CINXE.COM

Official Google Cloud Blog: Google Email Security and Archiving

<!DOCTYPE html> <html class='v2 list-page' dir='ltr' itemscope='' itemtype='http://schema.org/Blog' lang='en' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='http://www.google.com/2005/gml/expr'> <head> <link href='https://www.blogger.com/static/v1/widgets/3566091532-css_bundle_v2.css' rel='stylesheet' type='text/css'/> <title> Official Google Cloud Blog: Google Email Security and Archiving </title> <meta content='width=device-width, height=device-height, minimum-scale=1.0, initial-scale=1.0, user-scalable=0' name='viewport'/> <meta content='IE=Edge' http-equiv='X-UA-Compatible'/> <meta content='Official Google Cloud Blog' property='og:title'/> <meta content='en_US' property='og:locale'/> <meta content='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving' property='og:url'/> <meta content='Official Google Cloud Blog' property='og:site_name'/> <!-- Twitter Card properties --> <meta content='Official Google Cloud Blog' property='og:title'/> <meta content='summary' name='twitter:card'/> <meta content='@gsuite' name='twitter:creator'/> <link href='https://fonts.googleapis.com/css?family=Roboto:400italic,400,500,500italic,700,700italic' rel='stylesheet' type='text/css'/> <link href='https://fonts.googleapis.com/icon?family=Material+Icons' rel='stylesheet'/> <script src='https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.min.js' type='text/javascript'></script> <!-- End --> <style id='page-skin-1' type='text/css'><!-- /* <Group description="Header Color" selector="header"> <Variable name="header.background.color" description="Header Background" type="color" default="#ffffff"/> </Group> */ .header-outer { border-bottom: 1px solid #e0e0e0; background: #ffffff; } html, .Label h2, #sidebar .rss a, .BlogArchive h2, .FollowByEmail h2.title, .widget .post h2 { font-family: Roboto, sans-serif; } .plusfollowers h2.title, .post h2.title, .widget h2.title { font-family: Roboto, sans-serif; } .widget-item-control { height: 100%; } .widget.Header, #header { position: relative; height: 100%; width: 100%; } } .widget.Header .header-logo1 { float: left; margin-right: 15px; padding-right: 15px; border-right: 1px solid #ddd; } .header-title h2 { color: rgba(0,0,0,.54); display: inline-block; font-size: 40px; font-family: Roboto, sans-serif; font-weight: normal; line-height: 56px; vertical-align: top; margin-left:5px; } .header-inner { background-repeat: no-repeat; background-position: right 0px; } .post-author, .byline-author { font-size: 14px; font-weight: normal; color: #757575; color: rgba(0,0,0,.54); } .post-content .img-border { border: 1px solid rgb(235, 235, 235); padding: 4px; } .header-title a { text-decoration: none !important; } pre { border: 1px solid #bbbbbb; margin-top: 1em 0 0 0; padding: 0.99em; overflow-x: auto; overflow-y: auto; } pre, code { font-size: 9pt; background-color: #fafafa; line-height: 125%; font-family: monospace; } pre, code { color: #060; font: 13px/1.54 "courier new",courier,monospace; } .header-left .header-logo1 { width: 128px !important; } .header-desc { line-height: 20px; margin-top: 8px; } .fb-custom img, .twitter-custom img, .gplus-share img { cursor: pointer; opacity: 0.54; } .fb-custom img:hover, .twitter-custom img:hover, .gplus-share img:hover { opacity: 0.87; } .fb-like { width: 80px; } .post .share { float: right; } #twitter-share{ border: #CCC solid 1px; border-radius: 3px; background-image: -webkit-linear-gradient(top,#ffffff,#dedede); } .twitter-follow { background: url(//4.bp.blogspot.com/-8O7VcmcY32o/VSYkC2vUj7I/AAAAAAAAHeU/7mzo-JFgTgk/s1600/twitter-bird.png) no-repeat left center; padding-left: 18px; font: normal normal normal 11px/18px 'Helvetica Neue',Arial,sans-serif; font-weight: bold; text-shadow: 0 1px 0 rgba(255,255,255,.5); cursor: pointer; margin-bottom: 10px; } .twitter-fb { padding-top: 2px; } .fb-follow-button { background: -webkit-linear-gradient(#4c69ba, #3b55a0); background: -moz-linear-gradient(#4c69ba, #3b55a0); background: linear-gradient(#4c69ba, #3b55a0); border-radius: 2px; height: 18px; padding: 4px 0 0 3px; width: 57px; border: #4c69ba solid 1px; } .fb-follow-button a { text-decoration: none !important; text-shadow: 0 -1px 0 #354c8c; text-align: center; white-space: nowrap; font-size: 11px; color: white; vertical-align: top; } .fb-follow-button a:visited { color: white; } .fb-follow { padding: 0px 5px 3px 0px; width: 14px; vertical-align: bottom; } .gplus-wrapper { margin-top: 3px; display: inline-block; vertical-align: top; } .twitter-custom, .gplus-share { margin-right: 12px; } .fb-follow-button{ margin: 10px auto; } /** CUSTOM CODE **/ --></style> <style id='template-skin-1' type='text/css'><!-- .header-outer { clear: both; } .header-inner { margin: auto; padding: 0px; } .footer-outer { background: #f5f5f5; clear: both; margin: 0; } .footer-inner { margin: auto; padding: 0px; } .footer-inner-2 { /* Account for right hand column elasticity. */ max-width: calc(100% - 248px); } .google-footer-outer { clear: both; } .cols-wrapper, .google-footer-outer, .footer-inner, .header-inner { max-width: 978px; margin-left: auto; margin-right: auto; } .cols-wrapper { margin: auto; clear: both; margin-top: 60px; margin-bottom: 60px; overflow: hidden; } .col-main-wrapper { float: left; width: 100%; } .col-main { margin-right: 278px; max-width: 660px; } .col-right { float: right; width: 248px; margin-left: -278px; } /* Tweaks for layout mode. */ body#layout .google-footer-outer { display: none; } body#layout .header-outer, body#layout .footer-outer { background: none; } body#layout .header-inner { height: initial; } body#layout .cols-wrapper { margin-top: initial; margin-bottom: initial; } --></style> <!-- start all head --> <meta content='text/html; charset=UTF-8' http-equiv='Content-Type'/> <meta content='blogger' name='generator'/> <link href='https://cloud.googleblog.com/favicon.ico' rel='icon' type='image/x-icon'/> <link href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving' rel='canonical'/> <link rel="alternate" type="application/atom+xml" title="Official Google Cloud Blog - Atom" href="https://cloud.googleblog.com/feeds/posts/default" /> <link rel="alternate" type="application/rss+xml" title="Official Google Cloud Blog - RSS" href="https://cloud.googleblog.com/feeds/posts/default?alt=rss" /> <link rel="service.post" type="application/atom+xml" title="Official Google Cloud Blog - Atom" href="https://www.blogger.com/feeds/6567687196385815607/posts/default" /> <!--Can't find substitution for tag [blog.ieCssRetrofitLinks]--> <meta content='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving' property='og:url'/> <meta content='Official Google Cloud Blog' property='og:title'/> <meta content='Built in the cloud. Engineered for your enterprise.' property='og:description'/> <!-- end all head --> <base target='_self'/> <style> html { font-family: Roboto, sans-serif; -moz-osx-font-smoothing: grayscale; -webkit-font-smoothing: antialiased; } body { padding: 0; /* This ensures that the scroll bar is always present, which is needed */ /* because content render happens after page load; otherwise the header */ /* would "bounce" in-between states. */ min-height: 150%; } h2 { font-size: 16px; } h1, h2, h3, h4, h5 { line-height: 2em; } html, h4, h5, h6 { font-size: 14px; } a, a:visited { color: #4184F3; text-decoration: none; } a:focus, a:hover, a:active { text-decoration: none; } .Header { margin-top: 15px; } .Header h1 { font-size: 32px; font-weight: 300; line-height: 32px; height: 42px; } .header-inner .Header .titlewrapper { padding: 0; margin-top: 30px; } .header-inner .Header .descriptionwrapper { padding: 0; margin: 0; } .cols-wrapper { margin-top: 56px; } .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 60px; } .header-inner { height: 256px; position: relative; } html, .header-inner a { color: #212121; color: rgba(0,0,0,.87); } .header-inner .google-logo { display: inline-block; background-size: contain; z-index: 1; height: 50px; overflow: hidden; margin-top: 4px; } .header-left { position: absolute; top: 50%; -webkit-transform: translateY(-50%); transform: translateY(-50%); margin-top: 12px; width: 100%; } .google-logo { margin-left: -4px; } #google-footer { position: relative; font-size: 13px; list-style: none; text-align: right; } #google-footer a { color: #444; } #google-footer ul { margin: 0; padding: 0; height: 144px; line-height: 144px; } #google-footer ul li { display: inline; } #google-footer ul li:before { color: #999; content: "\00b7"; font-weight: bold; margin: 5px; } #google-footer ul li:first-child:before { content: ''; } #google-footer .google-logo-dark { left: 0; margin-top: -16px; position: absolute; top: 50%; } /** Sitemap links. **/ .footer-inner-2 { font-size: 14px; padding-top: 42px; padding-bottom: 74px; } .footer-inner-2 .HTML h2 { color: #212121; color: rgba(0,0,0,.87); font-size: 14px; font-weight: 500; padding-left: 0; margin: 10px 0; } .footer-inner-2 .HTML ul { font-weight: normal; list-style: none; padding-left: 0; } .footer-inner-2 .HTML li { line-height: 24px; padding: 0; } .footer-inner-2 li a { color: rgba(65,132,243,.87); } /** Archive widget. **/ .BlogArchive { font-size: 13px; font-weight: normal; } .BlogArchive .widget-content { display: none; } .BlogArchive h2, .Label h2 { color: #4184F3; text-decoration: none; } .BlogArchive .hierarchy li { display: inline-block; } /* Specificity needed here to override widget CSS defaults. */ .BlogArchive #ArchiveList ul li, .BlogArchive #ArchiveList ul ul li { margin: 0; padding-left: 0; text-indent: 0; } .BlogArchive .intervalToggle { cursor: pointer; } .BlogArchive .expanded .intervalToggle .new-toggle { -ms-transform: rotate(180deg); transform: rotate(180deg); } .BlogArchive .new-toggle { float: right; padding-top: 3px; opacity: 0.87; } #ArchiveList { text-transform: uppercase; } #ArchiveList .expanded > ul:last-child { margin-bottom: 16px; } #ArchiveList .archivedate { width: 100%; } /* Months */ .BlogArchive .items { max-width: 150px; margin-left: -4px; } .BlogArchive .expanded .items { margin-bottom: 10px; overflow: hidden; } .BlogArchive .items > ul { float: left; height: 32px; } .BlogArchive .items a { padding: 0 4px; } .Label { font-size: 13px; font-weight: normal; } .sidebar-icon { display: inline-block; width: 24px; height: 24px; vertical-align: middle; margin-right: 12px; margin-top: -1px } .Label a { margin-right: 4px; } .Label .widget-content { display: none; } .FollowByEmail { font-size: 13px; font-weight: normal; } .FollowByEmail h2 { background: url("data:image/png;base64,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"); background-repeat: no-repeat; background-position: 0 50%; text-indent: 30px; } .FollowByEmail .widget-content { display: none; } .searchBox input { border: 1px solid #eee; color: #212121; color: rgba(0,0,0,.87); font-size: 14px; padding: 8px 8px 8px 40px; width: 164px; font-family: Roboto, sans-serif; background: url("https://www.gstatic.com/images/icons/material/system/1x/search_grey600_24dp.png") 8px center no-repeat; } .searchBox ::-webkit-input-placeholder { /* WebKit, Blink, Edge */ color: rgba(0,0,0,.54); } .searchBox :-moz-placeholder { /* Mozilla Firefox 4 to 18 */ color: #000; opacity: 0.54; } .searchBox ::-moz-placeholder { /* Mozilla Firefox 19+ */ color: #000; opacity: 0.54; } .searchBox :-ms-input-placeholder { /* Internet Explorer 10-11 */ color: #757575; } .widget-item-control { margin-top: 0px; } .section { margin: 0; padding: 0; } #sidebar-top { border: 1px solid #eee; } #sidebar-top > div { margin: 16px 0; } .widget ul { line-height: 1.6; } /*main post*/ .post { margin-bottom:30px; } #main .post .title { margin: 0; } #main .post .title a { color: #212121; color: rgba(0,0,0,.87); font-weight: normal; font-size: 24px; } #main .post .title a:hover { text-decoration:none; color:#4184F3; } .message, #main .post .post-header { margin: 0; padding: 0; } #main .post .post-header .caption, #main .post .post-header .labels-caption, #main .post .post-footer .caption, #main .post .post-footer .labels-caption { color: #444; font-weight: 500; } #main .tr-caption-container td { text-align: left; } #main .post .tr-caption { color: #757575; color: rgba(0,0,0,.54); display: block; max-width: 560px; padding-bottom: 20px; } #main .post .tr-caption-container { line-height: 24px; margin: -1px 0 0 0 !important; padding: 4px 0; text-align: left; } #main .post .post-header .published{ font-size:11px; font-weight:bold; } .post-header .publishdate { font-size: 17px; font-weight:normal; color: #757575; color: rgba(0,0,0,.54); } #main .post .post-footer{ font-size:12px; padding-bottom: 21px; } .label-footer { margin-bottom: 12px; margin-top: 12px; } .comment-img { margin-right: 16px; opacity: 0.54; vertical-align: middle; } #main .post .post-header .published { margin-bottom: 40px; margin-top: -2px; } .post .post-content { color: #212121; color: rgba(0,0,0,.87); font-size: 17px; margin: 25px 0 36px 0; line-height: 32px; } .post-body .post-content ul, .post-body .post-content ol { margin: 16px 0; padding: 0 48px; } .post-summary { display: none; } /* Another old-style caption. */ .post-content div i, .post-content div + i { font-size: 14px; font-style: normal; color: #757575; color: rgba(0,0,0,.54); display: block; line-height: 24px; margin-bottom: 16px; text-align: left; } /* Another old-style caption (with link) */ .post-content a > i { color: #4184F3 !important; } /* Old-style captions for images. */ .post-content .separator + div:not(.separator) { margin-top: -16px; } /* Capture section headers. */ .post-content br + br + b, .post-content .space + .space + b, .post-content .separator + b { display: inline-block; margin-bottom: 8px; margin-top: 24px; } .post-content li { line-height: 32px; } /* Override all post images/videos to left align. */ .post-content .separator, .post-content > div { text-align: left; } .post-content .separator > a, .post-content .separator > span { margin-left: 0 !important; } .post-content img { max-width: 100%; height: auto; width: auto; } .post-content .tr-caption-container img { margin-bottom: 12px; } .post-content iframe, .post-content embed { max-width: 100%; } .post-content .carousel-container { margin-bottom: 48px; } #main .post-content b { font-weight: 500; } /* These are the main paragraph spacing tweaks. */ #main .post-content br { content: ' '; display: block; padding: 4px; } .post-content .space { display: block; height: 8px; } .post-content iframe + .space, .post-content iframe + br { padding: 0 !important; } #main .post .jump-link { margin-bottom:10px; } .post-content img, .post-content iframe { margin: 30px 0 20px 0; } .post-content > img:first-child, .post-content > iframe:first-child { margin-top: 0; } .col-right .section { padding: 0 16px; } #aside { background:#fff; border:1px solid #eee; border-top: 0; } #aside .widget { margin:0; } #aside .widget h2, #ArchiveList .toggle + a.post-count-link { color: #212121; color: rgba(0,0,0,.87); font-weight: 400 !important; margin: 0; } #ArchiveList .toggle { float: right; } #ArchiveList .toggle .material-icons { padding-top: 4px; } #sidebar .tab { cursor: pointer; } #sidebar .tab .arrow { display: inline-block; float: right; } #sidebar .tab .icon { display: inline-block; vertical-align: top; height: 24px; width: 24px; margin-right: 13px; margin-left: -1px; margin-top: 1px; color: #757575; color: rgba(0,0,0,.54); } #sidebar .widget-content > :first-child { padding-top: 8px; } #sidebar .active .tab .arrow { -ms-transform: rotate(180deg); transform: rotate(180deg); } #sidebar .arrow { color: #757575; color: rgba(0,0,0,.54); } #sidebar .widget h2 { font-size: 14px; line-height: 24px; display: inline-block; } #sidebar .widget .BlogArchive { padding-bottom: 8px; } #sidebar .widget { border-bottom: 1px solid #eee; box-shadow: 0px 1px 0 white; margin-bottom: 0; padding: 14px 0; min-height: 20px; } #sidebar .widget:last-child { border-bottom: none; box-shadow: none; margin-bottom: 0; } #sidebar ul { margin: 0; padding: 0; } #sidebar ul li { list-style:none; padding:0; } #sidebar ul li a { line-height: 32px; } #sidebar .archive { background-image: url("data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAYCAYAAADzoH0MAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAE1JREFUeNpiNDY23s9AAWBioBCwYBM8c+YMVsUmJibEGYBNMS5DaeMFfDYSZQA2v9I3FrB5AZeriI4FmnrBccCT8mhmGs1MwyAzAQQYAKEWG9zm9QFEAAAAAElFTkSuQmCC"); height: 24px; line-height: 24px; padding-left: 30px; } #sidebar .labels { background-image: url("data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABEAAAARCAYAAAA7bUf6AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAUxJREFUeNpiNDY23s9AAMycOfM7UF05kHkZmzwTMkdSUhKrIcXFxZy3bt3qBjIN8RrS09PDsHnzZjCNDr58+cKQlpbGDjSoHcg1w2oIyAUODg5gARCNzUVIBrUCuVYYhjx//pzhwIEDYAEQDeJjA1CDWIAGNQK59jBxRuSABbkAlwHIgIeHh2HWrFn/1NTU2oDcvSgBS4wBSC5iArqoCsj1YGIgEyAZVMoEchqlBjEB/cZAiUHg2AEGznpKDAImxOeM////B4VLKtBvEUCngZ1ILKivr3/u6+ubBzJAGZQ9gC5aQoqLgAY8BhkAZL4BuQQkxgXE34A4BuiiZEIuAhrwEGhAEZD5DpzYoIaA2UAM4kQADUrHZRDUgAIg8wO2XAwzbQXQa5OweQ1owB10AyA6gS7BgX1u3ry5397eHow3bdo0EyjGi00tQIABANPgyAH1q1eaAAAAAElFTkSuQmCC"); height: 20px; line-height: 20px; padding-left: 30px; } #sidebar .rss a { background-image: url("data:image/png;base64,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"); } #sidebar .subscription a { background-image: url("data:image/png;base64,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"); } #sidebar-bottom { background: #f5f5f5; border-top:1px solid #eee; } #sidebar-bottom .widget { border-bottom: 1px solid #e0e0e0; padding: 15px 0; text-align: center; } #sidebar-bottom > div:last-child { border-bottom: 0; } #sidebar-bottom .text { line-height: 20px; } /* Home, forward, and backward pagination. */ .blog-pager { border-top : 1px #e0e0e0 solid; padding-top: 10px; margin-top: 15px; text-align: right !important; } #blog-pager { margin-botom: 0; margin-top: -14px; padding: 16px 0 0 0; } #blog-pager a { display: inline-block; } .blog-pager i.disabled { opacity: 0.2 !important; } .blog-pager i { color: black; margin-left: 16px; opacity: 0.54; } .blog-pager i:hover, .blog-pager i:active { opacity: 0.87; } #blog-pager-older-link, #blog-pager-newer-link { float: none; } .gplus-profile { background-color: #fafafa; border: 1px solid #eee; overflow: hidden; width: 212px; } .gplus-profile-inner { margin-left: -1px; margin-top: -1px; } /* Sidebar follow buttons. */ .followgooglewrapper { padding: 12px 0 0 0; } .loading { visibility: hidden; } .detail-page .post-footer .cmt_iframe_holder { padding-top: 40px !important; } /** Desktop **/ @media (max-width: 900px) { .col-right { display: none; } .col-main { margin-right: 0; min-width: initial; } .footer-outer { display: none; } .cols-wrapper { min-width: initial; } .google-footer-outer { background-color: #f5f5f5; } } /** Tablet **/ @media (max-width: 712px) { .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 40px; } } /* An extra breakpoint accommodating for long blog titles. */ @media (max-width: 600px) { .header-left { height: 100%; top: inherit; margin-top: 0; -webkit-transform: initial; transform: initial; } .header-title { margin-top: 18px; } .header-inner .google-logo { height: 40px; margin-top: 3px; } .header-inner .google-logo img { height: 35px; } .header-title h2 { font-size: 32px; line-height: 36px; } .header-desc { bottom: 24px; position: absolute; } } /** Mobile/small desktop window; also landscape. **/ @media (max-width: 480px), (max-height: 480px) { .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 16px; } .cols-wrapper { margin-top: 0; } .post-header .publishdate, .post .post-content { font-size: 16px; } .post .post-content { line-height: 28px; margin-bottom: 30px; } .post { margin-top: 30px; } .byline-author { display: block; font-size: 12px; line-height: 24px; margin-top: 6px; } #main .post .title a { font-weight: 500; color: #4c4c4c; color: rgba(0,0,0,.70); } #main .post .post-header { padding-bottom: 12px; } #main .post .post-header .published { margin-bottom: -8px; margin-top: 3px; } .post .read-more { display: block; margin-top: 14px; } .post .tr-caption { font-size: 12px; } #main .post .title a { font-size: 20px; line-height: 30px; } .post-content iframe { /* iframe won't keep aspect ratio when scaled down. */ max-height: 240px; } .post-content .separator img, .post-content .tr-caption-container img, .post-content iframe { margin-left: -16px; max-width: inherit; width: calc(100% + 32px); } .post-content table, .post-content td { width: 100%; } #blog-pager { margin: 0; padding: 16px 0; } /** List page tweaks. **/ .list-page .post-original { display: none; } .list-page .post-summary { display: block; } .list-page .comment-container { display: none; } .list-page #blog-pager { padding-top: 0; border: 0; margin-top: -8px; } .list-page .label-footer { display: none; } .list-page #main .post .post-footer { border-bottom: 1px solid #eee; margin: -16px 0 0 0; padding: 0 0 20px 0; } .list-page .post .share { display: none; } /** Detail page tweaks. **/ .detail-page .post-footer .cmt_iframe_holder { padding-top: 32px !important; } .detail-page .label-footer { margin-bottom: 0; } .detail-page #main .post .post-footer { padding-bottom: 0; } .detail-page #comments { display: none; } } [data-about-pullquote], [data-is-preview], [data-about-syndication] { display: none; } </style> <noscript> <style> .loading { visibility: visible }</style> </noscript> <script type='text/javascript'> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-18038-3', 'auto', 'blogger'); ga('blogger.send', 'pageview'); </script> <link href='https://www.blogger.com/dyn-css/authorization.css?targetBlogID=6567687196385815607&amp;zx=20237959-a5c2-4097-b3c7-3e707e9693b9' media='none' onload='if(media!=&#39;all&#39;)media=&#39;all&#39;' rel='stylesheet'/><noscript><link href='https://www.blogger.com/dyn-css/authorization.css?targetBlogID=6567687196385815607&amp;zx=20237959-a5c2-4097-b3c7-3e707e9693b9' rel='stylesheet'/></noscript> <meta name='google-adsense-platform-account' content='ca-host-pub-1556223355139109'/> <meta name='google-adsense-platform-domain' content='blogspot.com'/> </head> <body> <script type='text/javascript'> //<![CDATA[ var axel = Math.random() + ""; var a = axel * 10000000000000; document.write('<iframe src="https://2542116.fls.doubleclick.net/activityi;src=2542116;type=gblog;cat=googl0;ord=ord=' + a + '?" width="1" height="1" frameborder="0" style="display:none"></iframe>'); //]]> </script> <noscript> <img alt='' height='1' src='https://ad.doubleclick.net/ddm/activity/src=2542116;type=gblog;cat=googl0;ord=1?' width='1'/> </noscript> <!-- Header --> <div class='header-outer'> <div class='header-inner'> <div class='section' id='header'><div class='widget Header' data-version='1' id='Header1'> <div class='header-left'> <div class='header-title'> <a class='google-logo' href='https://cloud.googleblog.com/?hl=en'> <img height="50" src="//3.bp.blogspot.com/-a3v4BOp6LoU/V-y9lFzsb_I/AAAAAAAATGY/aD_EUNu9X4MHVu3ScQH38S2yvyNAVON9ACK4B/s1600/logo_lockup_cloud_color.png"> </a> <a href='/.'> <h2> Official Blog </h2> </a> </div> <div class='header-desc'> Built in the cloud. Engineered for your enterprise. </div> </div> </div></div> </div> </div> <!-- all content wrapper start --> <div class='cols-wrapper loading'> <div class='col-main-wrapper'> <div class='col-main'> <div class='section' id='main'><div class='widget Blog' data-version='1' id='Blog1'> <div class='post' data-id='2547617456411660432' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2011/06/adding-another-tool-in-fight-against.html?hl=en' itemprop='url' title='Adding another tool in the fight against spam: enhanced email authentication for Postini customers'> Adding another tool in the fight against spam: enhanced email authentication for Postini customers </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, June 15, 2011 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span class="byline-author">Posted by Matt O&#8217;Connor, Product Manager, Google Postini Services Team</span><br /><br />We&#8217;re constantly working to protect our users from email spam and phishing attempts. Some examples of these efforts include educating users about <a href="//www.youtube.com/watch?v=3vcLyvoKYZc">phishing</a> and supporting open standards for email authentication such as <a href="http://googleenterprise.blogspot.com/2011/01/spam-takes-another-hit-email.html#utm_campaign=Postini_features&utm_source=en-na-us-entblog-RPF_061411&utm_medium=blog">DomainKeys Identified Mail</a> (DKIM) in Google Apps - which can help reduce the risk of phishing attacks sent from spoofed domains. <br /><br />And now our <a href="//www.google.com/postini#utm_campaign=Postini_features&amp;utm_source=en-na-us-entblog-RPF_061411&amp;utm_medium=blog">Postini services</a> customers can take advantage of new capabilities to help protect users on legacy email servers such as Microsoft(R) Exchange. <a href="http://postini.com/webdocs/admin_ee_cu/secur_rpf.html">Recipient Policy Framework</a> (RPF) is a new feature we developed for Postini that allows customers to authenticate inbound email to help ensure that each message is actually coming from who it says it&#8217;s from. <br /><br />RPF uses an open Internet standard called <a href="http://en.wikipedia.org/wiki/Sender_Policy_Framework">Sender Policy Framework</a> to authenticate inbound emails and allows customers to define policies on how to handle emails that don&#8217;t check out. When RPF is enabled by an administrator, it will help detect and block email spam and other suspicious messages. <br /><br />To learn more about Postini services including our email security, compliance and continuity products, please <a href="//www.google.com/postini#utm_campaign=Postini_features&amp;utm_source=en-na-us-entblog-RPF_061411&amp;utm_medium=blog">visit our web site</a> where you can compare pricing and <a href="//www.google.com/postini/compare.html#utm_campaign=Postini_features&amp;utm_source=en-na-us-entblog-RPF_061411&amp;utm_medium=blog">sign up online</a>. </script> <noscript> <span class="byline-author">Posted by Matt O&#8217;Connor, Product Manager, Google Postini Services Team</span><br /><br />We&#8217;re constantly working to protect our users from email spam and phishing attempts. Some examples of these efforts include educating users about <a href="//www.youtube.com/watch?v=3vcLyvoKYZc">phishing</a> and supporting open standards for email authentication such as <a href="http://googleenterprise.blogspot.com/2011/01/spam-takes-another-hit-email.html#utm_campaign=Postini_features&utm_source=en-na-us-entblog-RPF_061411&utm_medium=blog">DomainKeys Identified Mail</a> (DKIM) in Google Apps - which can help reduce the risk of phishing attacks sent from spoofed domains. <br /><br />And now our <a href="//www.google.com/postini#utm_campaign=Postini_features&amp;utm_source=en-na-us-entblog-RPF_061411&amp;utm_medium=blog">Postini services</a> customers can take advantage of new capabilities to help protect users on legacy email servers such as Microsoft(R) Exchange. <a href="http://postini.com/webdocs/admin_ee_cu/secur_rpf.html">Recipient Policy Framework</a> (RPF) is a new feature we developed for Postini that allows customers to authenticate inbound email to help ensure that each message is actually coming from who it says it&#8217;s from. <br /><br />RPF uses an open Internet standard called <a href="http://en.wikipedia.org/wiki/Sender_Policy_Framework">Sender Policy Framework</a> to authenticate inbound emails and allows customers to define policies on how to handle emails that don&#8217;t check out. When RPF is enabled by an administrator, it will help detect and block email spam and other suspicious messages. <br /><br />To learn more about Postini services including our email security, compliance and continuity products, please <a href="//www.google.com/postini#utm_campaign=Postini_features&amp;utm_source=en-na-us-entblog-RPF_061411&amp;utm_medium=blog">visit our web site</a> where you can compare pricing and <a href="//www.google.com/postini/compare.html#utm_campaign=Postini_features&amp;utm_source=en-na-us-entblog-RPF_061411&amp;utm_medium=blog">sign up online</a>. </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2011/06/adding-another-tool-in-fight-against.