kickbox u

Understanding BIMI

understanding-bimi

Email Authentication Series Part 1: Why Email Authentication Matters to Your Email Program Part 2: Understanding SPF Authentication Part 3: Understanding DKIM Authentication Part 4: Understanding DMARC Authentication > Part 5: Understanding BIMI How BIMI brings logos to the inbox Now that you’re an authentication expert, it’s time to turn our attention to BIMI. In this series, we’ve been digging into the details around why…

Read More »

Understanding DMARC Authentication

understanding-dmarc-authentication

Email Authentication Series Part 1: Why Email Authentication Matters to Your Email Program Part 2: Understanding SPF Authentication Part 3: Understanding DKIM Authentication > Part 4: Understanding DMARC Authentication Part 5: Understanding BIMI How DMARC helps to protect your domain from spoofing It’s DMARC time. If you just got here, you might want to brush up on Parts 1-3 before you jump into DMARC. We…

Read More »

Understanding DKIM Authentication

understanding-dkim-authentication

Email Authentication Series Part 1: Why Email Authentication Matters to Your Email Program Part 2: Understanding SPF Authentication > Part 3: Understanding DKIM Authentication Part 4: Understanding DMARC Authentication Part 5: Understanding BIMI How DKIM helps to protect content If you’ve been following our email authentication series—it’s time to get your wetsuit on—we’re about to dive deep into DKIM (DomainKeys Identified Mail) and how it…

Read More »

Understanding SPF Authentication

understanding-spf-authentication

Email Authentication Series Part 1: Why Email Authentication Matters to Your Email Program > Part 2: Understanding SPF Authentication Part 3: Understanding DKIM Authentication Part 4: Understanding DMARC Authentication (coming soon) Part 5: Understanding BIMI (coming soon) How SPF helps to prevent sender domain spoofing In part one, we covered the importance of email authentication, why it’s needed, why it's done the way it’s done,…

Read More »

Why Email Authentication Matters to Your Email Program

why-email-authentication-matters-to-your-email-program

An Introduction to Email Authentication Have you ever received an email from yourself, but you never sent it? (tires screeching, brakes burning) What?! If you’re nodding, you know too much about email. If not, this series is for you. Email is flexible, adaptable, and ever-evolving in its purpose. Sadly malicious actors have taken advantage of these qualities, which is why we have anti-spam laws, spam…

Read More »

Executing Your Plan & IP Warming Best Practices

executing-your-plan-&-ip-warming-best-practices

Domain and IP warming is not a simple, quick sprint, but instead is a marathon exercise in building reputation. If you’ve been following this email warming series, you’ve already invested valuable time in the warming process. We've covered the basics of IP warming, what you need to do before starting the IP warm up process, and how to create an IP warming schedule. But we…

Read More »

The Plan: How to Build Your Domain & IP Warming Schedule

the-plan:-how-to-build-your-domain-&-ip-warming-schedule

The domain and IP warming process is fluid to meet the numerous situational needs: new sender setup, platform infrastructure, system limitations, and adapting to performance issues with the mailbox providers. This is why there are many different warming plans published, none of which are wrong. We’ve covered the basics of email warming, why IP warming is important and the steps you need to take before…

Read More »

What Is IP Warming & Why Is It Important?

what-is-ip-warming-&-why-is-it-important?

An Introduction to Email Warming New sending identities result from many things—the creation of a new message stream, a new dedicated IP, a new email sending domain, a new ESP integration, a rebranding, a new sender, a platform migration, and so on. The process by which you introduce and establish your new sending identity is a foundational topic in the world of deliverability. It goes…

Read More »
>