Whatsapp

Sendmarc

Saicom protects your business at its most targeted entry point: email. With Sendmarc’s DMARC authentication, your domain becomes a trusted sender, shutting down impersonation and stopping attackers from misusing your brand.

Some of our benefits:

"*" indicates required fields

3 Steps To Customising Your Cloud Computing Solution

Step 1

Request a consultation with one of our market-leading Solutions Architects

Step 2

Get a quote within 48 hours of the initial meeting

Step 3

Prevent, and neutralise even the most convincing phishing, BEC, and ransomware threats.

Trust email again

The 2022 State of the Phish report (from Proofpoint) says 86% of organisations experienced bulk phishing attacks, and 77% faced BEC (Business Email Compromise) attacks, or targeted phishing attacks.

Impersonation

Attackers can send email from your domain, defrauding staff, customers and suppliers.

Delivery

Legitimate email frequently arrives as spam, and false positives cause service disruption.

Visibility

It is nearly impossible to identify who is sending (spoofing) emails from your domain.

Interception

Emails can be intercepted and changed without the recipient knowing.

How Do Spoofing And Phishing Attacks Happen?

Email spoofing involves sending emails using false sender addresses. Attackers often use email address spoofing in socially engineered phishing attacks hoping to deceive their victims into believing an email is legitimate by pretending that it came from a trusted source.

If the attacker is able to trick their victims into clicking on a malicious link within the email, they can steal their login credentials, financial information, or corporate data. Phishing attacks involving email spoofing may also infect victims’ computers with malware or, in cases like Business Email Compromise (BEC) scams, try to trick the victims into initiating a transfer of funds. Variants of phishing such as spear phishing or whaling may be carefully tailored to specific individuals within the company and tend to have a higher success rate.

Featured

Why choose Sendmarc

Stop the illegitimate use of your valid email domain

Inventorise all of the senders of your domain

Detect and stop spoofing and spammers

Increase email deliverability of legitimate domains

Provide insights and reporting of all outbound email activity

Sendmarc

Sendmarc works across a number of everyday platforms (Mimecast, 0365 and GSuite)

EVERYDAY EMAIL

EMAIL MARKETING AND TRANSACTIONAL MAIL

CLOUD SOFTWARE

FAQ

Frequently Asked Questions

DMARC stands for Domain-based Message Authentication, Reporting and Conformance and is an email authentication protocol. DMARC gives email domain owners the ability to protect their domain from unauthorised use. DMARC empowers an organisation to assert the authenticity of their legitimate email, leaving the illegitimate email easily identifiable as spam, thereby improving email security.

Anti-spam tools may prevent spam emails from getting into inboxes, but it cannot stop someone from impersonating your domain and sending malicious emails as if they are from your business. DMARC tools can be used alongside anti-spam tools.

Domain impersonation is also known as phishing. It is when an unauthorised party gets access to your domain, and can send and receive email as if it is from your organisation. By impersonating your domain, they can get access to sensitive data and possibly solicit funds by sending fraudulent invoices, which contain their banking details.

Whether you’re an SME or a large multinational company, the risks of being victim to a phishing attack have never been higher, as criminals – and technology – become more sophisticated.

Phishing attacks can result in severe financial consequences.

While the financial consequences are enough cause for concern, there can also be long term impact to your business:

Brand damage. A phishing attack on your domain can result in severe reputational damage to your brand – even though you had nothing to do with the attack. If your company domain is used to send fraudulent phishing emails, victims may associate your domain with the fraud in question. Especially if you’re in a competitive industry, undoing this association can be challenging. Brand is delivering viruses, malware and ransomware to your domain.

Ramifications for executives. If you’re an executive in a company who falls victim to such an attack, you may have to go to court, face the media or even lose your job as the person who was responsible for the damage that resulted.

Less room for plausible deniability. When phishing first became a threat several years ago, company executives could claim that there was nothing they could have done to prevent such attacks, as they didn’t know the risks. Now that DMARC is fast becoming accepted as a global best practice, where you can see the phishing attacks happening in real time from your email addresses – as an executive you’re compelled to do something about it.

Risks to customers. Protecting your domain is not just about your own company security – it’s about protecting your customers’ data too. Should your domain come under threat, there’s a very real chance that your customers could be affected too, which in turn could cause serious damage to your brand. As a corporate citizen, securing your domain is therefore the responsible thing to do.

No – DMARC adoption is for any responsible business, whether it is a small business, an SME or large corporate/ enterprise.

DMARC allows an organisation to publish a policy that defines its email authentication practices and provides instructions to receiving mail servers for how to enforce them. Publishing is as simple and straightforward as a few DNS entries:

Sender Policy Framework (SPF)
DomainKeys Identified Mail (DKIM)
Domain-based Message Authentication,
Reporting and Conformance (DMARC)

The DMARC email validation system works as follows:

The domain administrator publishes a policy defining its email authentication practices and how receiving mail servers should handle mail that violates the policy. When the inbound mail server gets an incoming email, it uses DNS to look up the DMARC policy Depending on whether the incoming mail meets the provisions of the DMARC policy or not, the email will either be delivered, or disposed of. The receiving mail server will report the outcome of the sending domain owner.

As the requirements for each organisation are unique, please complete our enquiry form and one of our expert consultants will contact you about the best DMARC service provider in South Africa.

Currently our DMARC service is only available to our South African customers.

While platforms like Microsoft and Google provide a good foundational layer of security, they are largely designed to stop known, widespread threats. Our managed service acts as a specialised, expert security team that complements these built-in tools. We focus on the sophisticated, evolving threats that slip past standard filters such as targeted spear-phishing, business email compromise (BEC), and socially engineered attacks. We provide 24/7 monitoring, real-time threat hunting, and immediate human led response to neutralise threats, a critical capability most native solutions lack.

The moment an employee reports a suspicious email using the simple "Report Phish" button in their inbox, our integrated system springs into action. The reported email is automatically analysed by our AI-powered platform and your very own admin. If confirmed as malicious, the threat is not only quarantined for that user but is also automatically hunted and removed from the inboxes of all other employees across your organisation, stopping the attack in its tracks within minutes.

Traditional Secure Email Gateways are old school and only effective as a first line of defence, but they operate at the perimeter. Today, a significant number of advanced attacks are designed to bypass these gateways entirely. Our service provides a crucial layer of defence. We specialise in post delivery protection, meaning we find and stop the threats that have already made it past your SEG. This multi layered approach combining your gateway with our managed detection and response significantly closes your security gaps and reduces the risk of a successful breach. In most cases we see our customers eventually removing these legacy SEG’s with our modernised based AI service.

We believe your employees are your last line of defence, and we empower them to be a powerful part of your security strategy. Beyond just training, our platform turns every employee into an active sensor. The seamless reporting button facilitates real world practice in identifying threats. Furthermore, when we detect a simulated phishing campaign or a real threat, we can deliver immediate, contextualised training directly to the user's browser at the "teachable moment." This reinforces learning and measurably improves your organisation's human firewall over time.

We're passionate about driving growth with tailored, cost-effective solutions. Contact us now to propel your business forward.

Optimized by Optimole

"*" indicates required fields