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Adding another tool in the fight against spam: enhanced email authentication for Postini customers&url=https://cloud.googleblog.com/2011/06/adding-another-tool-in-fight-against.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2011/06/adding-another-tool-in-fight-against.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2011/06/adding-another-tool-in-fight-against.html?hl=en' data-url='https://cloud.googleblog.com/2011/06/adding-another-tool-in-fight-against.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2011/06/adding-another-tool-in-fight-against.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/google%20message%20security?hl=en' rel='tag'> google message security </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> </span> </div> </div> </div> <div class='post' data-id='4980045810133756632' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html?hl=en' itemprop='url' title='Join us! Live Google Postini webinar featuring Enterprise Holdings on 9/28'> Join us! Live Google Postini webinar featuring Enterprise Holdings on 9/28 </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, September 22, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Enterprise Holdings is the largest rental car company in North America and operates Alamo Rent A Car, Enterprise Rent-A-Car and National Car Rental. They manage over 1.1 million cars, 68,000 employees and 7,600 locations around the world. When Enterprise Holdings wanted to add more security to their corporate e-mail, they chose <a href="//www.google.com/postini/email.html#utm_campaign=en&amp;utm_source=en-na-us-entblog-postiniwebinar_09222010&amp;utm_medium=blog">Google Postini Services</a>. <br /><br />Join us for a <a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">free webinar</a> on September 28, where Michael Preuss, Manager of Windows Engineering for Enterprise Holdings, will discuss why his company chose a cloud-based message security solution and how Postini&#8217;s powerful spam filtering technology was able to help them address their email security challenges. Adam Swidler, Senior Manager with Google Enterprise, will also provide an overview of Google&#8217;s security solutions and facilitate a deep-dive discussion into best-in-class practices for organizations interested in enterprise-grade protection. <br /><br />A live Q & A session will follow. We hope you can join us! <br /><br /><a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">Message Security in the Cloud</a><br />Tuesday, September 28th, 2010<br />10 a.m. PDT / 1 p.m. EDT / 6 p.m. GMT<br /><a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">Register here</a><br /><br />Posted by Adrian Soghoian, Google Postini Services team </script> <noscript> Enterprise Holdings is the largest rental car company in North America and operates Alamo Rent A Car, Enterprise Rent-A-Car and National Car Rental. They manage over 1.1 million cars, 68,000 employees and 7,600 locations around the world. When Enterprise Holdings wanted to add more security to their corporate e-mail, they chose <a href="//www.google.com/postini/email.html#utm_campaign=en&amp;utm_source=en-na-us-entblog-postiniwebinar_09222010&amp;utm_medium=blog">Google Postini Services</a>. <br /><br />Join us for a <a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">free webinar</a> on September 28, where Michael Preuss, Manager of Windows Engineering for Enterprise Holdings, will discuss why his company chose a cloud-based message security solution and how Postini&#8217;s powerful spam filtering technology was able to help them address their email security challenges. Adam Swidler, Senior Manager with Google Enterprise, will also provide an overview of Google&#8217;s security solutions and facilitate a deep-dive discussion into best-in-class practices for organizations interested in enterprise-grade protection. <br /><br />A live Q & A session will follow. We hope you can join us! <br /><br /><a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">Message Security in the Cloud</a><br />Tuesday, September 28th, 2010<br />10 a.m. PDT / 1 p.m. EDT / 6 p.m. GMT<br /><a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">Register here</a><br /><br />Posted by Adrian Soghoian, Google Postini Services team </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Join us! Live Google Postini webinar featuring Enterprise Holdings on 9/28&url=https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html?hl=en' data-url='https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/google%20message%20security?hl=en' rel='tag'> google message security </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends?hl=en' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='4912415549510437561' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html?hl=en' itemprop='url' title='Q1&#39;10 spam &amp; virus trends from Postini'> Q1&#39;10 spam &amp; virus trends from Postini </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, April 14, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div style="text-align: left;"><span class="Apple-style-span" style="font-style: italic;"><b>Editor's note: </b>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email connections per day in the course of providing email security to more than 50,000 businesses and 18 million business users.</span></div><div><br /></div><div>In 2009, the security community started seeing diminishing returns from the takedown of malicious ISPs. After the ISP 3FN was taken down, spam levels rebounded in less than a month, and after Real Host went down, spam volumes recovered after only two days. In response, the anti-spam community turned its attention toward taking botnets offline instead.</div><div><br /></div><div>Toward the end of 2009, Mega-D, a top-10 botnet &#8211; responsible for infecting more than 250,000 computers worldwide &#8211; was severely crippled through a carefully orchestrated campaign designed to isolate the command-and-control servers spammers were using to support the botnet. In early 2010, security professionals, along with government agencies, successfully mounted a campaign against several more targets: major botnets such as Waledac, Mariposa, and Zeus were either <a href="http://news.bbc.co.uk/2/hi/technology/8570993.stm">shut down</a> or had their operations significantly curtailed.</div><div><br /></div><div>However, this recent spate of botnet takedowns has not had a dramatic impact on spam levels. Although spam and virus levels did fall below Q4&#8217;09 highs, reports from Google&#8217;s global analytics show that spam levels held relatively steady over the course of Q1&#8217;10. </div><div><br /></div><div>This suggests that there&#8217;s no shortage of botnets out there for spammers to use. If one botnet goes offline, spammers simply buy, rent, or deploy another, making it difficult for the anti-spam community to make significant inroads in the fight against spam with individual botnet takedowns.</div><div><br /></div><div><b>Spam by the numbers<br /></b>Overall, spam volume fell 12% from Q4&#8217;09 to Q1&#8217;10, which follows a trend of quarterly decreases in overall spam levels that started after the surge in Q2&#8217;09. This may be attributed to some of the recent takedowns, but spam volume was still 6% higher this quarter than it was <a href="ttp://googleenterprise.blogspot.com/2009/03/spam-data-and-trends-q1-2009.html">during the same period in 2009</a>, and spam volume as a percentage of total email messages is holding steady.<br /><br /></div><div><span class="Apple-style-span" style=""><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780352837545906" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S8UJTcKJ77I/AAAAAAAAAWs/EFCfINPvGX0/s400/WA30-1004_Q1-Spam-Trends_Spam-User_v3.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 289px;"></span></div><div style="text-align: left;"><br />Recently, our data centers showed a 30% increase in the size of individual spam messages (measured in bytes) that occurred toward the end of March, as shown below.<br /><br /></div><div style="text-align: left;"><span class="Apple-style-span" style=""><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780346882095602" src="//4.bp.blogspot.com/_jSdgG4-DeNE/S8UJTF-Q-fI/AAAAAAAAAWk/Rem9Rva4q2E/s400/WA30-1004_Q1-Spam-Trends_Spam-Bytes_v3.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 273px;"></span></div><div style="text-align: left;"><br />This spike points to a resurgence of image spam, similar to <a href="http://googleenterprise.blogspot.com/2009/07/q2-2009-spam-trends.html">what we reported in Q2&#8217;09</a>. This is likely due to the fact that reusing image templates makes it easier and faster for spammers to start new campaigns.</div><div style="text-align: left;"><div style="text-align: left;"><br /></div><div style="text-align: left;">As always, spammers tend to make use of predictable topics &#8211; cheap pharmaceuticals, celebrity gossip, breaking news &#8211; to encourage user clicks. In January, spammers hastened to exploit the Haiti earthquake crisis, sending pleas for donations that appeared to have been sent by reputable charitable organizations, politicians, and celebrities.</div><div style="text-align: left;"><br /></div><div style="text-align: left;">The frequency and variety of post-earthquake spam illustrates an unpleasant reality: spammers will exploit any means &#8211; even tragedies &#8211; to accomplish their objectives.<br /><br /></div><div style="text-align: left;"><span class="Apple-style-span" style="color: rgb(0, 0, 238);"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780341419184418" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S8UJSxnzkSI/AAAAAAAAAWc/bXuiE1xbRA0/s400/WA30-1004_Q1-Spam-Trends_Payload_v2.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 273px;"></span></div><div><div><b><br />Virus levels fall after Q4&#8217;09 surge<br /></b>During 2009, spam with attached viruses increased tenfold, with levels rising from 0.3% of total spam in the first half of the year to 3.7% in the second. Postini filters blocked more than 100 million virus-bearing messages per day during the worst of the attack.</div><div><br /></div><div><div>Since then, spam with attached viruses leveled off to around 1.1% in Q1&#8217;10, and dropped as low as 0.7% in March. It&#8217;s good news that virus levels are currently trending down &#8211; but Q1&#8217;10 levels are still 12-fold higher than they were in Q1&#8217;09.</div></div><div><br /></div><div>In fact, this virus surge may be part of the reason that there hasn&#8217;t been a significant impact on spam volume after the recent takedown of major botnets. With a host of new machines now infected and part of a botnet, it is unlikely that there would be a dip in spam proliferation.</div><div><br /></div><div><b>Benefits of security in the cloud</b><br />Although the botnets that distribute spam are mindless drones, the spammers that take advantage of these botnets are a highly active and adaptable group. This is evidenced by the varied techniques and tactics that they employ in an ongoing effort to evade spam filters and deliver messages to their targets.</div><div><br /></div><div>2010 is likely to see more botnets taken offline, but the question remains &#8211; will that have a long-term impact on spam volumes overall? So far in 2010, the effect has been limited, and the security community may begin to turn to other tactics that yield a more substantial impact on global spam volumes.</div><div><br /></div><div>As long as the threat is there, however, Google is committed to using the power of the cloud to protect your enterprise from spam and viruses. Outsourcing message security to Google enables you to leverage our technical expertise and massive infrastructure to keep spammers from your inbox.</div><div><br /></div><div>For more information on how Google&#8217;s security and archiving services can help your business stay safe and compliant, please visit <a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-Q110_spam_trends&amp;utm_medium=blog&amp;utm_term=enterprise_blog%20">www.google.com/postini</a>.</div><div><br /></div><div>Posted by Gopal Shah, Google Postini Services team</div></div></div><div style="text-align: left;"><br /></div> </script> <noscript> <div style="text-align: left;"><span class="Apple-style-span" style="font-style: italic;"><b>Editor's note: </b>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email connections per day in the course of providing email security to more than 50,000 businesses and 18 million business users.</span></div><div><br /></div><div>In 2009, the security community started seeing diminishing returns from the takedown of malicious ISPs. After the ISP 3FN was taken down, spam levels rebounded in less than a month, and after Real Host went down, spam volumes recovered after only two days. In response, the anti-spam community turned its attention toward taking botnets offline instead.</div><div><br /></div><div>Toward the end of 2009, Mega-D, a top-10 botnet &#8211; responsible for infecting more than 250,000 computers worldwide &#8211; was severely crippled through a carefully orchestrated campaign designed to isolate the command-and-control servers spammers were using to support the botnet. In early 2010, security professionals, along with government agencies, successfully mounted a campaign against several more targets: major botnets such as Waledac, Mariposa, and Zeus were either <a href="http://news.bbc.co.uk/2/hi/technology/8570993.stm">shut down</a> or had their operations significantly curtailed.