How to Use Email and SMS Marketing from the same Database and get superior results.

Written by Rick Rakauskas

Continued from page 1

Here is a problem looking for a solution. Research has found that around 1 in 5 optin emails still get filtered out by nanny state ISP's who think adults shouldn't think for themselves about what they want to read.

How does this affect you if you have an optin database of 500 folks who really want to read your stuff?

Statistically 100 will never see your message. Frightening when you figure what it cost to get those names inrepparttar first place?

You have a monthly email newsletter which goes out to your whole database. But you are worried that some of your clients don't get it, because of spam filters on their ISP. Most folks don't know what a whitelist is, or how to set it up.


Your database is 500, and you really treasurerepparttar 109519 bond you have with your prospects and clients. They like you too.

Whenrepparttar 109520 email goes out, an SMS goes out too. "Hi Frank, I just sent your copy by email ofrepparttar 109521 Silver Bullet e-newsletter. If you don't have it please call so we can fix your spam filter - Rick"

Hard cost for 500 SMS messages? $67.50

It's peanuts for marketing that makes sure folks actually read at least ONE of your marketing pieces i.e.repparttar 109522 SMS message.

Do you seerepparttar 109523 power this can give you?

How often do you have a special deal for selected clients? Need to fill up numbers because you're short at a function?

There are heaps of other applications for SMS and email combined.

If you takerepparttar 109524 free trip at please tell them that I sent you. And yeah if you become a paying client, I get a bit of cash too. So what, you've now got a tool that gives you a very large edge which absolutley no-one knows about.


Life's short, so make it fun and profitable.

Rick Rakauskas

Rick Rakauskas is a marketer and direct response copywriter in Australia. His clients love his eclectic problem solving approach. How can a Feng Shui consultant JV with a financial planner so both get results? "...the right words delivered to the right audience... every time"

Does Your Email Reputation System Have a Bad Rep?

Written by CipherTrust

Continued from page 1

Two prominent examples of bonded programs are IronPort’s Bonded Sender Program and and Habeas’ Sender Warranted Email programs. These programs allow email marketers to secure bonds to certify that their email adheres to guidelines onrepparttar basis of privacy, mailing practices and issue resolution. ISPs and other mail servers can then query Bonded Sender when scanning incoming messages and handle them accordingly. However, this “pay-to-play” model is fundamentally flawed, as it gives spammersrepparttar 109518 ability to simply “buy” their way ontorepparttar 109519 list by securing a bond as a legitimate sender, regardless of whether they’re actually legitimate or not. Whilerepparttar 109520 cost ofrepparttar 109521 bond may be prohibitive to some senders,repparttar 109522 benefits far outweighrepparttar 109523 costs to most spammers, asrepparttar 109524 only wayrepparttar 109525 bond will be debited is if Bonded Sender receives complaints about a specific account sending spam. And really, when wasrepparttar 109526 last time you or anyone you know reported receiving spam? Would you even know where to report it? In reality, spammers are paying IronPort forrepparttar 109527 right to clog your inbox.

TrustedSource is CipherTrust’s adaptive, real-time email reputation system that provides information on email sender behavior. Who sends spam? Who polices their outbound email well? TrustedSource knows. By constantly observing and analyzing email traffic acrossrepparttar 109528 Internet, CipherTrust identifiesrepparttar 109529 "good guys.” TrustedSource provides constant updates on sender status to improve spam-fighting accuracy and allows IronMail,repparttar 109530 secure email gateway, to achieverepparttar 109531 highest level of accuracy in determining good email from bad.

TrustedSource servers provide data to IronMail by contributing negative values to IronMail’s Spam Profiler (SP) algorithm for messages sent from senders that are deemed reputable. Every message that passes through IronMail is checked againstrepparttar 109532 TrustedSource list and based onrepparttar 109533 reply, IronMail will make a decision about whether to reducerepparttar 109534 overall SP spam score for that message and improve its chances of not being classified as spam.

What constitutes “good behavior” Spammer behavior changes constantly so no definitive answer is available. However,repparttar 109535 following practices are considered “best practices” for email senders:

  • Comply withrepparttar 109536 proper RFC protocols for email.
  • Do not attempt to obscure content or messages in emails.
  • Do not send email to unverified or nonexistent email addresses.
  • Post privacy policies where they can be read and understood, prior to submission of a request.
  • Offer opportunities for users to opt-out of programs.
Adopting a reputation-based anti-spam system alone has not proven effective to stop spam. However, by combining reputation-based systems such as CipherTrust’s TrustedSource with other methods of spam control technologies such as SIDF, SPF, Bayesian Filters, Blacklists, Whitelists, Anomaly Detection, and Spam Signatures, IronMail has achieved industry-leading success.

CipherTrust is the leader in anti-spam and email security. Learn more by downloading our free whitepaper, “No Phishing: Protecting Employees from E-mail Fraud” or by visiting

    <Back to Page 1 © 2005
Terms of Use