Switzerland · Fintech / Payments · Case Study

Swiss Fintech: Sub-30-Second Transactional Email Delivery for Payment Notifications

Switzerland Fintech / Payments Q3 2025 Cloud Server for Email Infrastructure
← Back to Case Studies
<28s
Average Delivery Time
99.99%
Infrastructure Uptime
2.4M
Monthly Transactional Messages
GDPR
EU Data Residency Compliant

Payment confirmations as real-time product functionality

A Zurich-based payment infrastructure company processing B2B payments across 18 European markets sent 2.4 million transactional emails per month: payment confirmations, failure notifications, 2FA codes for high-value transaction authentication, and compliance notifications required under PSD2.

The SLA requirement was strict: 2FA codes must reach the recipient within 60 seconds of the authentication request, or the transaction session expires and the user must restart the flow. Payment confirmation emails had a softer but still commercially important SLA: under 2 minutes from transaction completion to delivery.

On their existing commercial transactional email service, average delivery time was 2.4 minutes. 2FA codes were timing out at a rate of 3.8% — meaning one in twenty-six high-value authentication attempts failed to complete due to email delivery delay.

Priority queues with circuit breakers

The dedicated transactional infrastructure was designed around three priority tiers with different queue characteristics:

# Tier 1: 2FA and authentication codes # Target delivery: under 30 seconds # Queue characteristics: minimal buffering, immediate retry smtp-listener 0.0.0.0:2525 { default-virtual-mta-pool auth-critical queue-policy { max-queue-time 120s # Abandon if not delivered in 2 min max-retry-time 120s } } # Tier 2: Payment confirmations # Target delivery: under 90 seconds smtp-listener 0.0.0.0:2526 { default-virtual-mta-pool payment-confirm queue-policy { max-queue-time 300s } } # Tier 3: Compliance and batch notifications # Target: under 10 minutes smtp-listener 0.0.0.0:2527 { default-virtual-mta-pool compliance-batch }

Delivery Time Distribution

Percentage of messages by delivery window
<30s30-60s1-2min2-5min>5min ■ Before ■ After

EU data residency and GDPR requirements

The Swiss and EU financial services regulatory context required that all message content — including transactional email content containing personal financial data — be processed and transmitted within the EU/EEA. The dedicated infrastructure was deployed in a Frankfurt datacenter with ISO 27001 certification, satisfying data processing location requirements under GDPR and Swiss Federal Act on Data Protection (revFADP).

2FA Delivery < 30s

94% within SLA

Payment Confirm < 90s

97% within SLA

Post-migration: 2FA timeout rate dropped from 3.8% to 0.2%. Average delivery time for authentication codes: 22 seconds. Payment confirmations: 38 seconds average. Zero infrastructure downtime in the first 8 months of operation. The previous provider had experienced two incidents totalling 4 hours of degraded delivery in the same period.

Payment Infrastructure Context For payment processing companies, email delivery time is not a UX consideration — it is a conversion metric. Every 2FA timeout is an abandoned high-value transaction. At 3.8% timeout rate on a platform processing significant daily transaction volume, the revenue impact of email delivery failure was quantifiable. Infrastructure investment was evaluated against that baseline, not against abstract SLA targets.

Technical Assessment: Infrastructure Layers Examined

The infrastructure assessment for this engagement covered four layers: authentication configuration (SPF, DKIM, DMARC alignment), IP reputation status (Postmaster Tools, SNDS, blacklist check), PowerMTA configuration review (domain blocks, throttle settings, bounce handling), and operational practices (list hygiene frequency, bounce processing latency, FBL enrollment and processing status).

Authentication issues were the highest-priority finding. The DKIM key was 1024-bit (below current ISP recommendations of 2048-bit minimum), and DMARC was at p=none with no aggregate reports being collected or reviewed. The combination of outdated authentication and no visibility into sending path failures created an environment where reputation signals were degrading without detection.

Infrastructure Rebuild: Configuration Decisions

IP Pool Architecture

The IP pool was rebuilt with traffic type separation as the primary design principle. Transactional traffic (time-sensitive notifications, account events) was assigned a dedicated pool that was never shared with campaign traffic. This separation ensured that campaign performance issues — elevated deferral rates during high-volume sends — could not create queue delays affecting transactional delivery.

PoolTraffic TypeIPsmax-smtp-outProtection Level
trans-poolTransactional notifications210 per IPHighest — never paused or degraded
campaign-poolMarketing campaigns3-48 per IPStandard — subject to reputation management
warming-poolNew IP warmingAs needed2-3 per IPConservative — warming schedule only

PowerMTA Domain Block Configuration

ISP-specific domain blocks were configured for each major destination: Gmail (max-smtp-out: 8, retry-after: 15m), Outlook (max-smtp-out: 5, retry-after: 20m), Yahoo (max-smtp-out: 6, retry-after: 15m), and ISP-specific configurations for European providers including GMX, Web.de, T-Online, and OVH. Each block included mx-rollup directives to prevent connection count multiplication across MX host variants.

The smtp-pattern-list configuration was extended with custom patterns for ISP-specific diagnostic messages that were not being correctly classified by the default PowerMTA pattern library. These custom patterns ensured that permanent failures (invalid addresses, domain-level blocks) were bounced immediately rather than retried, and that greylisting responses from European ISPs were handled with appropriate retry intervals.

Authentication Upgrade

DKIM keys were rotated to 2048-bit RSA on all sending domains. The rotation followed the zero-downtime procedure: publish new public key under new selector, wait 48 hours for DNS propagation, update PowerMTA signing configuration, verify new selector appearing in Authentication-Results headers, then retire old selector after 7 days. DMARC was progressed from p=none through p=quarantine to p=reject over a 12-week period.

Gmail Inbox Placement
Before
62%
After
93%

Seed test improvement
Deferral Rate
Before
14%
After
2.8%

All major ISPs
Hard Bounce Rate
Before
3.2%
After
0.7%

Gmail
DMARC Alignment
Before
88%
After
99.6%

All domains

Operational Monitoring: What Changed Permanently

The infrastructure changes produced immediate delivery improvement, but the operational changes — the monitoring discipline and response protocols — are what sustain that improvement over time. Daily Postmaster Tools review and SNDS checks are now part of the infrastructure team's operational routine. FBL reports are processed in real time and feed directly into the suppression system.

The monthly configuration review cycle catches ISP behavior changes before they accumulate into delivery incidents. When Gmail adjusted its bulk sender requirements in 2024, the infrastructure was already operating at the authentication standard required — because the review cycle had identified and addressed the relevant requirements months before the enforcement deadline.

The technical changes in this engagement were straightforward. The more significant work was establishing the monitoring discipline that prevents the gradual drift that caused the original problems — an infrastructure that meets today's ISP requirements but has no ongoing review process will fall behind those requirements within 12-18 months.

— Cloud Server for Email Infrastructure Team

Similar infrastructure challenges?

Contact the technical team to discuss your specific situation. We assess each environment individually before recommending an architecture.