</div><div><br /></div><div>However, this recent spate of botnet takedowns has not had a dramatic impact on spam levels. Although spam and virus levels did fall below Q4&#8217;09 highs, reports from Google&#8217;s global analytics show that spam levels held relatively steady over the course of Q1&#8217;10. </div><div><br /></div><div>This suggests that there&#8217;s no shortage of botnets out there for spammers to use. If one botnet goes offline, spammers simply buy, rent, or deploy another, making it difficult for the anti-spam community to make significant inroads in the fight against spam with individual botnet takedowns.</div><div><br /></div><div><b>Spam by the numbers<br /></b>Overall, spam volume fell 12% from Q4&#8217;09 to Q1&#8217;10, which follows a trend of quarterly decreases in overall spam levels that started after the surge in Q2&#8217;09. This may be attributed to some of the recent takedowns, but spam volume was still 6% higher this quarter than it was <a href="ttp://googleenterprise.blogspot.com/2009/03/spam-data-and-trends-q1-2009.html">during the same period in 2009</a>, and spam volume as a percentage of total email messages is holding steady.<br /><br /></div><div><span class="Apple-style-span" style=""><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780352837545906" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S8UJTcKJ77I/AAAAAAAAAWs/EFCfINPvGX0/s400/WA30-1004_Q1-Spam-Trends_Spam-User_v3.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 289px;"></span></div><div style="text-align: left;"><br />Recently, our data centers showed a 30% increase in the size of individual spam messages (measured in bytes) that occurred toward the end of March, as shown below.<br /><br /></div><div style="text-align: left;"><span class="Apple-style-span" style=""><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780346882095602" src="//4.bp.blogspot.com/_jSdgG4-DeNE/S8UJTF-Q-fI/AAAAAAAAAWk/Rem9Rva4q2E/s400/WA30-1004_Q1-Spam-Trends_Spam-Bytes_v3.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 273px;"></span></div><div style="text-align: left;"><br />This spike points to a resurgence of image spam, similar to <a href="http://googleenterprise.blogspot.com/2009/07/q2-2009-spam-trends.html">what we reported in Q2&#8217;09</a>. This is likely due to the fact that reusing image templates makes it easier and faster for spammers to start new campaigns.</div><div style="text-align: left;"><div style="text-align: left;"><br /></div><div style="text-align: left;">As always, spammers tend to make use of predictable topics &#8211; cheap pharmaceuticals, celebrity gossip, breaking news &#8211; to encourage user clicks. In January, spammers hastened to exploit the Haiti earthquake crisis, sending pleas for donations that appeared to have been sent by reputable charitable organizations, politicians, and celebrities.</div><div style="text-align: left;"><br /></div><div style="text-align: left;">The frequency and variety of post-earthquake spam illustrates an unpleasant reality: spammers will exploit any means &#8211; even tragedies &#8211; to accomplish their objectives.<br /><br /></div><div style="text-align: left;"><span class="Apple-style-span" style="color: rgb(0, 0, 238);"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780341419184418" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S8UJSxnzkSI/AAAAAAAAAWc/bXuiE1xbRA0/s400/WA30-1004_Q1-Spam-Trends_Payload_v2.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 273px;"></span></div><div><div><b><br />Virus levels fall after Q4&#8217;09 surge<br /></b>During 2009, spam with attached viruses increased tenfold, with levels rising from 0.3% of total spam in the first half of the year to 3.7% in the second. Postini filters blocked more than 100 million virus-bearing messages per day during the worst of the attack.</div><div><br /></div><div><div>Since then, spam with attached viruses leveled off to around 1.1% in Q1&#8217;10, and dropped as low as 0.7% in March. It&#8217;s good news that virus levels are currently trending down &#8211; but Q1&#8217;10 levels are still 12-fold higher than they were in Q1&#8217;09.</div></div><div><br /></div><div>In fact, this virus surge may be part of the reason that there hasn&#8217;t been a significant impact on spam volume after the recent takedown of major botnets. With a host of new machines now infected and part of a botnet, it is unlikely that there would be a dip in spam proliferation.</div><div><br /></div><div><b>Benefits of security in the cloud</b><br />Although the botnets that distribute spam are mindless drones, the spammers that take advantage of these botnets are a highly active and adaptable group. This is evidenced by the varied techniques and tactics that they employ in an ongoing effort to evade spam filters and deliver messages to their targets.</div><div><br /></div><div>2010 is likely to see more botnets taken offline, but the question remains &#8211; will that have a long-term impact on spam volumes overall? So far in 2010, the effect has been limited, and the security community may begin to turn to other tactics that yield a more substantial impact on global spam volumes.</div><div><br /></div><div>As long as the threat is there, however, Google is committed to using the power of the cloud to protect your enterprise from spam and viruses. Outsourcing message security to Google enables you to leverage our technical expertise and massive infrastructure to keep spammers from your inbox.</div><div><br /></div><div>For more information on how Google&#8217;s security and archiving services can help your business stay safe and compliant, please visit <a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-Q110_spam_trends&amp;utm_medium=blog&amp;utm_term=enterprise_blog%20">www.google.com/postini</a>.</div><div><br /></div><div>Posted by Gopal Shah, Google Postini Services team</div></div></div><div style="text-align: left;"><br /></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Q1&#39;10 spam &amp; virus trends from Postini&url=https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='1' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html?hl=en' data-url='https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Apps?hl=en' rel='tag'> Google Apps </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends?hl=en' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='4337835736354056303' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/03/give-your-google-message-security.html?hl=en' itemprop='url' title='Give your Google Message Security filters a tune-up'> Give your Google Message Security filters a tune-up </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, March 31, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div style="text-align: left;">Google Postini security services work in the cloud to help prevent spam and viruses before they hit your servers. These services also make it easy for admins to fine-tune filtering options to get the right level of protection for their organization's unique needs.</div><div><br /></div><div>It can often be a delicate balance between protecting networks from attacks and allowing employees the flexibility to use email effectively. To help achieve this balance, today we're introducing a new Google Message Security reporting feature: Health Check.</div><div><br /></div><div>Health Check helps you maximize the effectiveness of your spam filters. Think of it as a self-service "tune-up" for your Postini filters. It gives admins a comprehensive report that will help them check how current configurations impact the effectiveness of antispam and antivirus filters. </div><div><br /></div><div>This report also highlights deviations from our recommended best practices, so that you can see areas where more protection might be helpful and select the levels that best meet your needs. For example, reports can "flag" areas of risk in user-defined settings, help optimize Approved Sender Lists, and guide the way you set up firewalls.</div><div style="text-align: left;"><span class="Apple-style-span" style="color:#0000EE;"><span class="Apple-style-span" style="color:#000000;"><br /></span></span></div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" src="https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uB6s9yDdXdCcffaVjLCimW8scAJkeHbKkmrJPhgXQAisKc6IKhPx0h1iu2KLy-S77lLgZyWnbWUdt775OsPMK4VJSfX68Pe-8CuCYD5e8dkXsnD92jSu1XWLxPenF5GZrwd0UxOqwOg57bp71c3MFyX1f1TQ1lRkFYZeHdLhfojHgGSbatSRCNUq72RdLO4N5MJX5K5_iQhWRQ7B3mUexCbfvzx3ExR9i34YCKO0nJ3QvnMNyE8tVJ9B3AKiQ9pGpx1Geg7lRe6qJFOpYYQVpVUT35QVfTsLOJEdayWuR8zR6PI6VsyGFi2D3m1r56J28gLU8x9g6W_5iayRr851xxeRna8Dvdjg2ZvSiFidKcp7uMmvMNqEmPQ-sqno559mmPpMb3Uf_SKQqdCiLjfEeJ-X1frdGnWy_R_sDSG0HcDGuP_ItfuzMKuBTG1LnwM0ulQqnl0xlNcOG-t_G230M5QSJji8YzEittxUEWnUDmI8CAPttXc1fCee9ZtYNMJ8YUzh3qlEOH81tCQiD8l8EgprH_tdDEewcGr1hmx9_xEv15epKiou3BdK2oV-v0LMy9Z1vSKRLsFrPCddFeWQc8TH3kKbMO0cKlknNciFFo3C0_MLTGgpY-ReNlooV1zSckMMs=s0-d" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 510px; height: 177px; "></span><div>In this snippet from a Health Check report, the Virus Outbreak Level for this account is set to "Normal" (see red outline over item "2"). Our guidelines suggest that admins set this to Very High to increase security against viruses and malware. Deviations from recommended best practices are highlighted in red text so you can easily identify where changes can be made to tighten security.</div><div><br /></div><div><div><a href="http://8374507335319190560-a-googleapps-com-s-sites.googlegroups.com/a/googleapps.com/security-archiving/security-archiving/HealthCheck-edited2.jpg?attachauth=ANoY7cqKDvD838xHPSYLBSlehwdIjWhGcB50S4wuOfQNvYELwFBI4ggsNIPp6JNv8BWFEmfm85LRWJPMgPWJAr4oNY_5M0puBU2fXnoy5sH3kj8qPlpqfepXHtueH7BzUXWeBvoAjLED7oAakbnxMplQlwI70N_SJ2UOjaMcp8_XU1Q-4rxov4_gSx_aQD5SaUeZizEauVYjb-uLXKFcp8dFFg-dQh-BXh3A-qJBP-ej2oUKwZI_8-OjgL8CSv2ZYTMqfnFdWMFL&amp;attredirects=0">You can see a larger view here. </a></div><div><br /></div></div><div>With Health Check, we hope to empower administrators to make the best use of Postini Services. Health Check is now available through the Postini service administration console to Postini and Google Apps Premier Edition customers.</div><div><br /></div><div>For more information the Google Postini suite of security and archving services, visit <a href="//www.google.com/postini">www.google.com/postini</a></div><div><br /></div><div>Posted by Gopal Shah, Google Postini team</div><div><br /></div> </script> <noscript> <div style="text-align: left;">Google Postini security services work in the cloud to help prevent spam and viruses before they hit your servers. These services also make it easy for admins to fine-tune filtering options to get the right level of protection for their organization's unique needs.</div><div><br /></div><div>It can often be a delicate balance between protecting networks from attacks and allowing employees the flexibility to use email effectively. To help achieve this balance, today we're introducing a new Google Message Security reporting feature: Health Check.</div><div><br /></div><div>Health Check helps you maximize the effectiveness of your spam filters. Think of it as a self-service "tune-up" for your Postini filters. It gives admins a comprehensive report that will help them check how current configurations impact the effectiveness of antispam and antivirus filters. </div><div><br /></div><div>This report also highlights deviations from our recommended best practices, so that you can see areas where more protection might be helpful and select the levels that best meet your needs. For example, reports can "flag" areas of risk in user-defined settings, help optimize Approved Sender Lists, and guide the way you set up firewalls.</div><div style="text-align: left;"><span class="Apple-style-span" style="color:#0000EE;"><span class="Apple-style-span" style="color:#000000;"><br /></span></span></div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" src="https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uB6s9yDdXdCcffaVjLCimW8scAJkeHbKkmrJPhgXQAisKc6IKhPx0h1iu2KLy-S77lLgZyWnbWUdt775OsPMK4VJSfX68Pe-8CuCYD5e8dkXsnD92jSu1XWLxPenF5GZrwd0UxOqwOg57bp71c3MFyX1f1TQ1lRkFYZeHdLhfojHgGSbatSRCNUq72RdLO4N5MJX5K5_iQhWRQ7B3mUexCbfvzx3ExR9i34YCKO0nJ3QvnMNyE8tVJ9B3AKiQ9pGpx1Geg7lRe6qJFOpYYQVpVUT35QVfTsLOJEdayWuR8zR6PI6VsyGFi2D3m1r56J28gLU8x9g6W_5iayRr851xxeRna8Dvdjg2ZvSiFidKcp7uMmvMNqEmPQ-sqno559mmPpMb3Uf_SKQqdCiLjfEeJ-X1frdGnWy_R_sDSG0HcDGuP_ItfuzMKuBTG1LnwM0ulQqnl0xlNcOG-t_G230M5QSJji8YzEittxUEWnUDmI8CAPttXc1fCee9ZtYNMJ8YUzh3qlEOH81tCQiD8l8EgprH_tdDEewcGr1hmx9_xEv15epKiou3BdK2oV-v0LMy9Z1vSKRLsFrPCddFeWQc8TH3kKbMO0cKlknNciFFo3C0_MLTGgpY-ReNlooV1zSckMMs=s0-d" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 510px; height: 177px; "></span><div>In this snippet from a Health Check report, the Virus Outbreak Level for this account is set to "Normal" (see red outline over item "2"). Our guidelines suggest that admins set this to Very High to increase security against viruses and malware. Deviations from recommended best practices are highlighted in red text so you can easily identify where changes can be made to tighten security.</div><div><br /></div><div><div><a href="http://8374507335319190560-a-googleapps-com-s-sites.googlegroups.com/a/googleapps.com/security-archiving/security-archiving/HealthCheck-edited2.jpg?attachauth=ANoY7cqKDvD838xHPSYLBSlehwdIjWhGcB50S4wuOfQNvYELwFBI4ggsNIPp6JNv8BWFEmfm85LRWJPMgPWJAr4oNY_5M0puBU2fXnoy5sH3kj8qPlpqfepXHtueH7BzUXWeBvoAjLED7oAakbnxMplQlwI70N_SJ2UOjaMcp8_XU1Q-4rxov4_gSx_aQD5SaUeZizEauVYjb-uLXKFcp8dFFg-dQh-BXh3A-qJBP-ej2oUKwZI_8-OjgL8CSv2ZYTMqfnFdWMFL&amp;attredirects=0">You can see a larger view here. </a></div><div><br /></div></div><div>With Health Check, we hope to empower administrators to make the best use of Postini Services. Health Check is now available through the Postini service administration console to Postini and Google Apps Premier Edition customers.