SlideShare a Scribd company logo
Dutch email landscape
Some statistics
•    90% of households connected to internet
•    0.8% of internet users worldwide in NL
•    2.5 to 5 computers per 1000 in botnet
•    1.7% of bots worldwide in NL
•    < 1% of spam worldwide sent from NL
•    79% email received in NL is spam
•    most common non-english spam is Dutch (1.3%)
•    2.1% of spam received is in Dutch
Large email senders
              WorldStream
              Koninklijke KPN
              Solcon Internetdiensten
              LeaseWeb
              Ecatel LTD
              Interactive 3D
              Xs4all Internet
              WideXS
              Kabelservice Maastricht
              Unspecified
              Nxs Internet
              Hostnet
              UPC Broadband Operations
              Rokscom Internet
              Interned Services
              Green ISP
              Reasonnet IP Networks
              TrueServer
              Tripolis Solutions
              Stichting Proxility
              Startphone Ltd
              Other
Important email destinations
                     Windows Live
                     KPN
                     Ziggo
                     Google
                     UPC
                     Versatel
                     Wanadoo
                     Yahoo
                     Tiscali
                     HCC
                     Zeelandnet
                     Telenet
                     Telfort
                     Skynet
                     AOL
                     Cleanport
                     GMX
                     Postini
                     Frontbridge
                     Other

More Related Content

Similar to Dutch Email Landscape

Automation of Glass fiber Deployments in The Netherlands
Automation of Glass fiber Deployments in The NetherlandsAutomation of Glass fiber Deployments in The Netherlands
Automation of Glass fiber Deployments in The Netherlands
Kiran Solipuram. DEP, CFHP
 
Introduction to Telco-OTT Services
Introduction to Telco-OTT ServicesIntroduction to Telco-OTT Services
Introduction to Telco-OTT ServicesMartin Geddes
 
Introduction to Telco-OTT - Disruptive Analysis Ltd and Martin Geddes consult...
Introduction to Telco-OTT - Disruptive Analysis Ltd and Martin Geddes consult...Introduction to Telco-OTT - Disruptive Analysis Ltd and Martin Geddes consult...
Introduction to Telco-OTT - Disruptive Analysis Ltd and Martin Geddes consult...
Dean Bubley
 
Internet Telephony
Internet TelephonyInternet Telephony
Internet Telephony
SamPath KumAr M S
 
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Thomas Siegers
 
Access network discovery
Access network discoveryAccess network discovery
Access network discoveryabenitop
 
Conneu nov2011-new revenuemodelschallengessolutions
Conneu nov2011-new revenuemodelschallengessolutionsConneu nov2011-new revenuemodelschallengessolutions
Conneu nov2011-new revenuemodelschallengessolutionsRob Blaauboer
 
Widyatama.lecture.applied networking.iv-week-09-voip
Widyatama.lecture.applied networking.iv-week-09-voipWidyatama.lecture.applied networking.iv-week-09-voip
Widyatama.lecture.applied networking.iv-week-09-voipDjadja Sardjana
 
A W T Profoss VoIP & Asterisk
A W T  Profoss VoIP & AsteriskA W T  Profoss VoIP & Asterisk
A W T Profoss VoIP & Asterisk
ir. Carmelo Zaccone
 
Mobile Evolution
Mobile EvolutionMobile Evolution
Mobile Evolution
Vasco Elvas
 
Advances in IPv6 in Mobile Networks Globecom 2011
Advances in IPv6 in Mobile Networks Globecom 2011Advances in IPv6 in Mobile Networks Globecom 2011
Advances in IPv6 in Mobile Networks Globecom 2011
John Loughney
 
ppt on 4g in detail from og to 4g
ppt on 4g in detail from og to 4gppt on 4g in detail from og to 4g
ppt on 4g in detail from og to 4g
Neeraj Dixit
 
UMTS_and_beyond.ppt
UMTS_and_beyond.pptUMTS_and_beyond.ppt
UMTS_and_beyond.ppt
Santhosh Krishna
 
Ddo8 Peter Anker Digital Dividend In Nl
Ddo8 Peter Anker   Digital Dividend In NlDdo8 Peter Anker   Digital Dividend In Nl
Ddo8 Peter Anker Digital Dividend In Nlimec.archive
 

