Frequently-Asked Questions |
|
|
How is this different and better than everything else out there? |
Everyone else only filters spam. You still have to review all the email that got marked as spam. We never even allow spam to be sent so there's nothing for you to review. This is the only product on the market that really stops spam |
Will this work with my email software like Outlook, Eudora or Entourage? |
YES! Titan Key works with ANY email client because it installs at the mail server level which also means there's no software you need to install. If your ISP has The Titan Key, YOU can have The Titan Key! |
What is a KeyMail Address? |
It's an email address that looks and works like anything else, except you get to decide how it can be used. |
What is The Titan Key? |
It's a server that acts like an email firewall, stopping spam before its sent. It also acts like an email server, accepting and forwarding email for a given domain. It actually operates as an email relay. |
How does it work? |
A keymail address lets you make rules on who and how email can be sent to it. Any sender that violates your rules is not allowed to send you mail. |
It must be more complicated than that! |
Well, actually, it is, internally. But as far as the user is concerned, you just use email the way you normally do. Except now you get to create different KeyMail addresses when Web sites ask for your address. Now you're in control. |
How does it prevent companies from selling my email address? How it works |
Well, it doesn't prevent them from selling your address, but it certainly makes your KeyMail address worthless to the company that paid for it. This is because you can create a KeyMail with a policy that says, "this can be only used by the company I give it to". And it won't work for any company that violates that rule. |
How does The Titan Key know if someone is violating my conditions or not? |
KeyMail addresses are smart in that their usage is tracked by a database and anyone that uses the email address is compared against those that have already used it. Your policies are applied against this collection to determine whether or not the email should be accepted. |
What can I do if I start getting unwanted email? |
That's really up to you. Lets say for instance you subscribed to a newsletter that did not respect your subsequent request to unsubscribe. All you do then is simply disable that KeyMail and they are gone. If that KeyMail is being used by many other people or company that don't want to affect, you can just disable the KeyMail for that one company. If you created a "wide open" KeyMail, you can just lock it, and the people that used it can continue to use it, but no one else can. |
How do I protect my existing email address? |
You decide and can change your mind anytime. If you have an old email address that gets a lot of spam, you can request that anyone you don't know first prove they are person and not a mass-email program before they can send you mail. If you have a new email address that does not get spam but you want to protect yourself against future spam and unwanted email, you can continue using your regular email address alongside new KeyMail addresses you create for various reasons. |
Why is this better than aliases or "disposable" email addresses? |
You can't assign a usage policy to an alias. Aliases don't enforce your policy by bouncing violating email. You can't stop someone from using an alias. But you can do all these things with a KeyMail address. The problem with disposable addresses is that the only thing you can do is dispose them. And once you do, say bye-bye to all the good email that is normally sent to that address. Ouch! You can use a KeyMail address just like a disposable, except that when it gets tainted you don't have to dispose of it. In fact, you continue controlling who can use it, when, and how, via policies. This means that if a KeyMail starts getting unwanted mail, you can lock it down and stop unwanted mail yet continue receiving mail you like. |
How do I subscribe to newsletters and order confirmations? |
Easy! |
Can I get email from legitimate people I don't know without forcing them to use Challenge/Response? |
Of course! Just give out your KeyMail address. Anyone that gets it, whether you know them or not, can send an email straight to your inbox. |
How many KeyMail Addresses can I have? |
As many as you want! |
What kinds of policies can I assign to my KeyMail Address? |
There's a lot of variations and here's a list of the current options. Basically you can make a KeyMail work for a given company only, a given person only, a number of companies, or a number of people. And you can "lock" a keymail which only lets in those that used it already (and no one else), disable a keymail so that no one can use it, or disable a KeyMail after a certain number of days. |
How does a KeyMail Address stop spam before it's even sent? |
If you're technical, walk through a direct test to verify the claim. Email is sent in two parts: In part one, the sender connects to your email server and tells it your address and their address. In part two, your email server allows the sender to transmit the email contents. The Titan Key never lets spammers (or anyone else that doesn't respect your policies) get past part 1. |
What happens when spammers get a hold of my KeyMail Address? |
That depends on the policy you have in effect. For example if that KeyMail has a policy to be used only by the organization you gave it to, then spammers can't do anything with it. If you have an "wide open" policy on that Keymail, then when you do receive your first spam, you can change the policy on your KeyMail making it unspammable. For example, you can "lock" it so that only those that have already used it can continue to use it. Or if you want to be a little more flexible, you can require that new senders prove they are a person. Of course, you can always disable it, but you don't have to be that severe because you have a lot more control than ever before. |
How does this install in our network? |
The Titan Key becomes your organization's primary MX and then it relays clean incoming email to your existing email servers. Outgoing mail has to pass through The Titan Key which then relays it through your existing email server for final delivery. Here's a simple logical diagram that explains it. |
Do all our users have to use it? |
NO! Each user can make their own decision if they want to stop spam or not. And each user also gets to decide how to stop spam. You can have as few as one, or as many as all of the users within a given domain. |
How do users get started? |
Users self-subscribe via a Web interface. We supply utilities that allow them to upload their whitelist of known senders. Users then use The Titan Key in a "passive" mode that shows them which email will get rejected and which mail will come through without actually acting on it. Once the user feels comfortable that The Titan Key is doing its job, they flip a switch and spam is gone forever. |
How do users control the product? |
The Titan Key is controlled by a Web interface that supports end-user, domain administrators, and server administrators. Practically everything is run from the Web. Most of the control, however, is automatic, as The Titan Key builds its database from user policies and email sent and received. |
|