Title


Email Marketing Optimization: Risk vs. Reward of ESPs

ClickZ
April 14, 2011
Experts
Email Marketing Optimization
E-mail E-mail  |   Share: Share it on Twitter Share it on Facebook Share it on LinkedIn
Risk vs. Reward of ESPs
Derek Harding  |  Contact Derek  |  Comment  |  Print version


Since the end of March, the biggest buzz among email service providers and their clients has been the Epsilon security breach. There has been plenty written about it by people far closer to it than I, but there is an aspect to this from an ESP customer standpoint that I have not seen discussed.

Loss of data through email service providers is just a single facet of what is going on. In today's world, consumers expect to be able to access and update their profiles online, in real time. They expect to be able to shop, track shipments, book flights, hotels, and car rental, perform bank transactions, and receive real-time email notifications for it all.

These activities require web-based interfaces to backend databases containing personal information. In addition, the integration of different vendors and systems requires the implementation of web-services' APIs. Think of these as web interfaces for computers to speak to each other directly.

When I started working in the IT sector at the end of the 1980s, attitudes to data security were enormously different to today. At that time, no enterprise would even consider making their house database accessible over a public network. The mere suggestion of it would have been seen as a serious error of judgment. It was well-understood that the only truly secure computer system was one that had been switched off and placed in a safe and that convenience and security are antagonists.

In part, this may have been because I was working in the United Kingdom for a phone company that still remembered being part of the government, but I also believe attitudes have changed. Twenty years, and the growth of the commercial Internet has had a profound impact on customer expectations, which in turn have impacted how companies do business.

Real-time integration requires real-time access to data. Private networks, or even virtual private networks (VPNs), are too cumbersome, time-consuming, and costly to set up for all these integration points, and so the public Internet (the cloud) is used. This makes some amazing functionality possible, but it also involves removing some longstanding safeguards for personal data.

The result is that the amount of data that is accessible over the Internet has been rising year-on-year. Almost every request for proposal (RFP) that I see today includes not only web-based access to personal data but also API-based access. The requirement to be able to retrieve and update subscriber lists, demographic, preference, and behavioral data at the click of a mouse is commonplace.

So what's the point of this history lesson? An email marketer that chooses to use an ESP is a consumer of cloud-based services. Such services have substantial business benefit. The ability to utilize incredibly powerful systems and software though a highly cost-effective service model is enormously valuable. However, such services also come with some security risks.

I am not providing a checklist of things to do or steps to take to protect your data. Understanding your security risk is far more complex and far too important to leave to a brief checklist in an online article.

What I do want to make clear though is that the question is not limited to whether your service provider has good security. Security has to be end-to-end. Your own systems are an important link in the chain and the requirements you place on your providers can substantially impact your overall exposure.

Though we often focus on system security, attacks are made against people as much as against systems. That's both your provider's people and your own. Unfortunately, people can be gullible, forgetful, fallible, and deceitful. Even the best can be caught out.

While this is perhaps the largest and certainly the most public breach yet, it is not the first and will be far from the last. For as long as there have been things of value there have been people trying to steal them. The result is that there is, and will always be, risk. The key is to understand what level of risk you're taking for what business benefit and to decide if that risk/benefit calculation is right for your organization. If it isn't, you may need to make changes not just to providers and systems, but to the business processes driving them.

RSS  |  App  
Recent Columns by Derek Harding
Today's Experts Columns
Yesterday's Experts Columns
Webcasts Upcoming Events White Papers
SES Shanghai SES Shanghai
May 24-25, 2011
SES Toronto SES Toronto
June 13-15, 2011
SES San Francisco SES San Francisco
August 15-19, 2011
SES Hong Kong SES Hong Kong
September 20-21, 2011
SES Chicago SES Chicago
November 14-18, 2011
Incisive Media © Incisive Interactive Marketing LLC. 2011 All rights reserved.
120 Broadway, 6th Floor, New York, NY 10271
Data protection ClickZ is contacting you at the following address - getsolat.asep@blogger.com

If you prefer not to receive this email, please unsubscribe.

Need to change your newsletter subscription preferences and personal information? Update your details.

Mail filter If your ISP filters incoming email, please add the following email address to your list of approved senders: no-replies@clickz.com. This will ensure that you receive the email alerts and newsletters to which you have subscribed. View instructions on how to approve senders.
Contact us If you have any questions or comments regarding this email, please contact: newsletterhelp@clickz.com.
Privacy policy View our Privacy Policy for Incisive Media
Share on :
 
© Copyright ASEP HASAN NURDIN™ News & Shop 2011 - Some rights reserved | Powered by Blogger.com.
Template Design by Herdiansyah Hamzah | Published by Borneo Templates and Theme4all