</div><div><br /></div><div>For more information the Google Postini suite of security and archving services, visit <a href="//www.google.com/postini">www.google.com/postini</a></div><div><br /></div><div>Posted by Gopal Shah, Google Postini team</div><div><br /></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/03/give-your-google-message-security.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Give your Google Message Security filters a tune-up&url=https://cloud.googleblog.com/2010/03/give-your-google-message-security.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/03/give-your-google-message-security.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='2' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/03/give-your-google-message-security.html?hl=en' data-url='https://cloud.googleblog.com/2010/03/give-your-google-message-security.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/03/give-your-google-message-security.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/new%20features?hl=en' rel='tag'> new features </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> </span> </div> </div> </div> <div class='post' data-id='5710095490889380784' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/03/announcing-dual-delivery-for-google.html?hl=en' itemprop='url' title='Announcing Dual Delivery for Google Postini Services'> Announcing Dual Delivery for Google Postini Services </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, March 31, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://8374507335319190560-a-googleapps-com-s-sites.googlegroups.com/a/googleapps.com/security-archiving/security-archiving/DualDeliveryScreen-small2.jpg?attachauth=ANoY7cq361Qnj6_zuj8Q7fUei1UW5_oT8vkjYD1sn4pG4ngHRAMghyECxy2CuE6NVMdSLUc4kHA5jxsJNbOMfZUZ9dl33GDgFYurW-XRv5Fyf2LxMzd_K_X6xN_9j6ezqKqjMCaPA1iCSaWuEtoivxNRY7HzR-qNC4EnDT6vldLx73LrvZZq_-Bd4R90O95x2lT3VDqZaLw_yNhwxS9RfVT8ot9g9SoUJwX-KUq0lu_If8VmL0CnaAGuLUO7sZKm9jQjIuCmxNUq&amp;attredirects=0"></a><div style="text-align: left;">Today we're introducing Dual Delivery, a new feature for Google Message Security that enables a copy of an email to be delivered to two different mail hosts. Dual Delivery provides two benefits. First, it can be used to support a transition to a new email service; second, it can be used as a backup email access point.</div><div><br /></div><div>Dual Delivery allows an interruption-free transition to a new email solution. By enabling incoming email messages to be copied and sent to two different mailhosts, Dual Delivery gives users the chance to familiarize themselves with a new email platform without disrupting mailflow to the existing system. It also gives IT the chance to learn from user behavior and understand the technical implications of a transition before a full rollout.</div><div><div class="separator" style="clear: both; text-align: center;"><br /></div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://8374507335319190560-a-googleapps-com-s-sites.googlegroups.com/a/googleapps.com/security-archiving/security-archiving/DualDeliveryScreen-small2.jpg?attachauth=ANoY7cq361Qnj6_zuj8Q7fUei1UW5_oT8vkjYD1sn4pG4ngHRAMghyECxy2CuE6NVMdSLUc4kHA5jxsJNbOMfZUZ9dl33GDgFYurW-XRv5Fyf2LxMzd_K_X6xN_9j6ezqKqjMCaPA1iCSaWuEtoivxNRY7HzR-qNC4EnDT6vldLx73LrvZZq_-Bd4R90O95x2lT3VDqZaLw_yNhwxS9RfVT8ot9g9SoUJwX-KUq0lu_If8VmL0CnaAGuLUO7sZKm9jQjIuCmxNUq&amp;attredirects=0"><img alt="" border="0" src="https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v3AGJeCnV2cEETsmCH9q8G6TXyGq18C6xihFEgfGxcgL1dP2bBJJxmlgD88aOH9mvDOoZYYxV0mZjNu03FKBfD9Ywlbjggn0RGCXC2lckzwiO67WJaWhxBbIkq9YFKlRw1rxduEtmtS9DajbooDoi8JLVgyCWrQrfwDB-whK10Mx37d9vPQHOjfzv10da9H4uE4sB6jq_yfuLfWiz2Dm4r3G4TECW-YE5PthY-wXYpOamEME061xq8j0wjHT4BlXucFrlVnaZAfw5T7fxffmjYtwa_1uhL9zkrhVvafJZDIDcPBxJBxHf4b5NtZcHJT7NY9V0MHik-k9DdJVIsOYMoVecgWxKTdEFEkJnh1ZP05rZ0tJITrE8fdXicWswQfP0NNpxjbHmKd784hvrD8xyyujJ7yf1IwgLMnh1ehtpxLTZA8nBTeqyF96xozeEAGxOYDzoKHdaW5kdFry2XWaJ7Wu85XbknHiEJAmHkHOudLgGwwSpJCHqdpGEM-VOeBaNJXVaw0gdOQtBnNBZPwmdf8dr52IQJRv0mCIcJ9qI_gkklBWXRgbMvlHtPbg29prN33tnQ4NcxQYjwNUJ9iljN434V9Sm-WqGr28AA_droGWebxTI2S_ujHsYrLSxceaoTjRyF=s0-d" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 510px; height: 103px; "></a><div class="separator" style="text-align: left;clear: both; "><a href="http://8374507335319190560-a-googleapps-com-s-sites.googlegroups.com/a/googleapps.com/security-archiving/security-archiving/DualDeliveryScreen-edited.jpg?attachauth=ANoY7crom1rkmMZEINVkZsdbN_M_XxquhODKfHoFnVZbP03ZKUejCI1OywedzhQwrmmgb11eHj-j86yVOVYm8tgYQ9uOYRMysZNnPbHX6k11LxvWEsCY78YvJ3ldwF8a3trObp-PcIw104-ZF_S7SUOqFdkRstSfuyuKVABkhci9X0Fo0U6BnhYbH-CeM3Dto-LBQfTXqrGziqEgdKtNHV_v4_yCy4AiezsncQLm69GfT9TNmAB_H443serhU1ynrMspNnC76CjG&amp;attredirects=0">Take a closer look here. </a></div><div class="separator" style="text-align: left;clear: both; "><br /></div><div class="separator" style="text-align: left;clear: both; ">Dual Delivery also makes it easier to pilot and transition to Google Apps. By enabling the "Send a copy to Google Apps Gmail" feature of Dual Delivery, you can test Gmail without interrupting current practice. If you choose to switch over to Google Apps, you can enable the "Use Google Apps Gmail" feature in the Administration Console to directly route all of your mail to Gmail without having to manually reroute your MX records.</div></div><div><br />Dual Delivery can also be used as a secondary email access point. If users are unable to access their primary mailbox for any reason, or if admins want to give users cloud-based remote or mobile email access, Dual Delivery can provide read/write email access through a secondary inbox.</div><div><br /></div><div>Dual Delivery is now available to Postini customers through the Delivery Manager settings in the Postini Administration Console. </div><div><br /></div><div>For more information about the Google Postini suite of security and archiving services, visit <a href="//www.google.com/postini">www.google.com/postini</a></div><div><br /></div><div>Posted by Gopal Shah, Google Postini team</div><div><br /></div><div>Update 04/05/2010: Dual Delivery is not a tool for migrating historical email or legacy data. It is a tool that makes it easier to transition to a new email system, like Google Apps, by having production email show up in both the new system and the legacy system, allowing you to evaluate both. Please check our <a href="http://googleenterprise.blogspot.com/2010/03/now-its-easy-switch-to-google-apps-from.html">Switching from Microsoft Exchange</a> and <a href="http://googleenterprise.blogspot.com/2009/07/switching-to-google-apps-from-lotus.html">Switching from Lotus Notes</a> posts, for more information on migrating to Google Apps.</div><div><br /></div> </script> <noscript> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://8374507335319190560-a-googleapps-com-s-sites.googlegroups.com/a/googleapps.com/security-archiving/security-archiving/DualDeliveryScreen-small2.jpg?attachauth=ANoY7cq361Qnj6_zuj8Q7fUei1UW5_oT8vkjYD1sn4pG4ngHRAMghyECxy2CuE6NVMdSLUc4kHA5jxsJNbOMfZUZ9dl33GDgFYurW-XRv5Fyf2LxMzd_K_X6xN_9j6ezqKqjMCaPA1iCSaWuEtoivxNRY7HzR-qNC4EnDT6vldLx73LrvZZq_-Bd4R90O95x2lT3VDqZaLw_yNhwxS9RfVT8ot9g9SoUJwX-KUq0lu_If8VmL0CnaAGuLUO7sZKm9jQjIuCmxNUq&amp;attredirects=0"></a><div style="text-align: left;">Today we're introducing Dual Delivery, a new feature for Google Message Security that enables a copy of an email to be delivered to two different mail hosts. Dual Delivery provides two benefits. First, it can be used to support a transition to a new email service; second, it can be used as a backup email access point.</div><div><br /></div><div>Dual Delivery allows an interruption-free transition to a new email solution. By enabling incoming email messages to be copied and sent to two different mailhosts, Dual Delivery gives users the chance to familiarize themselves with a new email platform without disrupting mailflow to the existing system. It also gives IT the chance to learn from user behavior and understand the technical implications of a transition before a full rollout.</div><div><div class="separator" style="clear: both; text-align: center;"><br /></div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://8374507335319190560-a-googleapps-com-s-sites.googlegroups.com/a/googleapps.com/security-archiving/security-archiving/DualDeliveryScreen-small2.jpg?attachauth=ANoY7cq361Qnj6_zuj8Q7fUei1UW5_oT8vkjYD1sn4pG4ngHRAMghyECxy2CuE6NVMdSLUc4kHA5jxsJNbOMfZUZ9dl33GDgFYurW-XRv5Fyf2LxMzd_K_X6xN_9j6ezqKqjMCaPA1iCSaWuEtoivxNRY7HzR-qNC4EnDT6vldLx73LrvZZq_-Bd4R90O95x2lT3VDqZaLw_yNhwxS9RfVT8ot9g9SoUJwX-KUq0lu_If8VmL0CnaAGuLUO7sZKm9jQjIuCmxNUq&amp;attredirects=0"><img alt="" border="0" src="https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v3AGJeCnV2cEETsmCH9q8G6TXyGq18C6xihFEgfGxcgL1dP2bBJJxmlgD88aOH9mvDOoZYYxV0mZjNu03FKBfD9Ywlbjggn0RGCXC2lckzwiO67WJaWhxBbIkq9YFKlRw1rxduEtmtS9DajbooDoi8JLVgyCWrQrfwDB-whK10Mx37d9vPQHOjfzv10da9H4uE4sB6jq_yfuLfWiz2Dm4r3G4TECW-YE5PthY-wXYpOamEME061xq8j0wjHT4BlXucFrlVnaZAfw5T7fxffmjYtwa_1uhL9zkrhVvafJZDIDcPBxJBxHf4b5NtZcHJT7NY9V0MHik-k9DdJVIsOYMoVecgWxKTdEFEkJnh1ZP05rZ0tJITrE8fdXicWswQfP0NNpxjbHmKd784hvrD8xyyujJ7yf1IwgLMnh1ehtpxLTZA8nBTeqyF96xozeEAGxOYDzoKHdaW5kdFry2XWaJ7Wu85XbknHiEJAmHkHOudLgGwwSpJCHqdpGEM-VOeBaNJXVaw0gdOQtBnNBZPwmdf8dr52IQJRv0mCIcJ9qI_gkklBWXRgbMvlHtPbg29prN33tnQ4NcxQYjwNUJ9iljN434V9Sm-WqGr28AA_droGWebxTI2S_ujHsYrLSxceaoTjRyF=s0-d" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 510px; height: 103px; "></a><div class="separator" style="text-align: left;clear: both; "><a href="http://8374507335319190560-a-googleapps-com-s-sites.googlegroups.com/a/googleapps.com/security-archiving/security-archiving/DualDeliveryScreen-edited.jpg?attachauth=ANoY7crom1rkmMZEINVkZsdbN_M_XxquhODKfHoFnVZbP03ZKUejCI1OywedzhQwrmmgb11eHj-j86yVOVYm8tgYQ9uOYRMysZNnPbHX6k11LxvWEsCY78YvJ3ldwF8a3trObp-PcIw104-ZF_S7SUOqFdkRstSfuyuKVABkhci9X0Fo0U6BnhYbH-CeM3Dto-LBQfTXqrGziqEgdKtNHV_v4_yCy4AiezsncQLm69GfT9TNmAB_H443serhU1ynrMspNnC76CjG&amp;attredirects=0">Take a closer look here. </a></div><div class="separator" style="text-align: left;clear: both; "><br /></div><div class="separator" style="text-align: left;clear: both; ">Dual Delivery also makes it easier to pilot and transition to Google Apps. By enabling the "Send a copy to Google Apps Gmail" feature of Dual Delivery, you can test Gmail without interrupting current practice. If you choose to switch over to Google Apps, you can enable the "Use Google Apps Gmail" feature in the Administration Console to directly route all of your mail to Gmail without having to manually reroute your MX records.</div></div><div><br />Dual Delivery can also be used as a secondary email access point. If users are unable to access their primary mailbox for any reason, or if admins want to give users cloud-based remote or mobile email access, Dual Delivery can provide read/write email access through a secondary inbox.</div><div><br /></div><div>Dual Delivery is now available to Postini customers through the Delivery Manager settings in the Postini Administration Console. </div><div><br /></div><div>For more information about the Google Postini suite of security and archiving services, visit <a href="//www.google.com/postini">www.google.com/postini</a></div><div><br /></div><div>Posted by Gopal Shah, Google Postini team</div><div><br /></div><div>Update 04/05/2010: Dual Delivery is not a tool for migrating historical email or legacy data. It is a tool that makes it easier to transition to a new email system, like Google Apps, by having production email show up in both the new system and the legacy system, allowing you to evaluate both. Please check our <a href="http://googleenterprise.blogspot.com/2010/03/now-its-easy-switch-to-google-apps-from.html">Switching from Microsoft Exchange</a> and <a href="http://googleenterprise.blogspot.com/2009/07/switching-to-google-apps-from-lotus.html">Switching from Lotus Notes</a> posts, for more information on migrating to Google Apps.</div><div><br /></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/03/announcing-dual-delivery-for-google.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Announcing Dual Delivery for Google Postini Services&url=https://cloud.googleblog.com/2010/03/announcing-dual-delivery-for-google.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/03/announcing-dual-delivery-for-google.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='5' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/03/announcing-dual-delivery-for-google.html?hl=en' data-url='https://cloud.googleblog.com/2010/03/announcing-dual-delivery-for-google.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/03/announcing-dual-delivery-for-google.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/new%20features?hl=en' rel='tag'> new features </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> </span> </div> </div> </div> <div class='post' data-id='7085881736349578117' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/03/google-message-security-wins-sc.html?hl=en' itemprop='url' title='Google Message Security wins SC Magazine Reader Trust award'> Google Message Security wins SC Magazine Reader Trust award </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Monday, March 15, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_jSdgG4-DeNE/S56i1QV_HKI/AAAAAAAAASU/VgMObV40r9E/s1600-h/sc_awards_2010_winner_89944.