The Online Trust Alliance (OTA) recently released its 2016 Annual Online Trust Audit, shedding light on how large enterprises, financial institutions, and government bodies approach email security technologies.
While the audit confirms a growing recognition of email authentication’s role in blocking phishing, the jump from merely knowing about DMARC to actually enforcing it remains modest.
The study examined close to a thousand domains across several high‑profile categories, including:
Overall, the security posture of corporate and government sites is on an upward trajectory – half of the surveyed domains earned an “Honor Roll” rating, a six‑point gain over the prior year.
Adoption of the older authentication standards, SPF and DKIM, has risen sharply. Among the 500 biggest online retailers, SPF + DKIM usage climbed from 56 % in 2013 to 85 % in 2016. Similar patterns appear in banking, consumer, and news sectors. Federal sites lag, with only 20 % employing both protocols in 2013, improving to 58 % in 2016.
DMARC, which builds on SPF and DKIM to provide policy‑driven enforcement, shows encouraging growth as well. In 2013, just 3 % of the top 500 retailers published a DMARC record; by 2016 that figure rose to 21 %. For the top 100 consumer sites, adoption jumped from 22 % to 64 % over the same period.
Despite these gains, the OTA notes a significant gap: while SPF/DKIM adoption exceeds 90 % in many sectors, DMARC adoption stays below 30 % and the proportion of domains that actually enforce a p=reject
or p=quarantine
policy hovers under 25 %.
Many organizations have deployed DMARC records but left the policy at p=none
, essentially a monitoring mode. This cautious stance stems from several challenges:
These obstacles often cause IT teams to adopt a “set‑and‑watch” approach, gathering reports while keeping enforcement disabled. Unfortunately, that strategy provides no protection against phishing.
Palisade offers a managed Email Authentication service that automates SPF, DKIM, and DMARC configuration, continuously monitors deliverability, and guides organizations toward a strict p=reject
stance without service disruption.
By leveraging Palisade’s platform, enterprises can:
p=none
to p=quarantine
and finally p=reject
based on real‑time data.Ready to move from insight to enforcement? 👉 https://www.palisade.email/tools/email-security-score
p=reject
or p=quarantine
.p=none
) and enforcement (p=reject
or p=quarantine
)? Monitoring collects data without affecting delivery, while enforcement tells receiving servers to block or isolate messages that fail authentication. 👉 https://www.palisade.email/tools/email-security-scorep=none
to p=quarantine
without losing legitimate email? Gradual policy escalation, combined with detailed reporting, lets you identify false positives before applying a reject policy. Palisade automates this step‑wise approach.For a deeper dive into email authentication strategies, explore our email authentication best practices guide.