Identity Assurance Protocol

The definitive security standard for business email. Stop impersonation and ensure your emails land in the inbox.

  • Forensic Domain Audit: Full analysis of current vulnerabilities.
  • Protocol Implementation: Configuration of SPF, DKIM, and DMARC records.
  • Google Postmaster Verification: Direct registration with major providers.
  • Spoofing Prevention: Hardening the domain against impersonation.

Price: £349.00 (One-time Implementation)

Why This Matters Now:


In 2024, Google and Yahoo introduced strict new requirements for anyone sending business email. If your domain is not authenticated, your emails are increasingly likely to be blocked or sent to spam.

Worse, without these protections, cybercriminals can legally “spoof” your domain; sending fake invoices or phishing emails that appear to come directly from you.

The Identity Assurance Protocol is our forensic implementation service designed to close these loopholes permanently.

What We Implement


We don’t just “turn on” settings. We engineer your domain’s reputation.

  1. SPF Configuration (The Guest List) We audit your sending sources and create a strict Sender Policy Framework. This tells the world exactly which servers are authorised to send email as your company. If it’s not on the list, it gets blocked.
  2. DKIM Cryptography (The Digital Seal) We generate and install DomainKeys Identified Mail signatures. This acts like a digital wax seal on every email you send, proving that the message has not been tampered with in transit.
  3. DMARC Enforcement (The Bodyguard) This is the most critical layer. We configure Domain-based Message Authentication, Reporting, and Conformance. This tells receiving servers (like Gmail or Outlook) exactly what to do if they detect a fake email pretending to be you.
  4. Google Postmaster Verification We register your domain directly with Google’s Postmaster Tools, giving you a verified reputation status with the world’s largest email provider.

The Process: Zero Downtime

We understand that email is the lifeline of your business. Our implementation process is designed to be completely non-disruptive.

  1. Forensic Audit: We scan your current DNS status to identify conflicts.
  2. Staging Mode: We implement protocols in “Monitoring Mode” first to ensure no legitimate mail is lost.
  3. Hardening: Once verified, we switch your protocols to “Quarantine” or “Reject,” locking out imposters for good.

Enquire for team quote