DMARC ROI
•Reduced customer support
90.000 euro per year
•Reduced cost of domain
registrations
20.000 euro per year
•Break even period
2 years (looking at direct cost only)
Q&A Session
49
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
WEBINAR CONTACTLAB
http://contactlab.com/it/landing/webinar/
HOME > EVENTI E RISORSE > WEBINAR
See you next year
Contacthub
Thank you!
Marco Franceschetti
Head of Deliverability
marco.fraceschetti@contactlab.com
Wesley Rietveld
Sales Director Europe, dmarcian
wesley@dmarcian.com
Martijn Groeneweg
General Manager Europe, dmarcian
martijn@dmarcian.com

More Related Content

What's hot

Email Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisEmail Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisforensicEmailAnalysis
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking Salman Memon
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team PlaybooksSANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team PlaybooksMauricio Velazco
 
Live Response Collection Overview
Live Response Collection OverviewLive Response Collection Overview
Live Response Collection OverviewBriMorLabs
 
Intranet mailing system
Intranet mailing systemIntranet mailing system
Intranet mailing systemsaili mane
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
 
Threat hunting on the wire
Threat hunting on the wireThreat hunting on the wire
Threat hunting on the wireInfoSec Addicts
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemRoss Wolf
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
HCL Notes and Nomad Troubleshooting for Dummies
HCL Notes and Nomad Troubleshooting for DummiesHCL Notes and Nomad Troubleshooting for Dummies
HCL Notes and Nomad Troubleshooting for Dummiespanagenda
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Browser Security 101
Browser Security 101 Browser Security 101
Browser Security 101 Stormpath
 
Sender Policy Framework​
Sender Policy Framework​Sender Policy Framework​
Sender Policy Framework​ScottMcKeown10
 

What's hot (20)

Email Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisEmail Headers – Expert Forensic Analysis
Email Headers – Expert Forensic Analysis
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team PlaybooksSANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
 
Live Response Collection Overview
Live Response Collection OverviewLive Response Collection Overview
Live Response Collection Overview
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Intranet mailing system
Intranet mailing systemIntranet mailing system
Intranet mailing system
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Threat hunting on the wire
Threat hunting on the wireThreat hunting on the wire
Threat hunting on the wire
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
IPv6 on Mikrotik
IPv6 on MikrotikIPv6 on Mikrotik
IPv6 on Mikrotik
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Melissa Virus
Melissa VirusMelissa Virus
Melissa Virus
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 
Email security
Email securityEmail security
Email security
 
HCL Notes and Nomad Troubleshooting for Dummies
HCL Notes and Nomad Troubleshooting for DummiesHCL Notes and Nomad Troubleshooting for Dummies
HCL Notes and Nomad Troubleshooting for Dummies
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Browser Security 101
Browser Security 101 Browser Security 101
Browser Security 101
 
Sender Policy Framework​
Sender Policy Framework​Sender Policy Framework​
Sender Policy Framework​
 

Similar to Protect your domain with DMARC

2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to KnowChris Arrendale
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCReturn Path
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingTarun Arora
 
Getting startedwithdmarc5
 Getting startedwithdmarc5 Getting startedwithdmarc5
Getting startedwithdmarc5grafica_corella
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2BCamp
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAReturn Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonReturn Path
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domainsCTM360
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Return Path
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationReturn Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Return Path
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCMailkit
 
Authentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real WorldAuthentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real Worldjprice
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works Pinpointe On-Demand
 
Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Salesforce Partners
 
Neuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdShankar Suman
 

Similar to Protect your domain with DMARC (20)

2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
 
Getting startedwithdmarc5
 Getting startedwithdmarc5 Getting startedwithdmarc5
Getting startedwithdmarc5
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
 
Email 101
Email 101Email 101
Email 101
 
Don't Get Phished!
Don't Get Phished!Don't Get Phished!
Don't Get Phished!
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARC
 
Authentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real WorldAuthentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real World
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works
 
Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)
 
Neuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt Ltd
 

More from Contactlab

Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...Contactlab
 
Digital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - AbstractDigital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - AbstractContactlab
 
