Messaging Pipeline | Blog
Free Newsletter GlossaryContact UsAbout Us
One To One Collaboration Servers & Security Business

October 19, 2005
Playing It Safe Doesn't Always Work, But It's A Good Start

Does sender certification work as a method of ensuring the legitimacy of e-mail senders? According to Habeas Inc., provider of the popular Habeas Safelist database of certified senders, it does.

claims that it is now receiving more than 20 million requests per day from messaging systems worldwide. That represents a ten-fold increase in traffic in the last six months.

Domains and ISPs are checking incoming e-mail against the Habeas Safelist database to determine whether to deliver a message to the intended receiver. One thing for sure, The list of ISPs that consult the Habeas database on regular basis reads like a Who's Who of service providers: AOL, Earthlink, Google, MSN, Mindspring, Yahoo, just to name a few.

So, if certification is becoming so popular, why does so much junk continue to seep in? Because there is only one way that certification can be 100-percent effective, and that’s to get every legitimate sender certified. A database like Habeas' can certainly be helpful, but an organization can exclude a lot of legitimate e-mail if it limits its acceptable messages to certified senders.

For direct marketers doing business online, such certification would seem like a must. Of course, that brings up another problem. There are several of these sender bonding programs out there, so to be truly covered, you'd have to sign up for them all.

In all, I'd say these bonded sender lists are helpful but an incomplete solution to the problem. More effective, but even more difficult to implement, would be for receiving organizations to implement their own certified sender lists. For large, global organizations serving millions of messages per day, that chore would be mind-boggling, requiring every employee with e-mail access to accredit each new sender. Of course, that's what these online bandits count on. For now it's just easier to hit the delete key.

Posted by Mitch Irsfeld at 02:59 PM | Permalink

Comment on this blog entry


March 2006
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

Monthly Archives

Messaging Pipeline

Get the latest Messaging news, product info, and trends every week.

  Get The Messaging Pipeline Blog RSS Feed

Editorial and vendor perspectives


Editor's Picks
The Six Flavors Of Windows Vista
Microsoft plans to release a full six-pack of Vista versions, one for every taste. Which Vista will be right for you?

Hope is Not Enough When It Comes To Compliance

Three Ways To Authenticate E-Mail And Stop Spam

Wikis In The Workplace

Review: Google Desktop 3

Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.

Roaring Penguin's CanIt-PRO anti-spam solution offers customizable spam and virus control for enterprises, campuses and ISPs. Designed for the mail server, CanIt-PRO lets you stop spam on YOUR terms. Click for free price quote for your organization.

Use your Intranet to manage Software Licenses, plan for Windows XP/2000 upgrades, do Security Audits and more. Click to try and ask for our white paper - PC Management for the Internet Age.

Analysts at the Tolly Group put a leading Branch Office IT services solution to the test, measuring performance, security and data reliability. Download the results, detailed in this free report, now.

Whether you need temporary or permanent access to remote PCs, LogMeIn has your solution: LogMeIn IT Reach for automatic maintenance of remote and mobile systems, and LogMeIn Rescue for instant, web-based remote access without pre-installing software.

Sponsored Links:      
 |   |   |   |   |   | 
 |   |   |   | 
 |   |   |   |   | 
Messaging Pipeline  |   |   |   | 
 |   |   |   |   | 
© 2006 | MESSAGING PIPELINE All rights reserved. | |