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5448971634968829090" src="//1.bp.blogspot.com/_jSdgG4-DeNE/S56i1QV_HKI/AAAAAAAAASU/VgMObV40r9E/s200/sc_awards_2010_winner_89944.jpg" style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 107px; height: 200px;"></a>A few months back, we learned that <a href="//www.google.com/postini/email.html#utm_campaign=en&amp;utm_source=en-blog-na-us-sc_winner&amp;utm_medium=blog&amp;utm_term=enterprise_blog">Google Message Security</a>, powered by Postini, was <a href="http://googleenterprise.blogspot.com/2009/12/google-honored-as-finalist-in-2010-sc.html">selected as a finalist</a> in the 2010 SC Awards for outstanding achievement in IT security. Today, we are thrilled to announce that Google Message Security has received the <a href="http://www.scmagazineus.com/best-managed-security-service/article/164123/">Reader Trust Award</a> for Best Managed Security Service.<br /><br />At Google, we think about the user experience in all that we do, so we are especially honored to receive this award from the Reader Trust Voting Panel, which consists of security and technology experts from large, medium and small enterprises from all major vertical markets.<br /><br />The Postini team would like to thank SC Magazine and the many readers who voted for Google Message Security. We'd also like to congratulate our fellow nominees and award-winners and acknowledge their contributions to the field of online security.<br /><br />For more information on Google Message Security and the Postini suite of security and archiving products, please visit, <a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-sc_winner&amp;utm_medium=blog&amp;utm_term=enterprise_blog%20">www.google.com/postini</a><br /><a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-sc_winner&amp;utm_medium=blog&amp;utm_term=enterprise_blog%20"></a><br />Posted by Gopal Shah, Google Postini team </script> <noscript> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_jSdgG4-DeNE/S56i1QV_HKI/AAAAAAAAASU/VgMObV40r9E/s1600-h/sc_awards_2010_winner_89944.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5448971634968829090" src="//1.bp.blogspot.com/_jSdgG4-DeNE/S56i1QV_HKI/AAAAAAAAASU/VgMObV40r9E/s200/sc_awards_2010_winner_89944.jpg" style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 107px; height: 200px;"></a>A few months back, we learned that <a href="//www.google.com/postini/email.html#utm_campaign=en&amp;utm_source=en-blog-na-us-sc_winner&amp;utm_medium=blog&amp;utm_term=enterprise_blog">Google Message Security</a>, powered by Postini, was <a href="http://googleenterprise.blogspot.com/2009/12/google-honored-as-finalist-in-2010-sc.html">selected as a finalist</a> in the 2010 SC Awards for outstanding achievement in IT security. Today, we are thrilled to announce that Google Message Security has received the <a href="http://www.scmagazineus.com/best-managed-security-service/article/164123/">Reader Trust Award</a> for Best Managed Security Service.<br /><br />At Google, we think about the user experience in all that we do, so we are especially honored to receive this award from the Reader Trust Voting Panel, which consists of security and technology experts from large, medium and small enterprises from all major vertical markets.<br /><br />The Postini team would like to thank SC Magazine and the many readers who voted for Google Message Security. We'd also like to congratulate our fellow nominees and award-winners and acknowledge their contributions to the field of online security.<br /><br />For more information on Google Message Security and the Postini suite of security and archiving products, please visit, <a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-sc_winner&amp;utm_medium=blog&amp;utm_term=enterprise_blog%20">www.google.com/postini</a><br /><a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-sc_winner&amp;utm_medium=blog&amp;utm_term=enterprise_blog%20"></a><br />Posted by Gopal Shah, Google Postini team </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/03/google-message-security-wins-sc.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Google Message Security wins SC Magazine Reader Trust award&url=https://cloud.googleblog.com/2010/03/google-message-security-wins-sc.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/03/google-message-security-wins-sc.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/03/google-message-security-wins-sc.html?hl=en' data-url='https://cloud.googleblog.com/2010/03/google-message-security-wins-sc.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/03/google-message-security-wins-sc.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/news?hl=en' rel='tag'> news </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> </span> </div> </div> </div> <div class='post' data-id='6363486772789418446' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/02/bringing-log-search-to-cloud.html?hl=en' itemprop='url' title='Bringing log search to the cloud: Introducing Message Log Search for Postini'> Bringing log search to the cloud: Introducing Message Log Search for Postini </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Thursday, February 4, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Today, we're introducing a new feature for Google Postini Services: Message Log Search. This feature delivers the search and analysis capabilities normally available with on-premise solutions, but without the associated complexity or maintenance.<br /><br />When messages pass through the Postini service, header and transaction data about these messages is stored in a log. Previously, admins only had access to this data through customer support. With the Message Log Search feature, email administrators can now easily run searches on these logs and drill down to the details about how specific messages were processed.<br /><br />For example, admins can view the disposition of messages, such as whether a message or group of messages was delivered, quarantined, archived, or encrypted.<br /><br />Say an admin was checking the delivery status of all inbound emails from Matthew Smith:<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_jSdgG4-DeNE/S2sILbay9bI/AAAAAAAAAPw/kvz_pehtKuw/s1600-h/LogSearchQuery-edited2.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5434446367784367538" src="//1.bp.blogspot.com/_jSdgG4-DeNE/S2sILbay9bI/AAAAAAAAAPw/kvz_pehtKuw/s400/LogSearchQuery-edited2.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 141px;"></a><br />Message Log Search returns results which include who received the message, date/time, disposition, and more. Click the image below for full view.</div><div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//2.bp.blogspot.com/_jSdgG4-DeNE/S2sIS5fRfTI/AAAAAAAAAP4/vhryDftY4uw/s1600-h/LogSearchResults-edited.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5434446496115293490" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S2sIS5fRfTI/AAAAAAAAAP4/vhryDftY4uw/s400/LogSearchResults-edited.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 168px;"></a><br />Customers trying a beta version of Message Log Search have found many useful, time-saving applications for the feature. For example, Dave Lugo at Affiliated Computer Systems is "very happy" that Message Log Search helps him track errant emails and easily resolve the "they didn't get it / we didn't get it" tickets he receives from his users. Joe Stark at HeidelbergCement uses log searching to "proactively search for problem senders" and block them entirely from his network.<br /><br />Other customers have found that the Message Log Search interface is "very fast and responsive," and helps them to determine the effectiveness of new content policies and gain insight into traffic patterns across their organization.<br /><br />These are a few examples that illustrate the flexibility and power of Message Log Search, and starting today, you can try the feature for yourself. Message Log Search is now available through the Postini service administration console to Postini and Google Apps Premier Edition customers.<br /><br />For more information on Google Postini Services, please visit <a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-log_search&amp;utm_medium=blog&amp;utm_term=enterprise_blog">www.google.com/postini</a>.<br /><br /><span style="font-style:italic;"><span style="font-weight:bold;">Note:</span> Message Log Search data is managed and stored in Google datacenters pursuant to the privacy and data confidentiality provisions spelled out in our customer agreements. The message security service stores information about messages in a log, such as how it is processed, but does not store the content of messages.</span><br /><br />Posted by Gopal Shah, Google Postini team</div> </script> <noscript> Today, we're introducing a new feature for Google Postini Services: Message Log Search. This feature delivers the search and analysis capabilities normally available with on-premise solutions, but without the associated complexity or maintenance.<br /><br />When messages pass through the Postini service, header and transaction data about these messages is stored in a log. Previously, admins only had access to this data through customer support. With the Message Log Search feature, email administrators can now easily run searches on these logs and drill down to the details about how specific messages were processed.<br /><br />For example, admins can view the disposition of messages, such as whether a message or group of messages was delivered, quarantined, archived, or encrypted.<br /><br />Say an admin was checking the delivery status of all inbound emails from Matthew Smith:<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_jSdgG4-DeNE/S2sILbay9bI/AAAAAAAAAPw/kvz_pehtKuw/s1600-h/LogSearchQuery-edited2.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5434446367784367538" src="//1.bp.blogspot.com/_jSdgG4-DeNE/S2sILbay9bI/AAAAAAAAAPw/kvz_pehtKuw/s400/LogSearchQuery-edited2.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 141px;"></a><br />Message Log Search returns results which include who received the message, date/time, disposition, and more. Click the image below for full view.</div><div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//2.bp.blogspot.com/_jSdgG4-DeNE/S2sIS5fRfTI/AAAAAAAAAP4/vhryDftY4uw/s1600-h/LogSearchResults-edited.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5434446496115293490" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S2sIS5fRfTI/AAAAAAAAAP4/vhryDftY4uw/s400/LogSearchResults-edited.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 168px;"></a><br />Customers trying a beta version of Message Log Search have found many useful, time-saving applications for the feature. For example, Dave Lugo at Affiliated Computer Systems is "very happy" that Message Log Search helps him track errant emails and easily resolve the "they didn't get it / we didn't get it" tickets he receives from his users. Joe Stark at HeidelbergCement uses log searching to "proactively search for problem senders" and block them entirely from his network.<br /><br />Other customers have found that the Message Log Search interface is "very fast and responsive," and helps them to determine the effectiveness of new content policies and gain insight into traffic patterns across their organization.<br /><br />These are a few examples that illustrate the flexibility and power of Message Log Search, and starting today, you can try the feature for yourself. Message Log Search is now available through the Postini service administration console to Postini and Google Apps Premier Edition customers.<br /><br />For more information on Google Postini Services, please visit <a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-log_search&amp;utm_medium=blog&amp;utm_term=enterprise_blog">www.google.com/postini</a>.<br /><br /><span style="font-style:italic;"><span style="font-weight:bold;">Note:</span> Message Log Search data is managed and stored in Google datacenters pursuant to the privacy and data confidentiality provisions spelled out in our customer agreements. The message security service stores information about messages in a log, such as how it is processed, but does not store the content of messages.</span><br /><br />Posted by Gopal Shah, Google Postini team</div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/02/bringing-log-search-to-cloud.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Bringing log search to the cloud: Introducing Message Log Search for Postini&url=https://cloud.googleblog.com/2010/02/bringing-log-search-to-cloud.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/02/bringing-log-search-to-cloud.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='4' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/02/bringing-log-search-to-cloud.html?hl=en' data-url='https://cloud.googleblog.com/2010/02/bringing-log-search-to-cloud.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/02/bringing-log-search-to-cloud.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/admin?hl=en' rel='tag'> admin </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/google%20message%20security?hl=en' rel='tag'> google message security </a> , <a class='label' href='https://cloud.googleblog.com/search/label/IT?hl=en' rel='tag'> IT </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> </span> </div> </div> </div> <div class='post' data-id='7145725432345161554' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/10/research-finds-that-it-departments-are.html?hl=en' itemprop='url' title='Research finds that IT departments are thinking in the cloud'> Research finds that IT departments are thinking in the cloud </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Thursday, October 8, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style="font-family: arial;font-size:100%;" >Google recently sponsored a global, multi-industry research project surveying 1,125 IT decision-makers and their perceptions about cloud computing and the key drivers behind the growth of cloud-based IT solutions.