Emails from Cloud Server – Part 3

Emails from Cloud Server – Part 3

Practically Speaking About Cloud Computing: Continued From part 2

Third Party ESP as a solution to the problem:

After a series of customer support discussions with the cloud service provider, we decided to go for a third party ESP for the requirement. Incidentally we found that a lot of Amazon EC2 and RackSpace Cloud Hosting customers are using third party email service for their cloud hosting. Are there any added advantages in going for third party email service providers? Yes. Is there any disadvantage in going in for them? Yes, there is. The addition of value comes by way of even better email management system and control; and in some cases API s for more customization. The developer API can be used for calling web service to send mails. More email related statistics can be obtained. Programmatically we can track the email delivery status by the transaction id generated by email sent through API. The following is one of the screen shot of statistics obtained from service.

The statistics provided include average number of emails sent per day, total jobs, recipients, delivered emails, bounced emails etc., The graph shows the bouncing percentage.

The disadvantage of third party ESP is definitely additional cost involved. And also, sharing data with another provider system should be a definite concern for some.

Implementation Details

Implementing third party email service provider is guided by the ESPs itself. It may involve updating DNS Records. This is done by creating SPF records. DKIM is another concept. SPF stands for Sender Policy Framework and DKIM Domain Keys Identified Mail. SPF is the basic email validation system. In the public DNS record, we can specify SPF record where in we create authorized servers to send emails. DKIM is identified mail with enhanced with enhanced protocol.

Pricing Plans of Third Party ESPs:

The pricing plans of third party ESPs vary. Depending on our requirement, we can choose the right one. Some ESPs are suitable for transactional emails. Some ESPs are suitable for bulk mailing. For transactional mail needs, pricing goes as $ 1 or 1.5 per thousand mails. 10 mails per cent. Usually there is a free first 1000 emails to test the service. Bulk mailing pricing can go on monthly payments with a monthly fee and charge for mails sent in thousands or millions.

Conclusion:

Worldwide cloud adoption is increasing for various compelling reasons. More and more websites/ web applications are being hosted in cloud. As the adoption increases, there are different technicalities and methods being tried and established; out of this best practices are also emerging. We saw an example scenario of email sending from cloud servers through third party email service providers in this article. We request that the readers experience in this regard can be shared here as comments.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…