Frequently-Asked Questions |
|
|
How is this different
and better than everything else out there? |
Everyone else only filters
spam. You still have to review all the email that got marked as spam. We
never even allow spam to be sent so there's nothing for you to review. This
is the only product on the market that really stops spam |
Will this work with
my email software like Outlook, Eudora or Entourage? |
YES! Titan Key works with
ANY email client because it installs at the mail server level which also
means there's no software you need to install. If your ISP has The Titan
Key, YOU can have The Titan Key! |
What is a KeyMail
Address? |
It's an email address that
looks and works like anything else, except you get to decide how it can be
used. |
What is
The Titan Key? |
It's a server that acts
like an email firewall, stopping spam before its sent. It also acts like an
email server, accepting and forwarding email for a given domain. It actually
operates as an email relay. |
How does
it work? |
A keymail address lets you
make rules on who and how email can be sent to it. Any sender that violates
your rules is not allowed to send you mail. |
It must be more
complicated than that! |
Well, actually, it is,
internally. But as far as the user is concerned, you just use email the way
you normally do. Except now you get to create different KeyMail addresses
when Web sites ask for your address. Now you're in control. |
How does it prevent
companies from selling my email address? How it works |
Well, it doesn't prevent them
from selling your address, but it certainly makes your KeyMail
address worthless to the company that paid for it. This is because
you can create a KeyMail with a policy that says, "this can be only used by
the company I give it to". And it won't work for any company that violates
that rule. |
How does The Titan
Key know if someone is violating my conditions or not? |
KeyMail addresses are
smart in that their usage is tracked by a database and anyone that uses
the email address is compared against those that have already used it. Your
policies are applied against this collection to determine whether or not the
email should be accepted. |
What can
I do if I start getting unwanted email? |
That's really up to you.
Lets say for instance you subscribed to a newsletter that did not respect
your subsequent request to unsubscribe. All you do then is simply
disable that KeyMail and they are gone. If that KeyMail is being used
by many other people or company that don't want to affect, you can just
disable the KeyMail for that one company. If you created a "wide open"
KeyMail, you can just lock it, and the people that used it can continue to
use it, but no one else can. |
How do I
protect my existing email address? |
You decide and can change
your mind anytime. If you have an old email address that gets a lot
of spam, you can request that anyone you don't know first prove
they are person and not a mass-email program before they can send you mail.
If you have a new
email address that does not get spam but you want to protect
yourself against future spam and unwanted email, you can continue using your
regular email address alongside new KeyMail addresses you create for various
reasons. |
Why is this better
than aliases or "disposable" email addresses? |
You can't assign a usage
policy to an alias. Aliases don't enforce your policy by bouncing violating
email. You can't stop someone from using an alias. But you can do all these
things with a KeyMail address.
The problem with disposable
addresses is that the only thing you can do is dispose
them. And once you do, say bye-bye to all the good email that is
normally sent to that address. Ouch!
You can use a KeyMail
address just like a disposable, except that when it gets tainted you don't
have to dispose of it. In fact, you continue controlling who can use it,
when, and how, via policies. This means that if a KeyMail starts getting
unwanted mail, you can lock it down and stop unwanted mail yet continue
receiving mail you like. |
How do I subscribe to
newsletters and order confirmations? |
Easy!
1) Create your KeyMail via the Web interface or use an existing KeyMail.
2) Submit it to the newsletter or ecommerce Web site.
Newsletters and order confirmations flow straight to your inbox. You don't
have to to know their email address in advance or anything. Just use
it. |
Can I get email from
legitimate people I don't know without forcing them to use
Challenge/Response? |
Of course!
Just give out your KeyMail address. Anyone that gets it, whether you know
them or not, can send an email straight to your inbox. |
How many KeyMail
Addresses can I have? |
As many as you want! |
What
kinds of policies can I assign to my KeyMail Address? |
There's a lot of variations
and here's a list of the current options. Basically you can make a KeyMail
work for a given company only, a given person only, a number of companies,
or a number of people. And you can "lock" a keymail which only lets in those
that used it already (and no one else), disable a keymail so that no one can
use it, or disable a KeyMail after a certain number of days. |
How does
a KeyMail Address stop spam before it's even sent? |
If you're technical, walk
through a direct test to verify the claim. Email is sent in two parts: In
part one, the sender connects to your email server and tells it your address
and their address. In part two, your email server allows the sender to
transmit the email contents. The Titan Key never lets spammers (or anyone
else that doesn't respect your policies) get past part 1. |
What happens when
spammers get a hold of my KeyMail Address? |
That depends on the policy
you have in effect. For example if that KeyMail has a policy to be used only
by the organization you gave it to, then spammers can't do anything with it.
If you have an "wide open"
policy on that Keymail, then when you do receive your first spam, you can
change the policy on your KeyMail making it unspammable. For example, you
can "lock" it so that only those that have already used it can continue to
use it. Or if you want to be a little more flexible, you can require that
new senders prove they are a person.
Of course, you can always
disable it, but you don't have to be that severe because you have a lot more
control than ever before. |
How does
this install in our network? |
The Titan Key becomes your
organization's primary MX and then it relays clean incoming email to your
existing email servers. Outgoing mail has to pass through The Titan Key
which then relays it through your existing email server for final delivery.
Here's a simple logical diagram that explains it. |
Do all
our users have to use it? |
NO! Each
user can make their own decision if they want to stop spam or not. And each
user also gets to decide how to stop spam. You can have as few as
one, or as many as all of the users within a given domain. |
How do
users get started? |
Users self-subscribe via a
Web interface. We supply utilities that allow them to upload their whitelist
of known senders. Users then use The Titan Key in a "passive" mode that
shows them which email will get rejected and which mail will come through
without actually acting on it. Once the user feels comfortable that The
Titan Key is doing its job, they flip a switch and spam is gone
forever. |
How do users control
the product? |
The Titan Key is controlled
by a Web interface that supports end-user, domain administrators, and server
administrators. Practically everything is run from the Web. Most of the
control, however, is automatic, as The Titan Key builds its database from
user policies and email sent and received. |
|