SlideShare a Scribd company logo
1 of 50
Download to read offline
Master version 0.0.2
DMARC
Domain-based Message
Authentication Reporting & Conformance
Martijn Groeneweg General Manager Europe, dmarcian
Wesley Rietveld Sales Director Europe, dmarcian
Marco Franceschetti, Head of Deliverability, Contactlab
2
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Why you should care!
DMARC?
Should you as an email marketer care about DMARC?
Why is domain authentication important? Why are there always new standards coming from the email ecosystem?
Is it a mandatory requirement?
Is it about security?
3
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Gmail wants it
Source: https://support.google.com/mail/answer/81126?hl=en
4
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Gmail wants it
5
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Authentication: SPF
SPF – Path based on email’s path from the Sender (Contactlab) to the Mailbox provider.
Works on "Envelope From" domain. Not on the "From" domain.
Is it 100% sure?
Sender /
@example.com
IP address DNS Server/
SPF Record
Valid authentication? Yes / No MBP – filter
mix
6
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
Authentication: DKIM
DKIM – "validating a domain name identity that is associated with a message through cryptographic
authentication".
"DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message that is in
transit. The organization is a handler of the message, either as its originator or as an intermediary. Their
reputation is the basis for evaluating whether to trust the message for further handling, such as delivery. "
www.dkim.org
Is it a 100% sure method?
7
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
What DMARC brings
Source: https://support.google.com/a/answer/2466580
“You'll receive a daily report from each participating email provider so you can see how
often your messages are authenticated, how often invalid messages are identified,
and policy actions requested and taken by IP address.”
Protect your domain with DMARC
• Who we are
• Why DMARC?
• How DMARC works
• Let’s phish Polizia di Stato and Banca d’Italia
• PostNL case
• Questions
Agenda
Who we are
• Started in 2012
• dmarcian is the leading “Full Service” provider of
DMARC Services
• dmarcian has a regionalized European operations that
meets European data requirements
• dmarcian offers
– Web based tooling
– Deployment support
– Support packages
Who we are
• Customers
– Banks, top internet properties, marketing agencies, telecoms
and commercial enterprises of all sizes
– More than 19.000 companies and organizations
– More than 2.000.000 domains
• About 25 people
– CEO and founder Tim Draegen is primary author of DMARC
spec and currently one of the chairs of the IETF DMARC
working group
– Scott Kitterman is one of the primary authors of SPF
Who we are
Why DMARC?
Why DMARC?
For any given email:
Real or Not Real?
Why DMARC?
Why DMARC?
“95% of all attacks on enterprise networks are the results from
successful spear phishing”
Allen Paller, Director of Research - SANS Institute
“The FBI reports a $2.3 Billion Loss to Spear Phishing
and CEO Email Scams from Oct 2013 to Aug 2016.
Since January 2015, the FBI has seen a 270% increase
in Cybersecurity attacks.”
fbi.gov
Why DMARC?
Phishing is threat for online trust
• Monetary loss
• Remediation cost
• Reputation cost
Cost of phishing
DMARC fixes email
Gmail question mark
Why DMARC
• Delivery
Use the same modern plumbing that mega
companies use to deliver email.
• Security
Disallow unauthorized use of your email domain to
protect people from spam, fraud, and phishing.
• Visibility
Gain visibility into who and what across the
Internet is sending email using your email domain.
• Identity
Make your email easy to identify across the huge
and growing footprint of DMARC-capable receivers.
How DMARC works
• DNS entry (TXT record _dmarc.example.com)
• Builds on existing email authentication technology
(SPF and DKIM)
• Provides feedback data to Domain Owners
• Allows for blocking of unauthorized email
How DMARC works
DMARC Policy
1. p=none
Monitoring, no impact on mailflows
2. p=quarantine
Deliver to spam folder
3. p=reject
Block email that fails the DMARC check
Return-Path: <foe@SAMPLE.net>
Delivered-To: friend@example.org
Authentication-Results: mail.example.org; spf=pass (example.org: domain
of foe@sample.net designates 1.2.3.4 as permitted sender)
smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net
Received: from ..
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=SAMPLE.net;
s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= ..
Date: Wed, 19 Feb 2014 12:39:06 -0500
From: “Fred“ <foe@CLIENT.net>
To: “Frank Riend” <friend@example.org>
Subject: REMINDER – don’t mess this up, Frank!
Hi, please don’t forget about the meeting. It’s very important!
Your friend,
Fred
DMARC on From domain
DKIM: d= domain
SPF on Envelope domain = Mail From = Return Path
misalignment
DMARC
To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s
From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature.
If the domains match, receivers can safely assert that the email did come from the domain that it purports to come
from. This is how easy-to-identify email is made possible.
FAIL
Return-Path: <foe@CLIENT.net>
Delivered-To: friend@example.org
Authentication-Results: mail.example.org; spf=pass (example.org: domain
of foe@sample.net designates 1.2.3.4 as permitted sender)
smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net
Received: from ..
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=CLIENT.net;
s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= ..
Date: Wed, 19 Feb 2014 12:39:06 -0500
From: “Fred“ <foe@CLIENT.net>
To: “Frank Riend” <friend@example.org>
Subject: REMINDER – don’t mess this up, Frank!
Hi, please don’t forget about the meeting. It’s very important!
Your friend,
Fred
DMARC on From domain
DKIM: d= domain
SPF on Envelope domain = Mail From = Return Path
alignment
DMARC
To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s
From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature.
If the domains match, receivers can safely assert that the email did come from the domain that it purports to come
from. This is how easy-to-identify email is made possible.
PASS on SPF & DKIM
Let’s phish Polizia di Stato
and Banca d’Italia
Polizia di Stato
Polizia di Stato
Polizia di Stato
Polizia di Stato
Polizia di Stato
Internet.nl
Internet.nl
Internet.nl
Internet.nl
Do it the right way
PostNL case
PostNL
Other customer
PostNL DMARC ROI
•Reduced customer support
90.000 euro per year
•Reduced cost of domain
registrations
20.000 euro per year
•Break even period
2 years (looking at direct cost only)
Q&A Session
49
© Copyright 2017-2019 Contactlab
This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner.
WEBINAR CONTACTLAB
http://contactlab.com/it/landing/webinar/
HOME > EVENTI E RISORSE > WEBINAR
See you next year
Contacthub
Thank you!
Marco Franceschetti
Head of Deliverability
marco.fraceschetti@contactlab.com
Wesley Rietveld
Sales Director Europe, dmarcian
wesley@dmarcian.com
Martijn Groeneweg
General Manager Europe, dmarcian
martijn@dmarcian.com

