How PhishShield Works

1) Configure

Use PhishShield to send email by forwarding your email through our SMTP relay, using our API, or by sending a campaign through your dashboard.

  • Forwarding email through our relay is the easiest approach, and can be set up in a few minutes.
  • Use our API directly in your application. See the PhishShield API Reference for more information.
  • Create a marketing campaign by adding your HTML and mailing list from the Campaigns page in your dashboard.

We recommend you integrate PhishShield Verification Technology to include a security image in your email that allows your users to verify the email you send them. We provide a default email template you can enable from your Settings page that will insert your users' security image at the bottom of your emails. You can also create your own template to include this image or manually include it in individual emails.

2) Collect Analytics

We collect data by inserting a tracking pixel in each HTML email that is sent through our servers. This tracking pixel is an invisible image that will load when a user opens your email. Once loaded, we can record data about each user's session, including location, browser, email client, timestamps, and email activity like clicks and opens.

You can view granular data as well as high level trends from the Emails and Users pages on your dashboard. Unlike other providers, PhishShield gives you unlimited storage space and never limits you on what historical data you can view or query.

PhishShield makes your data scientists happy by being the only email delivery platform that gives you full access to your data that is queryable via SQL from our API or the Data page in your dashboard.

3) Protect Your Users

Enabling PhishShield Verification Technology creates an additional level of trust between your users and the email you send. We protect your users against phishing emails and other social engineering threats by establishing a second factor to authorize you as the legitimate sender, but without the cumbersome user experience that is associated with conventional two factor solutions.

In addtion to our verification technology, you can also create a country and IP whitelist or blacklist to receive alerts when a user interacts with your email from a restricted location. Set up your notifications in the Settings page to receive email alerts or webhook events and aggregate violations from your Security Alerts page.