Skip to content
Go to home page

Designed to the highest standards, our postal services.

Comprehensive postal solutions

Our mail is an advanced communication solution that allows you to communicate effectively and professionally. Designed for reliability, speed and security, our mail is a key tool for any business. It allows our clients to communicate effectively with their customers and business partners, regardless of the scale and nature of their business.

In addition, for those looking for even more personalized solutions, we offer a broad portfolio of dedicated mail. This option allows our customers to customize postal services to meet the specific needs of their business, ensuring the highest level of control and efficiency.

The Premium Plan, combines all of our premium services into one package, creating an integral whole that provides the highest level of service to our customers. Includes Premium Mail, Premium SSL Certificate in each Hosting Plan. Every element of this plan is designed to offer the highest standard of service in every aspect of the business.

An integral part of the premium plan

  • Mail compression at 40%,
  • Capacities depend on the chosen hosting plan.

Payment in the hosting plan



Designed for rapidly growing businesses, this package offers 100 GB of storage space, providing optimal performance for daily email communications.

  • 100 GB of space
  • 5,000 emails a day
  • Transfer: unlimited
  • Bandwidth: 1 Gbit/sec.
  • Individual IP address: None

600.00 PLN net


Dedicated mail

An ideal solution for growing businesses, offering 250 GB of space and advanced mail management tools to increase productivity and efficiency.

  • 250 GB of space
  • 5,000 emails a day
  • Transfer: unlimited
  • Bandwidth: 1 Gbit/sec.
  • Individual IP address: None

800.00 PLN net


Dedicated mail

Specially developed for organizations in need of expanded space, this package provides 500 GB of space and advanced features for effective communications.

  • 500 GB of space
  • 10,000 emails a day
  • Transfer: unlimited
  • Bandwidth: 1 Gbit/sec.
  • Individual IP address

PLN 1,200 net


Dedicated mail

With large companies and corporations in mind, this package offers 1,000 GB of storage space, enabling management of large volumes of correspondence.

  • 1,000 GB of space
  • 50,000 emails a day
  • Transfer: unlimited
  • Bandwidth: 1 Gbit/sec.
  • Individual IP address

2 200 PLN net


Dedicated mail

A top package designed for the largest enterprises, offering 2,000 GB of space, providing unparalleled performance and scalability for complex communications requirements.

  • 2,000 GB of space
  • 100,000 emails a day
  • Transfer: unlimited
  • Bandwidth: 1 Gbit/sec.
  • Individual IP address

PLN 3,200 net


Dedicated mail

Frequently asked questions

DKIM (DomainKeys Identified Mail) is an e-mail authentication method that uses cryptographic techniques to confirm the source of an e-mail message. It is designed to identify messages sent from authorized domains and prevent forgery involving unauthorized use of e-mail addresses, which can mislead recipients about the true source of correspondence.

How does the DKIM function?

  1. Creating a digital signature: When sending an e-mail from a domain that has DKIM activated, the sender’s mail server creates a unique digital signature for it, using the private key assigned to that domain.
  2. Incorporating the signature into the email header: The created digital signature is embedded in the email header as part of its metadata, which remains invisible to the recipient.
  3. Publish DNS record: In order to allow recipients to verify the authenticity of the signature, the domain owner places the public DKIM key in the DNS records of his domain. This key is used by recipient mail servers to verify the digital signature.
  4. Verification process at the recipient: When an e-mail arrives at the recipient’s mail server, that server extracts the DKIM signature from the header and uses the public key published in the DNS of the sender’s domain to verify the signature.
  5. Signature match check: The recipient’s mail server uses a public key to decrypt the digital signature and compare it with the signature generated from the contents of the received e-mail. If the signatures are identical, this indicates that the message content is intact and that it originated from the claimed domain.

Failure of DKIM verification or lack of DKIM activation for a domain does not necessarily automatically indicate email maliciousness, but it may be a signal for further verification. DKIM is one of many email authentication methods that often work in tandem with other systems, such as SPF (Sender Policy Framework) and DMARC (Domain-based Message Authentication, Reporting, and Conformance), to provide comprehensive protection against cyber threats.

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an advanced system that provides authentication and report generation for e-mail messages, working with existing SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) mechanisms. DMARC’s goal is to improve and control the email authentication process and enable the generation of detailed reports on attempts to use a domain for unauthorized messaging.

DMARC’s main objectives include:

  1. Domain Usage Protection: DMARC allows message writers to set policies that help prevent unauthorized use of their domains to send emails, which in turn allows them to block or divert suspicious messages to spam.
  2. Message Authentication: Through integration with SPF and DKIM, DMARC verifies that an email message is indeed from the expected source, protecting against forgery.
  3. Report generation and delivery: DMARC provides a mechanism to provide reports to domain owners on the authentication results of their messages, making it easier to monitor and resolve email security issues.

How does DMARC work?

