7-things-youll-wish-you-knew-before-implementing-BIMI

7 things you need to know before implementing BIMI

BIMI (Brand Indicators for Message Identification) is a new email standard that allows businesses to attach registered logos to DMARC authenticated emails. It’s an exciting development in the email world, and there’s much anticipation about how it’s already impacting the future of email marketing.

We at Red Sift (in partnership with Entrust) offer the only end-to-end BIMI and DMARC certification solution, and so we’ve already helped a number of organizations get BIMI certified with VMC, and start showing their registered logo in email.

In this blog, we’ll walk you through the 7 things you need to know before implementing BIMI.

1. Make sure you’ve correctly implemented DMARC

This is crucial to the success of your BIMI implementation, as, without correct DMARC compliance, you won’t be able to become BIMI certified. But what is DMARC you ask? DMARC stands for Domain-Based Message Authentication, Reporting, and Conformance. It’s a protocol introduced in 2012 which protects businesses against exact domain impersonation. In short, when configured correctly (at p=reject), it stops hackers and bad actors from impersonating your domain to phish your customers, suppliers, and employees, protecting your brand and anyone who has contact with it. DMARC implementation can seem like a complicated process, but with the right tools and support, it’s made easy. You can find out more about our multi-award-winning DMARC solution here.

2. Check that your trademarked logo doesn’t include extra text

Some businesses will trademark their logo and include the company name within this (either above or below the icon and not as part of the design itself). This means that the logo can’t be used without this additional text, and this can cause problems when implementing BIMI. To be able to use your logo effectively with BIMI, make sure that you have a trademarked version of your logo which excludes any additional text (i.e. company name above or below it).

3. Ensure your logo is the right size, and any text will be readable when scaled down

This might sound like a simple one, but making sure that your logo is sized correctly so that it can be scaled properly in the inbox is crucial. If you successfully deploy BIMI but no one can see your logo, or it’s too big for the box, then your hard work will be for nothing. Luckily, our Customer Success team is clued up on exactly which logo sizes, shapes, and requirements are needed to help Red Sift customers avoid this.

4. Budget for the time needed to implement BIMI

Another aspect easily overlooked is time, and it’s key that you budget enough while factoring in all the moving parts of the BIMI process. With OnDMARC, it takes an average of 5-8 weeks to get to DMARC p=reject and around 1 – 3 months for notary verification. While we offer a fully integrated BIMI solution that covers all bases and steps along the way, it’s key that you set enough time and resources aside to get BIMI up and running.

5. Make your logo stand out from the crowd

Studies have shown that color increases brand recognition by as much as 80%. This is huge when you consider how many emails are dropping into the consumer inbox every day. Early research we’ve carried out has indicated a positive correlation between bold logo color and design and brand recall, while monochrome designs may have the opposite effect. So, it’s vital that you consider the look of your logo as soon as possible, to ensure it stands out from the crowd and you’re getting the brand visibility you want. We recommend bold, block colors, easy-to-read text, and clear symbols and shapes.

6. Get the correct sending domain and make sure it’s in p=reject

When it comes down to the more technical points, this is a key one. BIMI is not a security protocol itself, instead, it works using DMARC which authenticates the sending source of the email the logo sits on. So, it’s vital that the root domain you’re sending from is in p=reject (i.e. fully DMARC compliant), as having a subdomain in p=reject isn’t enough. You’ll also need to work with your marketing department to ensure you know which domain you’ll be sending from day one, to avoid any confusion!

7. Choose an approved Certification Authority

Currently, there are just two Certification Authorities approved by Google to issue VMCs, one of which is our partner Entrust. Choosing an approved and certified VMC provider is another essential component of your successful BIMI journey. You can find out more about what a VMC is here.

Where to go from here?

At first glance, the idea of adding a logo to an email seems like a simple concept. But, there’s a surprising amount of technical effort and expertise which goes into the BIMI implementation process.

At Red Sift, we’re proud to be the first and only provider of an end-to-end BIMI certification solution. Using our award-winning product OnDMARC, we support businesses big and small to achieve full DMARC compliance and BIMI deployment from start to finish and beyond. Get started below by checking your BIMI readiness score today!

PUBLISHED BY

Sabrina Evans

24 Jun. 2021

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more
Email

“What’s Next for DMARC”: Red Sift & Inbox Monster Webinar Recap

Red Sift

The recent webinar hosted by Inbox Monster, “What’s Next for DMARC: Data & Predictions for a New Era in Email Authentication,” featured insights from Red Sift and examined the significant changes brought by Yahoo and Google’s bulk sender requirements earlier this year.  It also offered a forward-looking perspective on the future of email authentication.…

Read more
Security

Navigating the Information Security Landscape: ISO 27001 vs. SOC 2

Red Sift

As cyber threats evolve, so do the standards and frameworks designed to combat them. Two of the most recognized standards in information security are ISO 27001 and SOC 2. What sets them apart, and which one is right for your organization? Let’s delve into the key differences. Purpose and Scope: Global Framework vs. Client-Centric…

Read more
News

G2 Summer 2024 Report: Red Sift OnDMARC’s Winning Streak Continues

Francesca Rünger-Field

We’re delighted to announce that Red Sift OnDMARC has again been named a Leader in G2’s DMARC category for Summer 2024. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift appeared in 11 reports – 5 new ones since Spring 2024! – earning 5 badges: A few…

Read more
News

Google will no longer trust Entrust certificates from October 2024

Red Sift

Tl;dr: Google has announced that as of October 31, 2024, Chrome will no longer trust certificates signed by Entrust root certificates. While there is no immediate impact on existing certificates or those issued before 31st October 2024, organizations should start reviewing their estate now. On Thursday 27th June 2024, Google announced that it had…

Read more