More Related Content

What's hot

Ransomware
RansomwareRansomware
RansomwareG Prachi
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
 
Ransomware
Ransomware Ransomware
Ransomware Armor
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on TwitterYansi Keim
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsingjgswift
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ransomware
RansomwareRansomware
Ransomware
 
Spam
SpamSpam
Spam
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Hacking techniques
Hacking techniquesHacking techniques
Hacking techniques
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Ransomware
Ransomware Ransomware
Ransomware
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Ransomware
RansomwareRansomware
Ransomware
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Ransomware
RansomwareRansomware
Ransomware
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
05 tk3193-sniffing &amp; dos
05 tk3193-sniffing &amp; dos05 tk3193-sniffing &amp; dos
05 tk3193-sniffing &amp; dos
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 

Similar to Protect your domain with DMARC

2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to KnowChris Arrendale
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCReturn Path
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingTarun Arora
 
Getting startedwithdmarc5
 Getting startedwithdmarc5 Getting startedwithdmarc5
Getting startedwithdmarc5grafica_corella
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2BCamp
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAReturn Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonReturn Path
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...Gangcai Lin
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domainsCTM360
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Return Path
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationReturn Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Return Path
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCMailkit
 
Authentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real WorldAuthentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real Worldjprice
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works Pinpointe On-Demand
 
Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Salesforce Partners
 

Similar to Protect your domain with DMARC (20)

2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know2017 Deliverabilty & Beyond - What Eloquans Need to Know
2017 Deliverabilty & Beyond - What Eloquans Need to Know
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
 
Getting startedwithdmarc5
 Getting startedwithdmarc5 Getting startedwithdmarc5
Getting startedwithdmarc5
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
 
Email 101
Email 101Email 101
Email 101
 
Don't Get Phished!
Don't Get Phished!Don't Get Phished!
Don't Get Phished!
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARC
 
Authentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real WorldAuthentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real World
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works
 
Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)
 

More from Contactlab

Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...Contactlab
 
Digital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - AbstractDigital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - AbstractContactlab
 
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...Contactlab
 
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...Contactlab
 
Personas & Journeys
Personas & JourneysPersonas & Journeys
Personas & JourneysContactlab
 
Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!Contactlab
 
Strategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannelStrategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannelContactlab
 
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.Contactlab
 
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.Contactlab
 
GDPR: è iniziato il countdown
GDPR: è iniziato il countdownGDPR: è iniziato il countdown
GDPR: è iniziato il countdownContactlab
 
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...Contactlab
 
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...Contactlab
 
Metodologia Agile in Contactlab
Metodologia Agile in ContactlabMetodologia Agile in Contactlab
Metodologia Agile in ContactlabContactlab
 
Welfare in Contactlab
Welfare in ContactlabWelfare in Contactlab
Welfare in ContactlabContactlab
 
Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.Contactlab
 
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventiIl viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventiContactlab
 
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...Contactlab
 
So cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketingSo cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketingContactlab
 
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...Contactlab
 
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...Contactlab
 

More from Contactlab (20)

Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
Come migliorare l’engagement tramite analisi dei dati, algoritmi predittivi e...
 