<br /><br />We're sharing the results of the study in a new whitepaper: the <u><a title="Google Communications Intelligence Report" target="_blank" href="//www.google.com/postini/pdf/cir2009_wp.pdf" id="e7ic">Google Communications Intelligence Report</a></u>. The findings provide some insights on what types of organizations are moving to the cloud, what value they find there, and what the key drivers for and barriers to adoption are. Some of the key takeaways follow:<br /></span><ul style="font-family: arial;"><li><span style="font-size:100%;">More than 60% of respondents indicated that the IT department holds the majority of the responsibility for communications security and compliance, but fewer than 20% feel they are well equipped to handle it.</span></li><li><span style="font-size:100%;">Email security, web security, and messaging are the cloud applications most widely adopted, and organizations using these applications in the cloud report higher satisfaction than users of traditional platforms.</span></li><li><span style="font-size:100%;">Ease of use is cited as the key motivator for transitioning to cloud-based applications.</span></li><li><span style="font-size:100%;">Although price is mentioned as a key deterrent for respondents who are not yet using cloud-based apps, value is cited as a key benefit by respondents who already work in the cloud. </span></li></ul> <span style="font-family: arial;font-size:100%;" >In these findings &#8211; and in our conversations with businesses of all types and sizes &#8211; we are seeing that more and more businesses are finding enhanced productivity and IT efficiency when they move their applications to the cloud with services such as <u>Postini </u>or <u>Google Apps</u>. That the cloud movement is more than just a trend is validated by our research findings, which indicate that 50% of the respondents who were aware of but <span style="background-color: rgb(255, 255, 255);">not</span> currently using cloud-based apps are planning to deploy a cloud solution within the next 12 months. </span><div style="font-family: arial;"><span style="font-size:100%;"><br /></span></div><div style="font-family: arial;"><span style="font-size:100%;">Read more about how your organization (or business) might benefit from the research in the <u><a title="Communication Intelligence Report" target="_blank" href="//www.google.com/postini/pdf/cir2009_wp.pdf" id="ao_-">Communication Intelligence Report</a></u>.<br /><br />Posted by Adam Swidler, Google Postini Services team<br /></span> </div> </script> <noscript> <span style="font-family: arial;font-size:100%;" >Google recently sponsored a global, multi-industry research project surveying 1,125 IT decision-makers and their perceptions about cloud computing and the key drivers behind the growth of cloud-based IT solutions.<br /><br />We're sharing the results of the study in a new whitepaper: the <u><a title="Google Communications Intelligence Report" target="_blank" href="//www.google.com/postini/pdf/cir2009_wp.pdf" id="e7ic">Google Communications Intelligence Report</a></u>. The findings provide some insights on what types of organizations are moving to the cloud, what value they find there, and what the key drivers for and barriers to adoption are. Some of the key takeaways follow:<br /></span><ul style="font-family: arial;"><li><span style="font-size:100%;">More than 60% of respondents indicated that the IT department holds the majority of the responsibility for communications security and compliance, but fewer than 20% feel they are well equipped to handle it.</span></li><li><span style="font-size:100%;">Email security, web security, and messaging are the cloud applications most widely adopted, and organizations using these applications in the cloud report higher satisfaction than users of traditional platforms.</span></li><li><span style="font-size:100%;">Ease of use is cited as the key motivator for transitioning to cloud-based applications.</span></li><li><span style="font-size:100%;">Although price is mentioned as a key deterrent for respondents who are not yet using cloud-based apps, value is cited as a key benefit by respondents who already work in the cloud. </span></li></ul> <span style="font-family: arial;font-size:100%;" >In these findings &#8211; and in our conversations with businesses of all types and sizes &#8211; we are seeing that more and more businesses are finding enhanced productivity and IT efficiency when they move their applications to the cloud with services such as <u>Postini </u>or <u>Google Apps</u>. That the cloud movement is more than just a trend is validated by our research findings, which indicate that 50% of the respondents who were aware of but <span style="background-color: rgb(255, 255, 255);">not</span> currently using cloud-based apps are planning to deploy a cloud solution within the next 12 months. </span><div style="font-family: arial;"><span style="font-size:100%;"><br /></span></div><div style="font-family: arial;"><span style="font-size:100%;">Read more about how your organization (or business) might benefit from the research in the <u><a title="Communication Intelligence Report" target="_blank" href="//www.google.com/postini/pdf/cir2009_wp.pdf" id="ao_-">Communication Intelligence Report</a></u>.<br /><br />Posted by Adam Swidler, Google Postini Services team<br /></span> </div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/10/research-finds-that-it-departments-are.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Research finds that IT departments are thinking in the cloud&url=https://cloud.googleblog.com/2009/10/research-finds-that-it-departments-are.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/10/research-finds-that-it-departments-are.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='2' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/10/research-finds-that-it-departments-are.html?hl=en' data-url='https://cloud.googleblog.com/2009/10/research-finds-that-it-departments-are.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/10/research-finds-that-it-departments-are.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/cloud%20computing?hl=en' rel='tag'> cloud computing </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/switch?hl=en' rel='tag'> switch </a> </span> </div> </div> </div> <div class='post' data-id='2086247892166358555' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html?hl=en' itemprop='url' title='Q3&#39;09 Spam &amp; Virus Trends from Postini'> Q3&#39;09 Spam &amp; Virus Trends from Postini </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Thursday, October 1, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style=";font-family:arial;font-size:100%;" ><b></b><i><span style="background-color: rgb(244, 204, 204);"><span style="background-color: rgb(255, 255, 255);"><span style="font-weight: bold;">Editor's note: </span>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email connections per day in the course of providing email security to more than 50,000 businesses and 15 million business users. </span></span></i><b><br /></b><br /> Back in 2007, we saw the first variants of a big virus attack later labeled the "Storm" virus. During that summer, Storm attacked with<span style="background-color: rgb(255, 255, 255);"> force, pushing payload spam activity to then-unprecedented levels and sustaining them for several months. The security community eventually caught up, and payload spam activity fell to nominal levels and held there. That is, until this year: Q2'09 saw a significant surge in payload spam activity, and now</span> Q3'09 levels have made the 2007 Storm virus attack look small in comparison. Postini data centers have blocked more than 100 million viruses every day during what has so far been the height of the attack.<br /><br /></span><span style=";font-family:arial;font-size:100%;" ><div id="nh_p" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="u4-g"> <img src="https://docs.google.com/a/google.com/File?id=d68vshw_5g2pgm2m9_b" style="width: 524px; height: 358px;" /> </div> <br /></div> The majority (55%) of these viruses are messages like the one you see below, a fake notice of underreported income from the IRS (<span style="background-color: rgb(255, 255, 255);"><a href="http://www.us-cert.gov/current/#malicious_code_spreading_via_irs" id="a3sf" title="which the IRS distributed an alert on earlier this week">which the IRS distributed an alert on earlier this week</a></span>). Another large contingent (33%) have come in the form of fake package tracking attachments, which were already on the rise in Q2. <span style="background-color: rgb(255, 255, 255);">You might think a spoofed IRS notice or package tracking email is obviously spam, and wonder who would fall for it and actually click on the attachment.<br /><br />However, at these volumes, it takes only a tiny fraction of the recipients being fooled for the spammers to add hundreds of computers to their botnets every day.</span> </span> <div style="font-family:arial;"> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"><div id="ws21" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_4dzqbtdwn_b" style="width: 523px; height: 305px;" /></span></div> </div> <div id="furf" style="text-align: left;"> </div> <span style="font-size:100%;"><br /><b>ISP takedowns continue, overall spam levels steady</b><br /><br /><span style="background-color: rgb(255, 255, 255);"><span style="background-color: rgb(255, 255, 255);">Last quarter we saw a temporary 30% drop in overall spam levels following the <a href="http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html" id="f8xt" target="_blank" title="3FN ISP takedown">3FN ISP takedown</a>, and the ISP takedown trend continues into Q3 with a new culprit called Real Host, a large Latvia-based ISP that was </span><a href="http://www.networkworld.com/news/2009/080509-after-links-to-cybercrime-latvian.html" id="ff-q" target="_blank" title="disconnected">disconnected</a> by upstream providers on August 1. This takedown didn't have the same drastic effects of McColo (last November<span style="background-color: rgb(255, 255, 255);">), but it was comparable to 3FN. Ultimately, the </span>effects of the Real Host takedown lasted only two days, with an initial 30% drop in spam followed by a quick resurgence. </span></span> </div> <div style="font-family:arial;"> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"> <span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Overall, spam levels remained steady this quarter, with little growth or decline since the Real Host incident. In Q3, spam as a percentage of total message volume is hovering around 90%, down from the Q2 average of around 95%. <span style="background-color: rgb(255, 255, 255);">Q3'09 average spam levels were down 8% from Q2'09 and on par with levels in Q3'08. Spam levels also saw smaller ups and downs than in previous quarters. </span></span><br /><br /></span> <div style="text-align: center;"><div style="text-align: center;"> </div><div id="r6kh" style="text-align: left;"><div style="text-align: center;"> </div><div id="d19b" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_18gtjk4bhk_b" style="width: 524px; height: 358px;" /></span></div> </div> </div> </div> <span style="font-size:100%;"><b> <div style="text-align: left;"> <span style="font-weight: normal;"><br /> </span> </div> </b></span> <div> <span style="font-size:100%;"><b>Older spam techniques driving message size up<br /><br /> </b>Last quarter we reported on the trend toward larger message sizes, measured in bytes. The trend has continued into this quarter, making 2009 a year of resurgence in old techniques such as image spam and payload viruses<span style="background-color: rgb(255, 255, 255);">. </span>When considering the spam bytes processed per user, growth has been steep in 2009, with Q3'09 rates up 123% from Q3'08.<br /><br />Organizations that process spam inside their network should pay attention to this trend. The larger sizes create a bandwidth burden that can impact speed across your network. As the chart shows, Q2'09 delivered the record high to date for spam size &#8211; and subsequently for bandwidth drag for teams that manage spam in-house, potentially forcing those organizations to upgrade their capacity limits.<br /><br /> </span> <div id="l15t" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_21nq6sqmdx_b" style="width: 524px; height: 359px;" /></span></div> </div> <div> <span style="font-size:100%;"><b><br /> </b><b>Best practices to optimize your enterprise spam filter</b><br /> <br />A common piece of feedback we get from our customers is that many of the messages in their spam folder or quarantine seem to come from "them" &#8211; from what appear to be valid email addresses from their own domain. These email addresses are actually spoofed (a common technique to mask the real origins of a message), and spammers employ this technique to take advantage of a mistake organizations sometimes make in configuring their spam filters: adding their own domain to their approved sender list.<br /><br />While this might seem like a good idea at first glance &#8211; we want to make sure we don't block email from our colleagues, right? &#8211; in practice all it does is open your organization up to spoofed email. With that in mind, we strongly recommend that organizations not add their own domains to their approved sender lists. (Don't worry &#8211; legitimate mail from within your domain is correctly identified by filters and generally gets through just fine.) <b><br /> <br /> </b>For more information on how Google email security services, powered by Postini, can help your organization provide better spam protection and take a load off your network by halting spam in the cloud, visit<b><b> <a href="//www.google.com/postini" id="ar5o" title="www.google.com/postini">www.google.com/postini</a>.