![]() ![]() These additional metrics give good insight into consumer behaviour and interactions – detecting normal and anomalous useįor further information please take a look at the videos and documentation below and contact us anytime video below is a brief introduction to the elements returned from the API request.There are several ways to mark emails as verified or unverified. Using this consortium model, enhanced metrics can be applied to further add confidence to the email verification process The results with a description are shown below: Description of the resultsĮmail activity data is monitored as email addresses appear for verification, across the ThreatPoint service. The risk score above should be considered a recommendation. Of course each business may want to tailor those rules. This is largely because of association with other activity across the email consortium and the fact is considered a role account.Įven though the email is valid, consideration should be given before allowing sign up with this email address. The response for which is shown below: Sample responseįrom the response we can see that the Email verification service considers the email as high risk (graded 1 – 100). The above request is using the email address You can see the simple format of the request.Ī Postman collection for all our APIs is available Lets take a quick look at a sample request and response using postman Postman request using the Email Verification API Utilise our Javascript SDK to embed the calls into your existing web sites and services (optional)Īlternatively – make use of our WordPress email verification plugin – details further down the document.The email verification service can eliminates these issues from your web site Malicious attackers and spam bots typically use disposable addresses and non human addresses.Email verification and reputation intelligence can also be used to stop spam in contact forms and allow sign up to web site services.Risk signals associated with an email address can be evaluated to highlight good and likely bad behaviour.Email addresses are a good indicator of normal behaviour and usage.The Email Verification and Validation API allows customers to verify and validate email addresses before allowing consumer to sign up for or entry into existing services. This where the email verification and validation API comes into use. With that in mind, when we allow sign up to services via email, or present contact forms to consumers we should be taking steps to make sure the email provided is valid and does not show historic association with unusual or malicious activity.Īdditionally we may simply want our customers to only use email addresses that have existed for a certain amount of time, to be clean of spam association and not be from disposable one time use services. ![]() The frequency we move house is typically greater than the frequency of changing email address. In fact it become more of a constant digital attribute than good old bricks and mortar addresses. Nowadays its not unusual for a consumer to use the same email address for many years. From that typical and normal usage, patterns create associations of good and perceived bad or malicious behaviour (email risk). ![]() Trust and digital identity can be directly related to our use of email in our daily lives. An email address is so much more than what it seems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |