Emails from Cloud Server – Part I

Emails from Cloud Server

Introduction:

Recently we had a practical experience of migrating one public website to cloud hosting. The site was with a leading hosting service provider and migrated to a leading cloud service provider. One of the issues that we faced and sorted out is sending email from cloud. Of course for those who are involved in cloud migration of websites, this should be a known issue by now. When we host sites in the physical server, we configure mail servers for sending emails. There is default SMTP (Simple Mail Transfer Protocol) server. As they are configured with static ip address, the emails sent may not end up as SPAM mail. However when we do the same from cloud hosting, there is chance the mails end up as SPAM and rejected undelivered. This is because the ip address pool is in the blacklist.

Real Time Blacklists:

Real Time Blacklists (RTB or RBL) are collection of mail server ip addresses that are decided as SPAM mail senders by the list managers. Also, called as DNSBL – DNS Based Blacklist.  When an email is sent from a smtp server covered by the blacklist database, they are rejected un delivered. Most of the cloud hosting provider’s ip address pool is listed in these RTB/RBL/DNSBL databases. So sending mail from cloud ends up as SPAM and undelivered. While cloud is considered great for hosting, for sending mail whether cloud is great or not, the question arises. Cloud service providers like Amazon Web Service, Rackspace are aware of this issue and they too are concerned. However they are not in a position to deal with multitude of these blacklist maintainers as there is a large sum that is demanded as donation to remove block of ip addresses. There are some solutions to practically sort out this issue. One option is availing the service of third party smtp service providers.

Third Party Email/SMTP Service Providers:

Basically, availing the services of email service, can be for transactional requirement (like sending an acknowledgment mail automatically for registering in a website) or for bulk email dispatch (like sending newsletters or marketing campaign mailers). We resorted to the solution of going for a third party smtp service provider with additional cost (in addition to cloud hosting cost). There are many Email Service Providers to cater to this need; each having different pricing plans.

Just to list a few of them known to us:

  • AuthSMTP
  • JangoMail
  • SendGrid
  • CloudSMTP
  • CloudRelay
  • Postmarkapp
  • Mailgun
  • Mailchimp
  • Elasticemail

Going in for one of these ESPs solved the problem of sending emails; though this added to the cost.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…