JangoMail now supports DomainKeys and DKIM email authentication technologies
DAYTON, Ohio -- JangoMail, a market leader in on-demand software for permission-based e-mail marketing, today announced support for two open-standard e-mail authentication specifications - DomainKeys and the DomainKeys Identified Mail (DKIM) protocol - becoming one of the first e-mail marketing providers to implement both of these technologies. The influx of unsolicited e-mail and spam, as well as phishing, spoofing and other potential threats, can impact the success of e-mail marketing campaigns. Support for DomainKeys and the DKIM protocol is designed to authenticate organizations utilizing e-mail marketing campaigns as trusted senders.
"We are pleased to offer support for both DomainKeys and DomainKeys Identified Mail in our JangoMail product so our customers can rest assured that e-mails are delivered to desired recipients," said Ajay Goel, President of JangoMail. "Our support for these important standards will help our customers significantly improve deliverability rates of their JangoMail-driven e-mail campaigns."
The brainchild of Mark Delany of Yahoo!, DomainKeys is an e-mail authentication standard designed to verify both the domain of each e-mail sender and the integrity of messages sent. The latest authentication standard, DKIM, is based on Yahoo!'s DomainKeys and Cisco's Identified Mail technologies. DKIM offers a method for validating an identity that is associated with a message, during the time it is transferred over the Internet at which point that identity then can be held accountable for the message.
According to Gartner, Inc., "E-mail authentication will lessen the problem of spoofing of e-mail domains, which lead to phishing attacks, malicious code and other problems. For companies that use e-mail as a critical channel for communicating with partners and customers, growing suspicion in whether an e-mail is legitimate and can be trusted is a big problem.. Companies that send high-volume and high-value e-mail communications should consider adopting . DKIM by 2008." 1
About the Author(s)
You May Also Like
Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024