Digital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - AbstractDigital Competitive Map Contemporary 2019 - Abstract
Digital Competitive Map Contemporary 2019 - Abstract
 
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
Artificial Intelligence or Artificial Dummies? Come istruire la macchina a no...
 
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
User journeys: FATTI non PAROLE.Come analizzare i processi di acquisto e usar...
 
Personas & Journeys
Personas & JourneysPersonas & Journeys
Personas & Journeys
 
Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!Conosci il vero significato dei tuoi dati con Analytics!
Conosci il vero significato dei tuoi dati con Analytics!
 
Strategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannelStrategia di personalizzazione omnichannel
Strategia di personalizzazione omnichannel
 
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
Algoritmi e modelli predittivi per arricchire il profilo unico dei tuoi utenti.
 
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
Gestisci e automatizza le tue azioni di marketing su un'unica piattaforma.
 
GDPR: è iniziato il countdown
GDPR: è iniziato il countdownGDPR: è iniziato il countdown
GDPR: è iniziato il countdown
 
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
NEW EDITION! Il caso del “luxury feeling”: best practice sull’esperienza d’ac...
 
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
CONTACTONE: COSTRUISCI RELAZIONI SOLIDE E DURATURE CON I TUOI CLIENTI E MIGLI...
 
Metodologia Agile in Contactlab
Metodologia Agile in ContactlabMetodologia Agile in Contactlab
Metodologia Agile in Contactlab
 
Welfare in Contactlab
Welfare in ContactlabWelfare in Contactlab
Welfare in Contactlab
 
Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.Caso Costa. Personalizzare l'esperienza oltre la crociera.
Caso Costa. Personalizzare l'esperienza oltre la crociera.
 
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventiIl viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
Il viaggio di un'architettura: dal monolite ad un ecosistema di API ed eventi
 
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
Creare UI semplici, intuitive ed efficaci con la Pattern Library di Contactla...
 
So cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketingSo cosa hai fatto: dietro le quinte del Data-driven marketing
So cosa hai fatto: dietro le quinte del Data-driven marketing
 
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
Contactone: il modello di sviluppo che favorisce la relazione diretta con il ...
 
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
API, SDK e Plugin: raccogliere e integrare i dati, abilitare un profilo consu...
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Protect your domain with DMARC

