There are various kinds of email providers. There are paid and free ones, possibly sustained by advertising. Some allow anonymous users, whereby a single user can get multiple, apparently unrelated accounts. Some require full identification credentials; for example, a company may provide email accounts to full-time staff only. Often, companies, universities, organizations, groups, and individuals that manage their mail servers themselves adopt naming conventions that make it straightforward to identify who is the owner of a given email address. Besides control of the local names,
insourcing may provide for data confidentiality, network traffic optimization, and fun. Mailbox providers typically accomplish their task by implementing
Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through
Internet Message Access Protocol (IMAP), the
Post Office Protocol,
Webmail, or a proprietary protocol. Parts of the task can still be outsourced, for example virus and spam filtering of incoming mail, or authentication of outgoing mail.
ISP-based email Many mailbox providers are also access providers. Not the core product, their email services could lack some interesting features, such as IMAP,
Transport Layer Security, or
SMTP Authentication —in fact, an ISP can do without the latter, as it can recognize its clients by the IP addresses it assigns them.
Free mail providers Launched in the 1990s,
AOL Mail,
Hotmail,
Lycos,
Mail.com and
Yahoo! Mail were among the early providers of free email accounts, joined by
Gmail in 2004. They attract users because they are free and can advertise their service on every message. According to American entrepreneur
Steve Jurvetson, Hotmail grew from zero to 12 million users in 18 months. In 1997, Microsoft purchased Hotmail for $400 million and relaunched it as MSN Hotmail the same year. This was relaunched as
Outlook.com in 2012.
Premium email services Paid equivalent of free mail providers. Much less popular than free mail, they target a niche of users.
Vanity email It is also possible to run a shim service, providing no access but just forwarding all messages to another account, which does not lend itself to direct use, for example because it is temporary or just less appealing. == Role as identifier ==