Similar to Dutch Email Landscape (20)

Automation of Glass fiber Deployments in The Netherlands
Automation of Glass fiber Deployments in The NetherlandsAutomation of Glass fiber Deployments in The Netherlands
Automation of Glass fiber Deployments in The Netherlands
 
Introduction to Telco-OTT Services
Introduction to Telco-OTT ServicesIntroduction to Telco-OTT Services
Introduction to Telco-OTT Services
 
Introduction to Telco-OTT - Disruptive Analysis Ltd and Martin Geddes consult...
Introduction to Telco-OTT - Disruptive Analysis Ltd and Martin Geddes consult...Introduction to Telco-OTT - Disruptive Analysis Ltd and Martin Geddes consult...
Introduction to Telco-OTT - Disruptive Analysis Ltd and Martin Geddes consult...
 
Internet Telephony
Internet TelephonyInternet Telephony
Internet Telephony
 
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
 
Access network discovery
Access network discoveryAccess network discovery
Access network discovery
 
Conneu nov2011-new revenuemodelschallengessolutions
Conneu nov2011-new revenuemodelschallengessolutionsConneu nov2011-new revenuemodelschallengessolutions
Conneu nov2011-new revenuemodelschallengessolutions
 
Widyatama.lecture.applied networking.iv-week-09-voip
Widyatama.lecture.applied networking.iv-week-09-voipWidyatama.lecture.applied networking.iv-week-09-voip
Widyatama.lecture.applied networking.iv-week-09-voip
 
Nextgeneration network
Nextgeneration networkNextgeneration network
Nextgeneration network
 
Vo ip
Vo ipVo ip
Vo ip
 
A W T Profoss VoIP & Asterisk
A W T  Profoss VoIP & AsteriskA W T  Profoss VoIP & Asterisk
A W T Profoss VoIP & Asterisk
 
Mobile Evolution
Mobile EvolutionMobile Evolution
Mobile Evolution
 
Advances in IPv6 in Mobile Networks Globecom 2011
Advances in IPv6 in Mobile Networks Globecom 2011Advances in IPv6 in Mobile Networks Globecom 2011
Advances in IPv6 in Mobile Networks Globecom 2011
 
ppt on 4g in detail from og to 4g
ppt on 4g in detail from og to 4gppt on 4g in detail from og to 4g
ppt on 4g in detail from og to 4g
 
UMTS_and_beyond.ppt
UMTS_and_beyond.pptUMTS_and_beyond.ppt
UMTS_and_beyond.ppt
 
Gbell Ra
Gbell RaGbell Ra
Gbell Ra
 
Ddo8 Peter Anker Digital Dividend In Nl
Ddo8 Peter Anker   Digital Dividend In NlDdo8 Peter Anker   Digital Dividend In Nl
Ddo8 Peter Anker Digital Dividend In Nl
 
ETERNITY PE
ETERNITY PEETERNITY PE
ETERNITY PE
 
ETERNITY PE
ETERNITY PEETERNITY PE
ETERNITY PE
 
Broadband power point
Broadband power pointBroadband power point
Broadband power point
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Dutch Email Landscape

  • 2. Some statistics •  90% of households connected to internet •  0.8% of internet users worldwide in NL •  2.5 to 5 computers per 1000 in botnet •  1.7% of bots worldwide in NL •  < 1% of spam worldwide sent from NL •  79% email received in NL is spam •  most common non-english spam is Dutch (1.3%) •  2.1% of spam received is in Dutch
  • 3. Large email senders WorldStream Koninklijke KPN Solcon Internetdiensten LeaseWeb Ecatel LTD Interactive 3D Xs4all Internet WideXS Kabelservice Maastricht Unspecified Nxs Internet Hostnet UPC Broadband Operations Rokscom Internet Interned Services Green ISP Reasonnet IP Networks TrueServer Tripolis Solutions Stichting Proxility Startphone Ltd Other
  • 4. Important email destinations Windows Live KPN Ziggo Google UPC Versatel Wanadoo Yahoo Tiscali HCC Zeelandnet Telenet Telfort Skynet AOL Cleanport GMX Postini Frontbridge Other