Impersonation Protection

What technologies does Mail Assure use to help protect against impersonation attacks?

What sender authentication methods are used?

Mail Assure uses three main methods of sender authentication to help combat phishing and spoofing attempts. These are:

What other protection methods does Mail Assure use?

Mail Assure also implements several other technologies to help combat phishing and spoofing attempts.

Examples

Please check here for some examples of spoofing.