Subscribe to our newsletter

Arrow
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Authentication protocols are often treated like checkboxes. You set up SPF, DKIM, and DMARC, they validate, you’re done. Most teams do them correctly enough to pass basic validation.

We do something different. We review them line by line, beyond pass-fail.

What We’re Actually Looking For

When we audit your DNS setup, we’re not asking “does this work?” We’re asking “does this look legitimate when examined closely?” That’s a different question.

Consider SPF. The basic requirement is that your SPF record lists the IP addresses authorized to send on your behalf. That’s straightforward. You can generate one in minutes and it will work.

But what looks legitimate under enterprise inspection? A clean, minimal SPF record with a single source of truth. Explicit includes only for services you actually use. A “~all” or “-all” policy that’s intentional. SPF records that don’t have chaotic histories of abandoned services and obsolete entries.

An SPF record can pass validation and still look messy under inspection.

Here’s an example: Your SPF record has includes for Mailgun, SendGrid, Klaviyo, HubSpot, and ActiveCampaign. You’re only actively using Mailgun and SendGrid. The other three are old services you stopped using. The record technically works. But when an enterprise security team audits you, they see a messy record with abandoned services. That suggests poor governance.

We audit for coherence, not just function. Your SPF record should be clean, intentional, and reflect your current sending services. Not cluttered with historical baggage.

DKIM: Key Management and Rotation

DKIM is more complex than SPF because it involves cryptographic keys. You need to generate keys, publish them in DNS, and rotate them over time. Most teams set it up once and forget about it.

We handle DKIM key generation and publication. We set up keys that are properly sized and formatted. We document when they were created so you have a clear history. You have documented, traceable infrastructure, not just “it works.”

We also establish a rotation schedule. Keys don’t stay published forever. Over time, publishing records that include obsolete keys weakens your authentication. It also indicates poor maintenance to ISPs evaluating your credibility. We rotate keys on a reasonable schedule to keep your DKIM clean and current.

Example: You’ve been using the same DKIM key for five years. It still works. But ISP standards have evolved. Stronger key sizes are now expected. Your key looks outdated. We proactively rotate to a newer, stronger key. You’re always current, not just functional.

For most teams, DKIM is just “is it working?” For us, it’s “is it coherent and well-maintained?”

DMARC: Policy and Reporting

DMARC is the enforcement layer. Your DMARC policy tells ISPs what to do if an email claims to be from you but doesn’t authenticate. It’s your way of saying “I control my sending. If it doesn’t authenticate, block it.”

Most teams set DMARC to “p=none” (monitor only) and leave it there indefinitely. That’s technically safe but it’s not actually using DMARC. You’re collecting reports but not enforcing anything.

We help you evolve to stronger policies over time. We monitor DMARC reports to understand your authentication performance. We look at how many of your emails are authenticating properly. Once you’re consistently authenticating reliably, we can move to “p=quarantine” (filter suspicious mail) or “p=reject” (outright block spoofed mail).

This isn’t aggressive or risky. It’s the natural progression of a mature sender. As your authentication infrastructure matures, your policy can strengthen.

Here’s the sequence: Start at p=none to monitor. Stabilize at p=quarantine once you’re reliably authenticating. Move to p=reject once you have full confidence. That progression from permissive to strict is actually a signal of legitimate sender maturity to ISPs. It says “we’re careful, we test, we enforce standards.”

Coherent Sender Identity Under Inspection

The bigger picture is that your entire authentication setup tells a story. It says:

“I’m a legitimate organization that sends email intentionally. I’ve invested in infrastructure. I maintain it. I have policies. I’m not trying to hide or evade.”

When an enterprise security team inspects your DNS, that’s the impression they should get. Not “does this technically work?” but “is this a legitimate sender?” The difference matters.

That requires:

• Clean SPF with explicit, intentional includes (not abandoned services)
• Well-maintained DKIM with current keys (rotated on schedule)
• DMARC policy that reflects your actual sending pattern (and evolves as you mature)
• DNS records that are tidy and coherent (no abandoned entries, no chaos, no historical baggage)
• A clear mapping between your published records and your actual sending infrastructure

Example: An enterprise security team is evaluating you. They look at your DNS. It’s clean. Your SPF has three includes – all current services. Your DKIM keys are rotated on schedule. Your DMARC policy is at p=quarantine, which is the appropriate level of enforcement. Everything is documented and coherent. They see a legitimate organization managing their infrastructure responsibly.

Compare that to messy DNS with abandoned services and obsolete keys. Different impression. Different filtering outcome.

We build that coherence. Not just technically correct. Intentional and mature.

Periodic Audits Even When Nothing Changes

We audit your setup periodically. Standards change. ISP behaviors evolve. What was acceptable two years ago might be suboptimal now. The email industry moves faster than most people realize.

Maybe ISPs are starting to pay more attention to DKIM key strength. Maybe DMARC subdomain alignment has become more important. Maybe there’s a new best practice around SPF syntax. Maybe Gmail is applying stricter standards to authentication coherence.

