Powerful Email Marketing
Sending out clunky, blind emails every month? Not sending emails at all? We'll design a beautiful newsletter perfect for your clients and matching your company or organization style. With our tools you can create, send, manage, and get full reports on all email campaigns.
|
Beautiful newsletters built just for your clients
ASI's Newsletter service won't just give you the tools and throw you
to the wolves, we'll educate and empower you with a stuning email
design that will get read, not deleted. Our template design team will
hand-craft a newsletter layout, meticiously ensuring that your
newsletter will be viewed correctly in all email platforms, including:
Gmail, Yahoo Mail, Hotmail, Outlook Express, Apple Mail, Windows Mail,
Outlook 2000/2003/2007, Lotus Notes, and more!
|
|
Manage lists and subscribers
We take all the pain out of list management by handling the messy
stuff like bounces and unsubscribes automatically. Whether you've got a
small list, or need to get your hands dirty with segmenting and
personalization, we've got you covered.
|
|
Reporting and analytics
Great looking reports that let you measure the effectiveness of
every campaign you send. Go beyond opens and link clicks and measure
your campaign related sales, conversions and ROI with our Google
Analytics integration. We even show you what email clients your
subscribers are using.
|
Infrastructure and deliverability
You probably don't ever think about things like fully redundant servers, enterprise class delivery engines and in-house deliverability expertise, right? Luckily for you, our developers can't get enough of it. All you need to know is, we've got you covered.
Maintaining a good sender reputation
Today, the most important factor in the delivery of your email is your sender reputation. If ISP's don't know you or don't like what you're sending, you won't be invited back. We're constantly working to ensure you can piggyback off our great reputation and give your campaigns the best chance of reaching the inbox.
|
Human approval process
Before they can send a single campaign,
every new customer is reviewed by our team to ensure they meet our
comprehensive criteria covering permission, email content, privacy and
much more.
|
|
ISP feedback loop integration
Campaign Monitor is integrated
into the feedback loop of ISP’s like Yahoo, Hotmail and AOL. We can
detect if a subscriber marks you as spam, and remove them from your
list automatically.
|
|
Email authentication
Email authentication allows our customers
to prove they are who they say they are. Using technologies like Sender
ID and DomainKeys/DKIM you can protect your reputation and improve the
chances of getting delivered.
|
|
Smart bounce and complaint handling
We automatically detect
different types of bounces and react accordingly. Undeliverable
addresses are removed immediately, temporary fails are given additional
chances before removal based on best practice.
|
|
Best practice built in
We support confirmed opt-in for all
susbcriber lists, include a single click unsubscribe link in all
campaigns and allow your subscribers to maintain their own subscription
through preference centers.
|
|
3rd party deliverability monitoring
We use a number of third
party tools to monitor our inbox delivery to dozens of the leading
ISP’s allowing us to spot potential delivery issues and react
immediately. Our team monitors all major blacklists daily.
|
Reliable, secure server environment
To keep your data safe, secure and always available we use a state-of-the-art redundant server cluster in a fully managed, world class data center. All sensitive data is stored on servers behind a constantly maintained firewall using the same level of encryption as many banks.
|
World class data center
Our US-based data center is monitored
24x7 for all aspects of operational security and performance. It is
also equipped with state-of-the-art security such as biometrics and
sensors for intrusion detection.
|
|
Serious about data security
All sensitive data is stored on
servers behind a constantly maintained firewall. Our database servers
are secured by additional access restrictions, and more sensitive data
is encrypted.
|
|
Smart redundancy
We have redundancy at every layer of our
application to ensure a smooth recovery in the event of any type of
hardware failure. All data is also securely backed up offsite for the
unlikely event of a system-wide failure.
|
|
Strict privacy policy
Our strictly enforced privacy policy
ensures your data is never shared with third parties and is kept safe
and secure at all times. Only limited staff have access to your account
in order to provide support.
|
Posted on Mon, May 18, 2009
by Michael Thomas