  1. DMARC policy implementation in DNS: Domain owners wishing to take advantage of DMARC publish a special policy in their domain’s DNS records specifying actions regarding emails that do not pass SPF and DKIM verification.
  2. Verification process at the recipient: When an email arrives at the recipient’s server, the presence and policy of the DMARC policy for the sender’s domain is checked. This is followed by message authentication using SPF and DKIM.
  3. Reporting and analysis: Once the verification is complete, the recipient server generates a report containing the results of the authenticity checks according to DMARC rules and sends it to the domain owner. This allows for detailed analysis and corrective action.

DMARC is a key element in the e-mail security strategy, making a significant contribution to reducing fraudulent messages and improving the reliability of e-mail correspondence.

SPF (Sender Policy Framework) is an e-mail authentication protocol designed to confirm the authority of mail servers to send messages on behalf of a domain. Implemented through Domain Name System (DNS) records, SPF is a key component of a defense strategy against phishing, spam and other types of e-mail abuse.

How does the SPF function?

  1. Publishing an SPF record in DNS: A domain administrator defines and publishes a special SPF record in DNS that specifies which mail servers are authorized to send emails on behalf of that domain. This is a preventive measure to designate trusted sources of correspondence.
  2. Authentication check by recipient server: When the recipient’s mail server receives an e-mail, it checks whether an SPF record has been defined for the sender’s domain in DNS. It then verifies that the IP address of the server from which the message came is on the list of servers authorized by that domain’s SPF record.
  3. Decision to accept the message: Based on the result of the verification, the recipient’s server makes a decision about the future of the e-mail message. If the sender’s server is included in the SPF record as authorized, the e-mail is forwarded to the recipient. Otherwise, the e-mail may be rejected or moved to the spam folder.

SPF is one of the cornerstones of secure e-mail exchanges, reducing the possibility of impersonating senders and thus helping to reduce the number of unwanted messages. It works best when combined with other authentication methods, such as DKIM and DMARC, to create a complex email security system.

Having a dedicated IP address comes with a number of benefits that can significantly affect the efficiency and security of email communications. Here are the key advantages:

  1. Increased sender credibility: A dedicated IP address is seen as more trustworthy by email filtering systems. As a result, messages sent from a unique IP address are more likely to reach inboxes, resulting in better open rates and audience engagement.
  2. Standalone sender reputation: Using an individual IP address, the sender isolates its reputation from the actions of other users using shared IP addresses. This allows you to optimize your mailing strategy and deliver your emails more efficiently, regardless of potential negative actions by other senders.
  3. Full control over email service: A dedicated IP address offers users full control over the configuration of the email server, allowing them to customize security settings and mail features. This, in turn, contributes to the effectiveness and security of the messages sent.
  4. Minimized risk of blocking: Using your own IP address reduces the risk of a sender being wrongly classified as a spam source and avoiding blacklisting. This can avoid unwanted delays or problems with message deliverability.
  5. Detailed reporting: Owners of dedicated IP addresses have access to more detailed data on the deliverability, receipt and authentication of their emails. This enables quick response to potential problems and effective optimization of e-mail communication strategies.

Yes, our service ensures the implementation of regular backups, as is the case with other services offered. We allow our customers to access backups made up to 5 days back, guaranteeing an extra layer of security and the ability to recover data in case of loss or damage.

10 unique extensions

As part of our advanced Roundcube plus solution, we provide access to a wide range of add-ons to personalize and optimize communication processes. With these extensions, our customers can significantly improve both the security and functionality of their mailboxes, tailoring them to the unique requirements of their business. The introduction of options such as two-step verification, integration with Dropbox and Google Drive, significantly simplifies the management of attachments and enhances security. We present selected extensions that enrich the capabilities of Roundcube plus:

  • Two-Step Verification: This extension introduces an additional level of security for e-mail accounts, significantly reducing the risk of unauthorized access.
  • CalDAV Calendar: Allows you to integrate an advanced calendar with your email account, supporting effective organization and scheduling.
  • Signature PRO: Allows you to create and apply professional email signatures with an easy-to-use visual editor.
  • Email Scheduling and Cancellation: With this extension, users can schedule emails to be sent at a selected time and have the option to cancel a sent email.
  • AdSense: This extension allows integration with Google’s AdSense advertising system, which can help generate additional revenue.
  • Integration with Dropbox and Google Drive: These plug-ins offer easy attachment of files from both services to emails and saving received attachments directly to the cloud.
  • Nextcloud WebDAV: This extension facilitates file management through integration with Nextcloud, allowing attachments to be attached and saved efficiently.
  • Personalize the interface with wallpapers: Allows you to customize the appearance of the user interface by changing the background to your own photos or choosing from available wallpapers.
  • News, weather, quotes, logging: This extension provides users with up-to-date news, weather forecasts and inspirational quotes directly in the Roundcube interface, and monitors logging activity.

Our extensions are designed to provide our customers with tools that not only facilitate daily communications, but also enhance the security and operational efficiency of their business.

Let's talk, we want to get to know your needs and expectations better!