Emails from Cloud Server – Part I

Emails from Cloud Server

Introduction:

Recently we had a practical experience of migrating one public website to cloud hosting. The site was with a leading hosting service provider and migrated to a leading cloud service provider. One of the issues that we faced and sorted out is sending email from cloud. Of course for those who are involved in cloud migration of websites, this should be a known issue by now. When we host sites in the physical server, we configure mail servers for sending emails. There is default SMTP (Simple Mail Transfer Protocol) server. As they are configured with static ip address, the emails sent may not end up as SPAM mail. However when we do the same from cloud hosting, there is chance the mails end up as SPAM and rejected undelivered. This is because the ip address pool is in the blacklist.

Real Time Blacklists:

Real Time Blacklists (RTB or RBL) are collection of mail server ip addresses that are decided as SPAM mail senders by the list managers. Also, called as DNSBL – DNS Based Blacklist.  When an email is sent from a smtp server covered by the blacklist database, they are rejected un delivered. Most of the cloud hosting provider’s ip address pool is listed in these RTB/RBL/DNSBL databases. So sending mail from cloud ends up as SPAM and undelivered. While cloud is considered great for hosting, for sending mail whether cloud is great or not, the question arises. Cloud service providers like Amazon Web Service, Rackspace are aware of this issue and they too are concerned. However they are not in a position to deal with multitude of these blacklist maintainers as there is a large sum that is demanded as donation to remove block of ip addresses. There are some solutions to practically sort out this issue. One option is availing the service of third party smtp service providers.

Third Party Email/SMTP Service Providers:

Basically, availing the services of email service, can be for transactional requirement (like sending an acknowledgment mail automatically for registering in a website) or for bulk email dispatch (like sending newsletters or marketing campaign mailers). We resorted to the solution of going for a third party smtp service provider with additional cost (in addition to cloud hosting cost). There are many Email Service Providers to cater to this need; each having different pricing plans.

Just to list a few of them known to us:

  • AuthSMTP
  • JangoMail
  • SendGrid
  • CloudSMTP
  • CloudRelay
  • Postmarkapp
  • Mailgun
  • Mailchimp
  • Elasticemail

Going in for one of these ESPs solved the problem of sending emails; though this added to the cost.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from the galaxy far, far away that are affecting the ways businesses will do IT in our world in 2017. And…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services or healthcare providers have stringent compliance requirements. As a key stakeholder, your recommendation or decision impacts the degree of adoption…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your content in the cloud is dangerous. The truth is that top tier cloud storage is more secure than most organizations’…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to a more flexible and accessible solution — whether public or private. By putting the right system in place, businesses can…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago. The market persevered, weathering the “end of perimeter security” claims and adapting to become more flexible and dynamic, reaching beyond…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw in 2014 to a whopping $84 billion global market by 2019. Hybrid cloud environments offer companies the resilience and scalability…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around the goal of finding a cure for cancer. President Obama put his second-in-command, Vice President Joe Biden, in charge of…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon take me away. The concept was simple, a mother or father frustrated with their day (and their children) whisked away…

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

The Real Driver For Digital Transformation Business owners and executives today know the power of social media, mobile technology, cloud computing, and analytics. If you pay attention, however, you will notice that truly mature and successful digital businesses do not jump at every new technological tool or platform. While they do not sit and wait for months or years to create social media pages or to take advantage of new analytical services, they do approach…