Periodic audits catch these shifts. We keep your authentication current not just with technical standards but with evolving ISP expectations. You’re always aligned with current best practices, not yesterday’s acceptable practices.

We’d love to learn more about your business, email deliverability and outreach goals, and see if we might be able to help.

Whether you have questions about what we do, how Protocol works, or you’d just like to pick our brains on some of our best practices, we’d be happy to chat.

Schedule a call with our Revenue Director, Chrisley Ceme.

Talk To Chrisley

Authentication protocols are often treated like checkboxes. You set up SPF, DKIM, and DMARC, they validate, you’re done. Most teams do them correctly enough to pass basic validation.

We do something different. We review them line by line, beyond pass-fail.

What We’re Actually Looking For

When we audit your DNS setup, we’re not asking “does this work?” We’re asking “does this look legitimate when examined closely?” That’s a different question.

Consider SPF. The basic requirement is that your SPF record lists the IP addresses authorized to send on your behalf. That’s straightforward. You can generate one in minutes and it will work.

But what looks legitimate under enterprise inspection? A clean, minimal SPF record with a single source of truth. Explicit includes only for services you actually use. A “~all” or “-all” policy that’s intentional. SPF records that don’t have chaotic histories of abandoned services and obsolete entries.

An SPF record can pass validation and still look messy under inspection.

Here’s an example: Your SPF record has includes for Mailgun, SendGrid, Klaviyo, HubSpot, and ActiveCampaign. You’re only actively using Mailgun and SendGrid. The other three are old services you stopped using. The record technically works. But when an enterprise security team audits you, they see a messy record with abandoned services. That suggests poor governance.

We audit for coherence, not just function. Your SPF record should be clean, intentional, and reflect your current sending services. Not cluttered with historical baggage.

DKIM: Key Management and Rotation

DKIM is more complex than SPF because it involves cryptographic keys. You need to generate keys, publish them in DNS, and rotate them over time. Most teams set it up once and forget about it.

We handle DKIM key generation and publication. We set up keys that are properly sized and formatted. We document when they were created so you have a clear history. You have documented, traceable infrastructure, not just “it works.”

We also establish a rotation schedule. Keys don’t stay published forever. Over time, publishing records that include obsolete keys weakens your authentication. It also indicates poor maintenance to ISPs evaluating your credibility. We rotate keys on a reasonable schedule to keep your DKIM clean and current.

Example: You’ve been using the same DKIM key for five years. It still works. But ISP standards have evolved. Stronger key sizes are now expected. Your key looks outdated. We proactively rotate to a newer, stronger key. You’re always current, not just functional.

For most teams, DKIM is just “is it working?” For us, it’s “is it coherent and well-maintained?”

DMARC: Policy and Reporting

DMARC is the enforcement layer. Your DMARC policy tells ISPs what to do if an email claims to be from you but doesn’t authenticate. It’s your way of saying “I control my sending. If it doesn’t authenticate, block it.”

Most teams set DMARC to “p=none” (monitor only) and leave it there indefinitely. That’s technically safe but it’s not actually using DMARC. You’re collecting reports but not enforcing anything.

We help you evolve to stronger policies over time. We monitor DMARC reports to understand your authentication performance. We look at how many of your emails are authenticating properly. Once you’re consistently authenticating reliably, we can move to “p=quarantine” (filter suspicious mail) or “p=reject” (outright block spoofed mail).

This isn’t aggressive or risky. It’s the natural progression of a mature sender. As your authentication infrastructure matures, your policy can strengthen.

Here’s the sequence: Start at p=none to monitor. Stabilize at p=quarantine once you’re reliably authenticating. Move to p=reject once you have full confidence. That progression from permissive to strict is actually a signal of legitimate sender maturity to ISPs. It says “we’re careful, we test, we enforce standards.”

Coherent Sender Identity Under Inspection

The bigger picture is that your entire authentication setup tells a story. It says:

“I’m a legitimate organization that sends email intentionally. I’ve invested in infrastructure. I maintain it. I have policies. I’m not trying to hide or evade.”

When an enterprise security team inspects your DNS, that’s the impression they should get. Not “does this technically work?” but “is this a legitimate sender?” The difference matters.

That requires:

• Clean SPF with explicit, intentional includes (not abandoned services)
• Well-maintained DKIM with current keys (rotated on schedule)
• DMARC policy that reflects your actual sending pattern (and evolves as you mature)
• DNS records that are tidy and coherent (no abandoned entries, no chaos, no historical baggage)
• A clear mapping between your published records and your actual sending infrastructure

Example: An enterprise security team is evaluating you. They look at your DNS. It’s clean. Your SPF has three includes – all current services. Your DKIM keys are rotated on schedule. Your DMARC policy is at p=quarantine, which is the appropriate level of enforcement. Everything is documented and coherent. They see a legitimate organization managing their infrastructure responsibly.

Compare that to messy DNS with abandoned services and obsolete keys. Different impression. Different filtering outcome.

