If I am a Maropost Customer, I rely on email engagement data to help drive my decisions around email strategy, and if a non-human interaction with an email is being counted along side true human interactions it skews the true picture of how the audience is engaging and could falsely drive decisions.
At the moment I understand we do not filter out or separate engagement stats that are likely to be a non-human, which could be:
-Firewalls and Web Filters
-ISPs themselves
-Various other automated Bot type entities
One that has come to light recently is Barracuda Networks, and is covered in the support ticket maropost.zendesk.com/agent/tickets/34695, and account 2241.
Here is a campaign report link:
https://cloud1.maropost.com/accounts/2241/campaigns/2942/open_report
It's pretty clear from this situation that opens and clicks are being driven by a non-human Barracuda Networks security mechanism when the email first arrives, but they present up as real engagement stats tied to the contact.
I'm hoping this ticket can at least start the conversation around how we can investigate the most common non-human entities that may be performing these security checks, determine if they have a user-agent or some other signature that would allow us to identify those engagements, and either filter them out completely from the stats OR perhaps separate them into its own unique report.