Luckily for you, our developers can't get enough of it. All you need to know is, we've got you covered.
Maintaining a good sender reputation
Today, the most important factor in the delivery of your email is your sender reputation. If ISP's don't know you or don't like what you're sending, you won't be invited back. We're constantly working to ensure you can piggyback off our great reputation and give your campaigns the best chance of reaching the inbox.
![]() |
Human approval process Before they can send a single campaign, every new customer is reviewed by our team to ensure they meet our comprehensive criteria covering permission, email content, privacy and much more. |
![]() |
ISP feedback loop integration Promothon is integrated into the feedback loop of ISP’s like Yahoo, Hotmail and AOL. We can detect if a subscriber marks you as spam, and remove them from your list automatically. |
|
![]() |
3rd party deliverability monitoring We use a number of third party tools to monitor our inbox delivery to dozens of the leading ISP’s allowing us to spot potential delivery issues and react immediately. Our team monitors all major blacklists daily. |
![]() |
Smart bounce and complaint handling We automatically detect different types of bounces and react accordingly. Undeliverable addresses are removed immediately, temporary fails are given additional chances before removal based on best practice. |
|
![]() |
Export to Excel We support confirmed opt-in for all subscriber lists, include a single click unsubscribe link in all campaigns and allow your subscribers to maintain their own subscription through preference centers. |
![]() |
Email authentication Email authentication allows our customers to prove they are who they say they are. Using technologies like Sender ID and DomainKeys/DKIM you can protect your reputation and improve the chances of getting delivered. |
|
![]() |
Best practice built
in Hotmail and more mean we can report on complaints. |
![]() |
Activity timeline See your complete history with every subscriber in a handy timeline. |
To keep your data safe, secure and always available we use a state-of-the-art redundant server cluster in a fully managed, world class data center. All sensitive data is stored on servers behind a constantly maintained firewall using the same level of encryption as many banks.
![]() |
World class data center Our US-based data center is monitored 24x7 for all aspects of operational security and performance. It is also equipped with state-of-the-art security such as biometrics and sensors for intrusion detection. |
![]() |
Serious about data security All sensitive data is stored on servers behind a constantly maintained firewall. Our database servers are secured by additional access restrictions, and more sensitive data is encrypted. |
|
![]() |
Smart redundancy We have redundancy at every layer of our application to ensure a smooth recovery in the event of any type of hardware failure. All data is also securely backed up offsite for the unlikely event of a system-wide failure. |
![]() |
Strict privacy policy Our strictly enforced privacy policy ensures your data is never shared with third parties and is kept safe and secure at all times. Only limited staff have access to your account in order to provide support. |
We're here to help.
If you can’t find an answer
here contact us and we’ll see what we can do to help.