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...Contactlab
 
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...Contactlab
 
Personas & Journeys
Personas & JourneysPersonas & Journeys
Personas & JourneysContactlab
 
Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!Contactlab
 
Strategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannelStrategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannelContactlab
 
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.Contactlab
 
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.Contactlab
 
GDPR: è iniziato il countdown
GDPR: è iniziato il countdownGDPR: è iniziato il countdown
GDPR: è iniziato il countdownContactlab
 
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...Contactlab
 
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...Contactlab
 
Metodologia Agile in Contactlab
Metodologia Agile in ContactlabMetodologia Agile in Contactlab
Metodologia Agile in ContactlabContactlab
 
Welfare in Contactlab
Welfare in ContactlabWelfare in Contactlab
Welfare in ContactlabContactlab
 
Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.Contactlab
 
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventiIl viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventiContactlab
 
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...Contactlab
 
So cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketingSo cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketingContactlab
 
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...Contactlab
 
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...Contactlab
 

More from Contactlab (20)

Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
 
Digital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - AbstractDigital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - Abstract
 
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
 
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
 
Personas & Journeys
Personas & JourneysPersonas & Journeys
Personas & Journeys
 
Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!
 
Strategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannelStrategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannel
 
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
 
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
 
GDPR: è iniziato il countdown
GDPR: è iniziato il countdownGDPR: è iniziato il countdown
GDPR: è iniziato il countdown
 
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
 
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
 
Metodologia Agile in Contactlab
Metodologia Agile in ContactlabMetodologia Agile in Contactlab
Metodologia Agile in Contactlab
 
Welfare in Contactlab
Welfare in ContactlabWelfare in Contactlab
Welfare in Contactlab
 
Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.
 
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventiIl viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
 
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
 
So cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketingSo cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketing
 
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
 
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Protect your domain with DMARC