  • 1. Master version 0.0.2 DMARC Domain-based Message Authentication Reporting & Conformance Martijn Groeneweg General Manager Europe, dmarcian Wesley Rietveld Sales Director Europe, dmarcian Marco Franceschetti, Head of Deliverability, Contactlab
  • 2. 2 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Why you should care! DMARC? Should you as an email marketer care about DMARC? Why is domain authentication important? Why are there always new standards coming from the email ecosystem? Is it a mandatory requirement? Is it about security?
  • 3. 3 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Gmail wants it Source: https://support.google.com/mail/answer/81126?hl=en
  • 4. 4 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Gmail wants it
  • 5. 5 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Authentication: SPF SPF – Path based on email’s path from the Sender (Contactlab) to the Mailbox provider. Works on "Envelope From" domain. Not on the "From" domain. Is it 100% sure? Sender / @example.com IP address DNS Server/ SPF Record Valid authentication? Yes / No MBP – filter mix
  • 6. 6 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. Authentication: DKIM DKIM – "validating a domain name identity that is associated with a message through cryptographic authentication". "DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message that is in transit. The organization is a handler of the message, either as its originator or as an intermediary. Their reputation is the basis for evaluating whether to trust the message for further handling, such as delivery. " www.dkim.org Is it a 100% sure method?
  • 7. 7 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. What DMARC brings Source: https://support.google.com/a/answer/2466580 “You'll receive a daily report from each participating email provider so you can see how often your messages are authenticated, how often invalid messages are identified, and policy actions requested and taken by IP address.”
  • 8. Protect your domain with DMARC
  • 9. • Who we are • Why DMARC? • How DMARC works • Let’s phish Polizia di Stato and Banca d’Italia • PostNL case • Questions Agenda
  • 11. • Started in 2012 • dmarcian is the leading “Full Service” provider of DMARC Services • dmarcian has a regionalized European operations that meets European data requirements • dmarcian offers – Web based tooling – Deployment support – Support packages Who we are
  • 12. • Customers – Banks, top internet properties, marketing agencies, telecoms and commercial enterprises of all sizes – More than 19.000 companies and organizations – More than 2.000.000 domains • About 25 people – CEO and founder Tim Draegen is primary author of DMARC spec and currently one of the chairs of the IETF DMARC working group – Scott Kitterman is one of the primary authors of SPF Who we are
  • 15. For any given email: Real or Not Real? Why DMARC?
  • 17. “95% of all attacks on enterprise networks are the results from successful spear phishing” Allen Paller, Director of Research - SANS Institute “The FBI reports a $2.3 Billion Loss to Spear Phishing and CEO Email Scams from Oct 2013 to Aug 2016. Since January 2015, the FBI has seen a 270% increase in Cybersecurity attacks.” fbi.gov Why DMARC?
  • 18. Phishing is threat for online trust
  • 19. • Monetary loss • Remediation cost • Reputation cost Cost of phishing
  • 22. Why DMARC • Delivery Use the same modern plumbing that mega companies use to deliver email. • Security Disallow unauthorized use of your email domain to protect people from spam, fraud, and phishing. • Visibility Gain visibility into who and what across the Internet is sending email using your email domain. • Identity Make your email easy to identify across the huge and growing footprint of DMARC-capable receivers.
  • 24. • DNS entry (TXT record _dmarc.example.com) • Builds on existing email authentication technology (SPF and DKIM) • Provides feedback data to Domain Owners • Allows for blocking of unauthorized email How DMARC works
  • 25. DMARC Policy 1. p=none Monitoring, no impact on mailflows 2. p=quarantine Deliver to spam folder 3. p=reject Block email that fails the DMARC check
  • 26. Return-Path: <foe@SAMPLE.net> Delivered-To: friend@example.org Authentication-Results: mail.example.org; spf=pass (example.org: domain of foe@sample.net designates 1.2.3.4 as permitted sender) smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net Received: from .. DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=SAMPLE.net; s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= .. Date: Wed, 19 Feb 2014 12:39:06 -0500 From: “Fred“ <foe@CLIENT.net> To: “Frank Riend” <friend@example.org> Subject: REMINDER – don’t mess this up, Frank! Hi, please don’t forget about the meeting. It’s very important! Your friend, Fred DMARC on From domain DKIM: d= domain SPF on Envelope domain = Mail From = Return Path misalignment DMARC To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature. If the domains match, receivers can safely assert that the email did come from the domain that it purports to come from. This is how easy-to-identify email is made possible. FAIL
  • 27. Return-Path: <foe@CLIENT.net> Delivered-To: friend@example.org Authentication-Results: mail.example.org; spf=pass (example.org: domain of foe@sample.net designates 1.2.3.4 as permitted sender) smtp.mail=foe@sample.net; dkim=pass header.i=@sample.net Received: from .. DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=CLIENT.net; s=february_2014; i=@sample.net; q=dns/txt; h= .. ; bh= .. ; b= .. Date: Wed, 19 Feb 2014 12:39:06 -0500 From: “Fred“ <foe@CLIENT.net> To: “Frank Riend” <friend@example.org> Subject: REMINDER – don’t mess this up, Frank! Hi, please don’t forget about the meeting. It’s very important! Your friend, Fred DMARC on From domain DKIM: d= domain SPF on Envelope domain = Mail From = Return Path alignment DMARC To tie it all together. For a piece of email to be considered compliant with DMARC, the domain found in an email’s From: header must match either the SPF-validated domain or the originating domain found in a valid DKIM signature. If the domains match, receivers can safely assert that the email did come from the domain that it purports to come from. This is how easy-to-identify email is made possible. PASS on SPF & DKIM
  • 28. Let’s phish Polizia di Stato and Banca d’Italia
  • 38. Do it the right way
  • 40.
  • 41.
  • 42.
  • 43.
  • 45.
  • 46.
  • 47. PostNL DMARC ROI •Reduced customer support 90.000 euro per year •Reduced cost of domain registrations 20.000 euro per year •Break even period 2 years (looking at direct cost only)
  • 49. 49 © Copyright 2017-2019 Contactlab This document may not be modified, organized or reutilized in any way without the express written permission of the rightful owner. WEBINAR CONTACTLAB http://contactlab.com/it/landing/webinar/ HOME > EVENTI E RISORSE > WEBINAR See you next year Contacthub
  • 50. Thank you! Marco Franceschetti Head of Deliverability marco.fraceschetti@contactlab.com Wesley Rietveld Sales Director Europe, dmarcian wesley@dmarcian.com Martijn Groeneweg General Manager Europe, dmarcian martijn@dmarcian.com