Whether you’re looking to learn more about the capabilities, the data behind the tools, the installation process, or pricing, you’ll find the answers here.
We’re committed to providing you with the information you need to make the most out of this powerful tool and elevate your customer data quality within Excel.
DQ on Demand is a Data Quality as a Service (DQaaS) Data Quality Improvement Platform. DQ on Demand delivers a suite of data quality improvement utilities, designed to make the task of enterprise data management simpler.
DQ for Excel™ can be installed in minutes from the Microsoft Office store.
Billing for DQ for Excel™ is transactional, i.e. each request will consume credits, which can be spent on any of the available services. For individual pricing information see DQ Credits Pricing
The MS Excel Add-In can be installed free of charge from the Microsoft Store.
You will need to purchase additional credits through your account via the DQ Shop dqshop.dqglobal.com
All email cleaning requests, validation, formatting, and authentication are charged individually.
If the operation was not processed by DQ on Excel due to any kind of technical error then no charge will apply.
Our email authentication capability will silently confirm deliverability with the mail server and flag the email as either deliverable or undeliverable.
This goes beyond simple syntax checking for an @ symbol and a valid domain, our email authentication service detects whether the email mailbox is genuine and can receive mail, which helps to maintain your sender reputation and reduces waste
Yes, it can be used to check for both business and personal email addresses
Yes, email authentication is not geographically dependent so it works globally
It reduces the number of hard bounces which will protect your domains sender reputation.
It reduces the cost associated with email sends to undeliverable emails
It improves the trustworthiness of marketing metrics to ensure volume counts are correct.
Using the MarketBase database, which contains up to 5 million Companies and Employee Contacts you can acquire and refresh marketable email data.
You can standardise email data and correct common typo’s and data entry errors.
Each service (validate, format, and authenticate) has different performance characteristics; however, they are generally very fast, and we continually optimize their performance.
The most details service email authentication typically processes on average at the rate of 2.3 records/second, hence 82,800 emails per hour.
Within DQ for Excel you simply check your balance under the account management section. When you access this area, you will be shown your usage and balances.
No, as the email cleansing output results are flags or statuses, we recommend appending them into new columns to the right of the emails you currently have or placing them into a new workbook.
Email data cleansing is the process of reviewing and improving the quality of your email list by removing invalid, outdated, or duplicate email addresses.
It’s crucial to maintain a clean email list to improve email deliverability, engagement rates, and sender reputation.
Email data cleansing offers numerous benefits, including higher deliverability rates, reduced bounce rates, improved sender reputation, better engagement with recipients, and cost savings on email marketing campaigns.
The frequency of email data cleansing depends on your email list’s size and how quickly it accumulates invalid or outdated addresses.
It’s generally recommended to cleanse your list at least once every three to six months as B2B records decay at a rate of 2% per month, hence over 25% every year.
Yes, email data cleansing helps you comply with anti-spam regulations by ensuring that your email list does not contain addresses of individuals who have opted out or are on “Do Not Email” lists.
A hard email bounce is a permanent delivery failure that occurs when an email is sent to an address that doesn’t exist or isn’t accepting incoming mail. It can also happen if the email service provider (ESP) flags your emails as spam or potential fraud.
On the other hand, a soft email bounce is a less severe type of bounce that usually indicates a temporary issue, such as the recipient’s inbox is too full to accept incoming mail.
To avoid hard email bounces, you can take the following steps:
Remember, soft bounces are usually temporary issues that can be resolved, while hard bounces indicate permanent failures. It’s important to keep your email list up to date and ensure accurate recipient information to minimize bounce rates
A soft email bounce refers to an email that gets as far as your recipient’s mail server but bounces back undelivered before it gets into the inbox. It is a temporary deliverability issue, unlike a hard bounce, which is a permanent deliverability problem
Soft bounces are usually caused by temporary issues such as a full mailbox, incorrect configuration, inactive mailbox, or a down/offline recipient email server.
To avoid hard email bounces, you can take the following steps:
Hard bounces indicate permanent failures. It’s important to keep your email list up to date and ensure accurate recipient information to minimize bounce rates
A valid email address typically follows a specific format and meets certain criteria. Here are the key elements of a valid email address:
Examples of valid email addresses:
A catch-all email account, also known as a catch-all mailbox or wildcard email address, is an email address set up in a mail server to receive all email messages sent to a domain that does not match any specific, predefined email address.
In other words, it “catches” all emails sent to any address at a particular domain, regardless of whether that address actually exists.
A role-based email account, sometimes referred to as a role email address or function-based email address, is an email address that is associated with a specific role, department, or function within an organization rather than an individual person.
Role-based email addresses are useful for ensuring that emails related to a particular function or department are directed to the appropriate personnel or systems.
Here are some common examples of role-based email accounts:
firstname.lastname@example.org: This email address is typically used for general inquiries and information requests. It ensures that messages from customers or the public are directed to the right department or individuals within the organization.
email@example.com: A support email address is used for customer support and assistance. It’s a common contact point for customers to seek help and assistance with products or services.
firstname.lastname@example.org: The sales email address is dedicated to sales-related inquiries, quotes, and information requests. It helps streamline communication with potential customers.
email@example.com: Marketing email addresses are often used for marketing and promotional purposes. They receive emails related to marketing campaigns, promotions, and advertising.
firstname.lastname@example.org: The human resources (HR) email address is used for job applications, employee inquiries, and internal HR matters.
email@example.com: This email address is typically used for website-related issues, including technical problems, error reports, and feedback from website users.
firstname.lastname@example.org: An admin email address may be used for administrative purposes within an organization. It’s often used for internal communication and managing administrative tasks.
email@example.com: Billing email addresses handle invoices, payment inquiries, and financial transactions. They are crucial for financial departments.
firstname.lastname@example.org: This email address is used for reporting security-related issues, such as vulnerabilities or incidents. It is often associated with an organization’s cybersecurity team.
Role-based email accounts help streamline communication and ensure that messages related to specific functions or departments are managed appropriately.
They are particularly common in larger organizations where multiple individuals or teams handle different aspects of operations.
No, all of the authentication processing is performed away from your servers, so absolutely no risk of blacklisting your IPs and domains.
Business data naturally degrades by approximately 2% per month. The effectiveness of your email campaigns depends on the accuracy and recency of your email list. It is highly advisable to verify and authenticate email addresses before sending mass outbound emails for several reasons:
If you have any questions, please contact us at email@example.com and we will get back to you as soon as possible.