1 / 11

Overview

Overview. ™. ™. May 2006. Password change required!.

kadeem
Download Presentation

Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview ™ ™ May 2006

  2. Password change required! Dear sir, We recently have determined that different computers have logged onto your eBay account, and multiple password failures were present before the logons. We strongly advice CHANGE YOUR PASSWORD. If this is not completed by March 11, 2006, we will be forced to suspend your account indefinitely, as it may have been used for fraudulent purposes. Thank you for your cooperation. Please do not reply to this e-mail. Mail sent to this address cannot be answered. Click here to Change Your Password Thank you for your prompt attention to this matter. We apologize for any inconvenience.Thank you for using eBay! An Email Inbox of RiskFear, uncertainty, doubt • 67% of email users are suspicious ofany message requesting donations • 55% delete all messages fromfinancial institutions

  3. A Troubled InboxThe numbers tell a distressing story • Outsource Research Consulting, 2006 • Javeline Strategy & Research, 2006 • Gartner Research, 2005 • Pivotal Veracity, 2005

  4. Identifying the Safe MailVisual certification builds trust, verifies safety

  5. Identifying the Safe MailVisual certification builds trust, verifies safety

  6. SenderAccountability Platform Technology and Business ProcessISP’s demand comprehensive risk management IDENTITY Deep Accreditation Path to Accountability TOKENIZEDMESSAGES Volume Management Message-Level Tracking LABELING Distinguish Good Mail Convey Certificationto Recipient ACCOUNTABILITY Enforcement Penalties Revocation BEHAVIOR MONITORING Best Practices Feedback

  7. Confirmed delivery • Higher open rate • Improved click-through • Enable paper suppression ü ü ü ü CertifiedEmail BenefitsInbox labeling, detailed reporting, assured delivery • Secure • Protects against spoofing with cryptographically-signed tokens • CertifiedEmail Inbox Labeling • Non-spoofable • Conveys TRUST • In the message AND the inbox • Full message functionality • Images, enabled links • No self-censorship on copy • Assured Delivery • Normal complaint filtering • Bypass volume filters • Bypass content filters • Confirmation of delivery to server-level inbox* • Enhanced reporting • Detailed accurate reports • Functional error reportingon non-delivery * Messages do not override recipient controlled filters or blocks

  8. Non-Profit PricingSubsidized pricing for those with a need for CertifiedEmail, most do not • Accredited Non-Profits execute Token Purchase Agreement with Goodmail • Free tokens in 2006 • Predictable annual fees based on mail volume tiers 1/25 of a cent

  9. Safe Email: Too Important Not To Be • Email quickly becoming central to our lives • 146 million adult email users in the US • Keep in touch with family, participate in groups,make donations, buy goods and services • The need to protect consumersand restore trust is critical CertifiedEmail. If it’s certified, it’s safe.

  10. Thank you

  11. 3 3 6 6 9 9 5 5 8 8 4 4 1 1 2 2 How the Goodmail System WorksSecure, asynchronous, efficient The sender creates a message The Imprinter generates a hash of the message and requests a token from the Generator. Goodmail does not see message bodies or recipient addresses. GOODMAIL SYSTEMS GENERATOR DATA CENTER The Generator approves the request and returns a valid cryptographic token End User Computer The token is applied to the message and the message is sent in the normal manner The Mailbox Provider checks for a valid token Inbox If no token is present, the message is processed as they are today TOKEN? Bulk IMPRINTER If a token is present and valid, the message is delivered to the inbox, identified as Certified Email Content & Volume Filters Trash Internet SENDER MAILBOX PROVIDER The Mailbox Provider sends logs of token processing status to Goodmail for processing of reports to senders. Goodmail also receives complaint logs for reputation monitoring

More Related