  • 1. Master version 0.0.2 DMARC Domain-based Message Authentication Reporting & Conformance Martijn Groeneweg General Manager Europe, dmarcian Wesley Rietveld Sales Director Europe, dmarcian Marco Franceschetti, Head of Deliverability, Contactlab
  • 2. 2 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Why you should care! DMARC? Should you as an email marketer care about DMARC? Why is domain authentication important? Why are there always new standards coming from the email ecosystem? Is it a mandatory requirement? Is it about security?
  • 3. 3 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Gmail wants it Source: https://support.google.com/mail/answer/81126?hl=en
  • 4. 4 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Gmail wants it
  • 5. 5 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Authentication: SPF SPF – Path based on email’s path from the Sender (Contactlab) to the Mailbox provider. Works on "Envelope From" domain. Not on the "From" domain. Is it 100% sure? Sender / @example.com IP address DNS Server/ SPF Record Valid authentication? Yes / No MBP – filter mix
  • 6. 6 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Authentication: DKIM DKIM – "validating a domain name identity that is associated with a message through cryptographic authentication". "DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message that is in transit. The organization is a handler of the message, either as its originator or as an intermediary. Their reputation is the basis for evaluating whether to trust the message for further handling, such as delivery. " www.dkim.org Is it a 100% sure method?
  • 7. 7 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. What DMARC brings Source: https://support.google.com/a/answer/2466580 “You'll receive a daily report from each participating email provider so you can see how often your messages are authenticated, how often invalid messages are identified, and policy actions requested and taken by IP address.”
  • 8. Protect your domain with DMARC
  • 9. • Who we are • Why DMARC? • How DMARC works • Let’s phish Polizia di Stato and Banca d’Italia • PostNL case • Questions Agenda
  • 11. • Started in 2012 • dmarcian is the leading “Full Service” provider of DMARC Services • dmarcian has a regionalized European operations that meets European data requirements • dmarcian offers – Web based tooling – Deployment support – Support packages Who we are
  • 12. • Customers – Banks, top internet properties, marketing agencies, telecoms and commercial enterprises of all sizes – More than 19.000 companies and organizations – More than 2.000.000 domains • About 25 people – CEO and founder Tim Draegen is primary author of DMARC spec and currently one of the chairs of the IETF DMARC working group – Scott Kitterman is one of the primary authors of SPF Who we are
  • 15. For any given email: Real or Not Real? Why DMARC?
  • 17. “95% of all attacks on enterprise networks are the results from successful spear phishing” Allen Paller, Director of Research - SANS Institute “The FBI reports a $2.3 Billion Loss to Spear Phishing and CEO Email Scams from Oct 2013 to Aug 2016. Since January 2015, the FBI has seen a 270% increase in Cybersecurity attacks.” fbi.gov Why DMARC?
  • 18. Phishing is threat for online trust
  • 19. • Monetary loss • Remediation cost • Reputation cost Cost of phishing
  • 22. Why DMARC • Delivery Use the same modern plumbing that mega companies use to deliver email. • Security Disallow unauthorized use of your email domain to protect people from spam, fraud, and phishing. • Visibility Gain visibility into who and what across the Internet is sending email using your email domain. • Identity Make your email easy to identify across the huge and growing footprint of DMARC-capable receivers.
  • 24. • DNS entry (TXT record _dmarc.example.com) • Builds on existing email authentication technology (SPF and DKIM) • Provides feedback data to Domain Owners • Allows for blocking of unauthorized email How DMARC works
  • 25. DMARC Policy 1. p=none Monitoring, no impact on mailflows 2. p=quarantine Deliver to spam folder 3. p=reject Block email that fails the DMARC check
  • 26. Return-Path: <foe@SAMPLE.net> Delivered-To: friend@example.org Authentication-Results: mail.example.org; spf=pass (example.org: domain of foe@sample.net designates 1.2.3.4 as permitted sender) smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net Received: from .. DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=SAMPLE.net; s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= .. Date: Wed, 19 Feb 2014 12:39:06 -0500 From: “Fred“ <foe@CLIENT.net> To: “Frank Riend” <friend@example.org> Subject: REMINDER – don’t mess this up, Frank! Hi, please don’t forget about the meeting. It’s very important! Your friend, Fred DMARC on From domain DKIM: d= domain SPF on Envelope domain = Mail From = Return Path misalignment DMARC To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature. If the domains match, receivers can safely assert that the email did come from the domain that it purports to come from. This is how easy-to-identify email is made possible. FAIL
  • 27. Return-Path: <foe@CLIENT.net> Delivered-To: friend@example.org Authentication-Results: mail.example.org; spf=pass (example.org: domain of foe@sample.net designates 1.2.3.4 as permitted sender) smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net Received: from .. DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=CLIENT.net; s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= .. Date: Wed, 19 Feb 2014 12:39:06 -0500 From: “Fred“ <foe@CLIENT.net> To: “Frank Riend” <friend@example.org> Subject: REMINDER – don’t mess this up, Frank! Hi, please don’t forget about the meeting. It’s very important! Your friend, Fred DMARC on From domain DKIM: d= domain SPF on Envelope domain = Mail From = Return Path alignment DMARC To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature. If the domains match, receivers can safely assert that the email did come from the domain that it purports to come from. This is how easy-to-identify email is made possible. PASS on SPF & DKIM
  • 28. Let’s phish Polizia di Stato and Banca d’Italia
  • 38. Do it the right way
  • 40.
  • 41.
  • 42.
  • 43.
  • 45.
  • 46.
  • 47. PostNL DMARC ROI •Reduced customer support 90.000 euro per year •Reduced cost of domain registrations 20.000 euro per year •Break even period 2 years (looking at direct cost only)
  • 49. 49 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. WEBINAR CONTACTLAB http://contactlab.com/it/landing/webinar/ HOME > EVENTI E RISORSE > WEBINAR See you next year Contacthub
  • 50. Thank you! Marco Franceschetti Head of Deliverability marco.fraceschetti@contactlab.com Wesley Rietveld Sales Director Europe, dmarcian wesley@dmarcian.com Martijn Groeneweg General Manager Europe, dmarcian martijn@dmarcian.com