JangoMail Supports Authentication Technologies
JangoMail now supports DomainKeys and DKIM email authentication technologies
DAYTON, Ohio -- JangoMail, a market leader in on-demand software for permission-based e-mail marketing, today announced support for two open-standard e-mail authentication specifications - DomainKeys and the DomainKeys Identified Mail (DKIM) protocol - becoming one of the first e-mail marketing providers to implement both of these technologies. The influx of unsolicited e-mail and spam, as well as phishing, spoofing and other potential threats, can impact the success of e-mail marketing campaigns. Support for DomainKeys and the DKIM protocol is designed to authenticate organizations utilizing e-mail marketing campaigns as trusted senders.
"We are pleased to offer support for both DomainKeys and DomainKeys Identified Mail in our JangoMail product so our customers can rest assured that e-mails are delivered to desired recipients," said Ajay Goel, President of JangoMail. "Our support for these important standards will help our customers significantly improve deliverability rates of their JangoMail-driven e-mail campaigns."
The brainchild of Mark Delany of Yahoo!, DomainKeys is an e-mail authentication standard designed to verify both the domain of each e-mail sender and the integrity of messages sent. The latest authentication standard, DKIM, is based on Yahoo!'s DomainKeys and Cisco's Identified Mail technologies. DKIM offers a method for validating an identity that is associated with a message, during the time it is transferred over the Internet at which point that identity then can be held accountable for the message.
According to Gartner, Inc., "E-mail authentication will lessen the problem of spoofing of e-mail domains, which lead to phishing attacks, malicious code and other problems. For companies that use e-mail as a critical channel for communicating with partners and customers, growing suspicion in whether an e-mail is legitimate and can be trusted is a big problem.. Companies that send high-volume and high-value e-mail communications should consider adopting . DKIM by 2008." 1
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024