We build that coherence. Not just technically correct. Intentional and mature.

Periodic Audits Even When Nothing Changes

We audit your setup periodically. Standards change. ISP behaviors evolve. What was acceptable two years ago might be suboptimal now. The email industry moves faster than most people realize.

Maybe ISPs are starting to pay more attention to DKIM key strength. Maybe DMARC subdomain alignment has become more important. Maybe there’s a new best practice around SPF syntax. Maybe Gmail is applying stricter standards to authentication coherence.

Periodic audits catch these shifts. We keep your authentication current not just with technical standards but with evolving ISP expectations. You’re always aligned with current best practices, not yesterday’s acceptable practices.

Our Revenue Director, Chrisley Ceme, is leading the Triggered Outbound program.Chrisley’s gone deep on this strategy and can walk you through:

  • How Triggered Outbound fits with your outbound goals
  • What triggers are available (and what’s possible within our platform)
  • Pricing, onboarding, and getting started
Talk To Chrisley

Senders Case Studies

See All Case Studies

Momofuku

Founded by chef David Chang, Momofuku is a renowned culinary brand with a nation-wide presence, including restaurants and an online store with delicious goods. They ran into an issue with their email sending – high bounce rates and blocked sending. With hundreds of thousands of people on their email lists eager to stay informed, and an impeccable reputation to uphold, Momofuku wanted to nip this problem in the bud quickly.

  • Momofuku reached out to Senders to run a diagnostic test on their sending infrastructure and find the root cause
  • Senders deliverability experts discovered an issue with their DMARC, which was preventing emails from being sent, as their WordPress wasn't aligned with their SPF
  • Senders provided the most effective solution helping Momofuku restore safe sending, and suggested next steps to ensure everything keeps running smoothly on their end
  • The client reported that Senders helped identify the problem and got them back on track 

Andrew Yeung

Where many others see a problem, Andrew sees an opportunity. His work may center around product leadership at Google (and previously Meta), but his true calling is all about bringing brilliant change-makers together.

How it started: Andrew hosted small-scale dinners for a handful of people at the peak of the pandemic in NYC, to enable safe connections during the most isolating times. How it’s going: His events now count as many as 2,000 tech leaders each, and he has set up 100+ such parties for more than 15,000 people in the past couple of years. Andrew understands that if two minds are better than one, putting two thousand together, preferably in the same room, can make a profound difference.

Given the impact of his community-building efforts, people want him to be able to reach out – and email is often the best way to do so. So, we helped out a bit.

  • Andrew came across deliverability issues that prompted him to get in touch with Senders and look into the best possible solutions
  • The Senders team made the necessary domain configuration adjustments, with a focus on the domain’s email authentication settings to enhance security and deliverability
  • The SPF record was updated to include “Brevo” (Sendinblue) to strengthen authentication and reduce the chance of landing emails into spam
  • The DMARC policy update enabled better readability of DMARC reports for human analysts, which is essential for preventing email spoofing and phishing
  • Senders fixed the missing DKIM setup with Google, so that it now shows the email hasn’t been tampered with in transit
  • As a result, the client now has better, more stable email deliverability and security

Myrina.ai

Stands out as a trailblazer in empowering women entrepreneurs through technology and a supportive community.

Myrina.ai offers a cutting-edge range of AI-powered SaaS marketing and sales tools that cater specifically to female entrepreneurs and women-led businesses. Myrina.ai enables users to automate marketing and sales, while helping them scale their authentic selves while saving time and boosting conversions. Their Myrina’s Army community fosters a supportive platform that champions female entrepreneurs and their values, empowering them to conquer barriers and achieve their business goals. The company's dedication to providing not only top-notch technological solutions but also a platform for networking and mentorship underscores their commitment to fostering success among women in the entrepreneurial space.

Naturally, they wanted to make sure their email sending infrastructure was set up correctly to protect their reputation and successfully reach their recipients. Our deliverability team worked with the client’s team on:

  • Aligning the client’s three domains with Amazon to make sure they are compatible and optimized in order to integrate with Amazon’s system
  • Setting up a proper DMARC policy to protect their domains against unauthorized use and phishing scams
  • Enhancing email deliverability as well as security, so that each email sent from these domains can be properly authenticated and more likely to land in the right inbox
  • As a result, the client can protect the reputation of their business and domains, while safely sending out their email campaigns

Physician’s Choice

Sometimes the sheer number of options of any product can be daunting – how on earth do you pick the right one? This is especially true with supplements, as we can find them just about anywhere, but we can rarely understand a third of the ingredients listed. Unlike most, Physician’s Choice provides supplements with pure, potent ingredients that work. No fillers or “proprietary” blends with unidentified ingredients. They do the research, so you don’t have to.

  • The client’s team spotted issues with DMARC failures in Google Postmaster
  • The Senders deliverability team worked with the client to update the DMARC configuration to enable report collection
  • The client is now able to obtain detailed reports to diagnose the exact causes of the failures and prevent them in the future with proper DMARC setup