7-things-youll-wish-you-knew-before-implementing-BIMI

7 things you need to know before implementing BIMI

Last updated: October 2024

BIMI (Brand Indicators for Message Identification) is a new email standard that allows businesses to attach registered logos to DMARC authenticated emails. It’s an exciting development in the email world, and there’s much anticipation about how it’s already impacting the future of email marketing.

We at Red Sift (in partnership with Entrust) offer the only end-to-end BIMI and DMARC certification solution, helping hundreds of organizations to get BIMI certified with Verified Mark Certificate (VMC,) and start showing their registered logo in email.

In this blog, we’ll walk you through the 7 things you need to know before implementing BIMI.

1. Make sure you’ve correctly implemented DMARC

This is crucial to the success of your BIMI implementation, as, without correct DMARC compliance, you won’t be able to become BIMI certified. But what is DMARC you ask? DMARC stands for Domain-Based Message Authentication, Reporting, and Conformance. It’s a protocol introduced in 2012 which protects businesses against exact domain impersonation. In short, when configured correctly (at p=reject), it stops hackers and bad actors from impersonating your domain to phish your customers, suppliers, and employees, protecting your brand and anyone who has contact with it. DMARC implementation can seem like a complicated process, but with the right tools and support, it’s made easy. You can find out more about our multi-award-winning DMARC solution here.

2. Check that your trademarked logo doesn’t include extra text

Some businesses will trademark their logo and include the company name within this (either above or below the icon and not as part of the design itself) or have text as part of their logo as standard. This means that the logo can’t be used without this additional text, and this can cause problems when implementing BIMI. To be able to use your logo effectively with BIMI, make sure that you have a version of your logo which excludes any additional text (i.e. company name above or below it) as the BIMI logo must match the trademark exactly. However, in October 2024 Google announced support for the CMC (Common Mark Certificate), which no longer requires a trademark, but does require a history of prior use in a website for at least a year.

3. Ensure your logo is the right size, and any text will be readable when scaled down

This might sound like a simple one, but making sure that your logo is sized correctly so that it can be scaled properly in the inbox is crucial. If you successfully deploy BIMI but no one can see your logo, or it’s too big for the box, then your hard work will be for nothing. Luckily, our Customer Success team is clued up on exactly which logo sizes, shapes, and requirements are needed to help Red Sift customers avoid this.

4. Budget for the time needed to implement BIMI

Another aspect easily overlooked is time, and it’s key that you budget enough while factoring in all the moving parts of the BIMI process. With OnDMARC, it takes an average of 5-8 weeks to get to DMARC p=reject and around 7-10 days to complete all the steps from the CA to get a VMC or CMC. While we offer a fully integrated BIMI solution that covers all bases and steps along the way, it’s key that you set enough time and resources aside to get BIMI up and running.

5. Make your logo stand out from the crowd

Studies have shown that color increases brand recognition by as much as 80%. This is huge when you consider how many emails are dropping into the consumer inbox every day. Early research we’ve carried out has indicated a positive correlation between bold logo color and design and brand recall, while monochrome designs may have the opposite effect. So, it’s vital that you consider the look of your logo as soon as possible, to ensure it stands out from the crowd and you’re getting the brand visibility you want. We recommend bold, block colors, easy-to-read text, and clear symbols and shapes.

6. Get the correct sending domain and make sure it’s in p=reject

When it comes down to the more technical points, this is a key one. BIMI is not a security protocol itself, instead, it works using DMARC which authenticates the sending source of the email the logo sits on. So, it’s vital that the root domain you’re sending from is in p=reject (i.e. fully DMARC compliant), as having a subdomain in p=reject isn’t enough. You’ll also need to work with your marketing department to ensure you know which domain you’ll be sending from day one, to avoid any confusion!

7. Choose an approved Certification Authority 

Currently, there are just two Certification Authorities approved by Google to issue VMC and CMCs, one of which is our partner Entrust. Choosing an approved and certified VMC provider is another essential component of your successful BIMI journey. You can find out more about what a VMC is here.

Where to go from here?

At first glance, the idea of adding a logo to an email seems like a simple concept. But, there’s a surprising amount of technical effort and expertise which goes into the BIMI implementation process.

At Red Sift, we’re proud to be the first and only provider of an end-to-end BIMI certification solution. Using our award-winning product OnDMARC, we support businesses big and small to achieve full DMARC compliance and BIMI deployment from start to finish and beyond. Get started below by checking your BIMI readiness score today! 

PUBLISHED BY

Sabrina Evans

24 Jun. 2021

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Winter wins: Red Sift OnDMARC wraps up 2024 as a G2 DMARC…

Francesca Rünger-Field

The season of giving has brought us another reason to celebrate! Red Sift OnDMARC continues its winning streak in G2’s Winter 2025 report, earning Leader status in the DMARC category for another consecutive season. This recognition reflects our strong market presence and the unwavering satisfaction of our customers. Cheers to wrapping up 2024 on…

Read more
AI

Text classification in the age of LLMs

Phong Nguyen

As natural language processing (NLP) advances, text classification remains a foundational task with applications in spam detection, sentiment analysis, topic categorization, and more. Traditionally, this task depended on rule-based systems and classical machine learning algorithms. However, the emergence of deep learning, transformer architectures, and Large Language Models (LLMs) has transformed text classification, allowing for…

Read more
Security

How to drive cybersecurity as a top business priority

Jack Lilley

Everyone has a role to play in protecting the enterprise. Whether you’re shaping strategy or implementing solutions, aligning efforts to mitigate critical risks ensures a stronger, more resilient enterprise. If you missed Red Sift’s recent webinar on “From Data to Buy-In: Driving Cybersecurity as a Top Business Priority” we’ve got you covered. The session…

Read more
DMARC

BreakSPF: How to mitigate the attack

Red Sift

BreakSPF is a newly identified attack framework that exploits misconfigurations in the Sender Policy Framework (SPF) a widely used email authentication protocol. A common misconfiguration involves overly permissive IP ranges, where SPF records allow large blocks of IP addresses to send emails on behalf of a domain. These ranges often include shared infrastructures like…

Read more