Gmail expands BIMI indicators to include a verified icon

Gmail was one of the first mailbox providers to support BIMI in 2021. Now, two years later, they are building upon that foundation and have announced that they’ve added a verified checkmark and an informative tooltip for senders who have BIMI deployed with a VMC. 

This verification will allow users to easily distinguish between a certified BIMI logo, and a fake Google Account profile icon, which can be easily abused by an attacker.

Screenshot of Google’s new checkmark and tooltip

“Strong email authentication helps users and email security systems identify and stop spam, and also enables senders to leverage their brand trust. This increases confidence in email sources and gives readers an immersive experience, creating a better email ecosystem for everyone.”

Google

Get VMC verified and reap the benefits – or risk falling behind

With Google’s full support and enhanced visual clues for VMC-authenticated senders, Apple pioneering “digitally verified” messaging last fall, and Yahoo’s existing verification icons, these developments present an even stronger incentive for businesses to implement DMARC at enforcement and BIMI with a VMC. 

Red Sift’s award-winning DMARC solution, OnDMARC, is the only product on the market to offer an integrated, one-stop BIMI certification journey. Via Entrust, Red Sift has issued more VMCs than any other DMARC provider. 

Through our partnership with Entrust, we’re creating more value by enabling organizations to manage their logo and obtain VMCs from Entrust directly through OnDMARC. As a result, it’s easier than ever for brands to ensure a safe, immersive experience for recipients of their outbound emails.

Find out more about BIMI on our free BIMI resource page or get in touch today to book your free consultation with the team, and get started on your journey to better email with BIMI.

PUBLISHED BY

Faisal Misle

3 May. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more
ASM

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more