<br /> </b><b><br /> </b></b> Posted by Adam Swidler, Google Postini Services team </span></div></div></div> </script> <noscript> <span style=";font-family:arial;font-size:100%;" ><b></b><i><span style="background-color: rgb(244, 204, 204);"><span style="background-color: rgb(255, 255, 255);"><span style="font-weight: bold;">Editor's note: </span>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email connections per day in the course of providing email security to more than 50,000 businesses and 15 million business users. </span></span></i><b><br /></b><br /> Back in 2007, we saw the first variants of a big virus attack later labeled the "Storm" virus. During that summer, Storm attacked with<span style="background-color: rgb(255, 255, 255);"> force, pushing payload spam activity to then-unprecedented levels and sustaining them for several months. The security community eventually caught up, and payload spam activity fell to nominal levels and held there. That is, until this year: Q2'09 saw a significant surge in payload spam activity, and now</span> Q3'09 levels have made the 2007 Storm virus attack look small in comparison. Postini data centers have blocked more than 100 million viruses every day during what has so far been the height of the attack.<br /><br /></span><span style=";font-family:arial;font-size:100%;" ><div id="nh_p" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="u4-g"> <img src="https://docs.google.com/a/google.com/File?id=d68vshw_5g2pgm2m9_b" style="width: 524px; height: 358px;" /> </div> <br /></div> The majority (55%) of these viruses are messages like the one you see below, a fake notice of underreported income from the IRS (<span style="background-color: rgb(255, 255, 255);"><a href="http://www.us-cert.gov/current/#malicious_code_spreading_via_irs" id="a3sf" title="which the IRS distributed an alert on earlier this week">which the IRS distributed an alert on earlier this week</a></span>). Another large contingent (33%) have come in the form of fake package tracking attachments, which were already on the rise in Q2. <span style="background-color: rgb(255, 255, 255);">You might think a spoofed IRS notice or package tracking email is obviously spam, and wonder who would fall for it and actually click on the attachment.<br /><br />However, at these volumes, it takes only a tiny fraction of the recipients being fooled for the spammers to add hundreds of computers to their botnets every day.</span> </span> <div style="font-family:arial;"> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"><div id="ws21" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_4dzqbtdwn_b" style="width: 523px; height: 305px;" /></span></div> </div> <div id="furf" style="text-align: left;"> </div> <span style="font-size:100%;"><br /><b>ISP takedowns continue, overall spam levels steady</b><br /><br /><span style="background-color: rgb(255, 255, 255);"><span style="background-color: rgb(255, 255, 255);">Last quarter we saw a temporary 30% drop in overall spam levels following the <a href="http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html" id="f8xt" target="_blank" title="3FN ISP takedown">3FN ISP takedown</a>, and the ISP takedown trend continues into Q3 with a new culprit called Real Host, a large Latvia-based ISP that was </span><a href="http://www.networkworld.com/news/2009/080509-after-links-to-cybercrime-latvian.html" id="ff-q" target="_blank" title="disconnected">disconnected</a> by upstream providers on August 1. This takedown didn't have the same drastic effects of McColo (last November<span style="background-color: rgb(255, 255, 255);">), but it was comparable to 3FN. Ultimately, the </span>effects of the Real Host takedown lasted only two days, with an initial 30% drop in spam followed by a quick resurgence. </span></span> </div> <div style="font-family:arial;"> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"> <span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Overall, spam levels remained steady this quarter, with little growth or decline since the Real Host incident. In Q3, spam as a percentage of total message volume is hovering around 90%, down from the Q2 average of around 95%. <span style="background-color: rgb(255, 255, 255);">Q3'09 average spam levels were down 8% from Q2'09 and on par with levels in Q3'08. Spam levels also saw smaller ups and downs than in previous quarters. </span></span><br /><br /></span> <div style="text-align: center;"><div style="text-align: center;"> </div><div id="r6kh" style="text-align: left;"><div style="text-align: center;"> </div><div id="d19b" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_18gtjk4bhk_b" style="width: 524px; height: 358px;" /></span></div> </div> </div> </div> <span style="font-size:100%;"><b> <div style="text-align: left;"> <span style="font-weight: normal;"><br /> </span> </div> </b></span> <div> <span style="font-size:100%;"><b>Older spam techniques driving message size up<br /><br /> </b>Last quarter we reported on the trend toward larger message sizes, measured in bytes. The trend has continued into this quarter, making 2009 a year of resurgence in old techniques such as image spam and payload viruses<span style="background-color: rgb(255, 255, 255);">. </span>When considering the spam bytes processed per user, growth has been steep in 2009, with Q3'09 rates up 123% from Q3'08.<br /><br />Organizations that process spam inside their network should pay attention to this trend. The larger sizes create a bandwidth burden that can impact speed across your network. As the chart shows, Q2'09 delivered the record high to date for spam size &#8211; and subsequently for bandwidth drag for teams that manage spam in-house, potentially forcing those organizations to upgrade their capacity limits.<br /><br /> </span> <div id="l15t" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_21nq6sqmdx_b" style="width: 524px; height: 359px;" /></span></div> </div> <div> <span style="font-size:100%;"><b><br /> </b><b>Best practices to optimize your enterprise spam filter</b><br /> <br />A common piece of feedback we get from our customers is that many of the messages in their spam folder or quarantine seem to come from "them" &#8211; from what appear to be valid email addresses from their own domain. These email addresses are actually spoofed (a common technique to mask the real origins of a message), and spammers employ this technique to take advantage of a mistake organizations sometimes make in configuring their spam filters: adding their own domain to their approved sender list.<br /><br />While this might seem like a good idea at first glance &#8211; we want to make sure we don't block email from our colleagues, right? &#8211; in practice all it does is open your organization up to spoofed email. With that in mind, we strongly recommend that organizations not add their own domains to their approved sender lists. (Don't worry &#8211; legitimate mail from within your domain is correctly identified by filters and generally gets through just fine.) <b><br /> <br /> </b>For more information on how Google email security services, powered by Postini, can help your organization provide better spam protection and take a load off your network by halting spam in the cloud, visit<b><b> <a href="//www.google.com/postini" id="ar5o" title="www.google.com/postini">www.google.com/postini</a>.<br /> </b><b><br /> </b></b> Posted by Adam Swidler, Google Postini Services team </span></div></div></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Q3&#39;09 Spam &amp; Virus Trends from Postini&url=https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='2' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html?hl=en' data-url='https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends?hl=en' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='5281133564081869570' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/09/how-google-tackles-it-security-and-what.html?hl=en' itemprop='url' title='How Google tackles IT security – and what you can learn from it'> How Google tackles IT security &#8211; and what you can learn from it </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Tuesday, September 29, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;">Providers of cloud computing services like Google are equipped to protect millions of users' data every day &#8211; it's core to how we run our business. Our users enjoy our economies of scale at minimal expense. We also employ some of the world's best security experts to help to make sure that your data stays safe.&#8232;<br /></span></p><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;">On October 1, join us for a live <span class="misspell" suggestions="web cast,web-cast,webmaster,website,weakest">webcast</span> with some of our top security experts who are on the front lines of fighting spam, <span class="misspell" suggestions="Malawi,Malorie,malaria,Delaware,Mallorie">malware</span>, and <span class="misspell" suggestions="phis hing,phis-hing,fishing,hushing,poshing">phishing</span> for Google Apps users, designing identity management systems for hosted web apps, and monitoring the Google network for potential threats. Register for this live <span class="misspell" suggestions="web cast,web-cast,webmaster,website,weakest">webc</span><a>ast</a>, </span><span style="font-size:100%;"><a href="http://whitepapers.techrepublic.com.com/webcast.aspx?docid=1140537">&#8220;How Google Tackles IT Security &#8211; and What You Can Learn From It</a>,&#8221; to learn about security in the cloud and get your questions answered by members of <span class="misspell" suggestions="Googly's,Gogol's,Googlies,Goggles,Googled">Google's</span> Security team.</span><span style="font-size:100%;"> Participants include:</span></p><p style="margin-right: 0pt; margin-left: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;"><b>Eran <span class="misspell" suggestions="">Feigenbaum</span></b> &#8211; <span style="font-weight: normal;">As the Director of Security for Google Apps,</span><span style="font-weight: normal;"> </span><span style="font-weight: normal;">Eran <span class="misspell" suggestions="">Feigenbaum</span></span><span style="font-weight: normal;"> </span><span style="font-weight: normal;">defines and implements security strategy for <span class="misspell" suggestions="Googly's,Gogol's,Googlies,Goggles,Googled">Google's</span> suite of solutions for enterprises. Prior to joining Google in 2007,</span><span style="font-weight: normal;"> </span><span style="font-weight: normal;">Eran</span><span style="font-weight: normal;"> </span><span style="font-weight: normal;">was the US Chief Information Security Officer for <span class="misspell" suggestions="">PricewaterhouseCoopers</span>.</span></span></p><span style="font-family: arial;font-family:arial;font-size:100%;" ><b><p style="margin-left: 0pt; margin-right: 0pt;"><b>John Flynn</b> &#8211; <span style="font-weight: normal;">John &#8220;Four&#8221; Flynn has an extensive background in network monitoring, intrusion detection, and incident response. John currently leads <span class="misspell" suggestions="Googly's,Gogol's,Googlies,Goggles,Googled">Google's</span> Security Monitoring program and is a founder of <span class="misspell" suggestions="Googly's,Gogol's,Googlies,Goggles,Googled">Google's</span> Security Metrics group.</span><br /></p><p style="margin-left: 0pt; margin-right: 0pt;">Bradley Taylor<span style="font-weight: normal;"> &#8211; </span><span style="font-weight: normal;" class="misspell" suggestions="Jamil's,Gail's,Mail's,Grail's,Email's">Gmail's</span><span style="font-weight: normal;"> &#8220;Spam Czar,&#8221; Brad Taylor leads </span><span style="font-weight: normal;" class="misspell" suggestions="Jamil's,Gail's,Mail's,Grail's,Email's">Gmail's</span><span style="font-weight: normal;"> technical anti-spam, anti-abuse, and email delivery engineering efforts. Brad has played a key role in the development of </span><span style="font-weight: normal;" class="misspell" suggestions="Jamil's,Gail's,Mail's,Grail's,Email's">Gmail's</span><span style="font-weight: normal;"> spam filter since Gmail launched in April, 2004.</span></p></b></span><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;"><b>Eric Sachs</b> &#8211; Eric Sachs has over 15 years of experience with user identity and security for hosted web applications. During his years at Google, he has worked as a Product Manager for many services including Google Accounts, Google Apps, orkut, Google Health, Google Security, and Internal Systems. </span></p><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;">While circumstances may vary, most IT departments face similar security challenges. Find out more from the people who confront these issues every day here at Google.<br /></span></p><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;"><a href="http://whitepapers.techrepublic.com.com/webcast.aspx?docid=1140537">Join us for our live webcast</a> to learn about the people, best practices, and technologies that we have in place to minimize security threats.<br /><br /></span><span style="font-size:100%;"><span><span><a href="http://whitepapers.techrepublic.com.com/webcast.aspx?docid=1140537">How Google Tackles IT Security &#8211; and What You Can Learn From It</a></span></span><br />Thursday, October 1, 2009<br />11:00 a.m. PDT / 2:00 p.m. EDT / 6:00 p.m. GMT </span></p><span style="font-family: arial;font-family:arial;font-size:100%;" ></span><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;"><span class="Apple-style-span" style="font-size:100%;">We hope to see you there.</span></p><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;">Posted by Serena <span class="misspell" suggestions="Satyrs,Stasis,Stayers,Stays,Katya's">Satyasai</span>, Google Apps team</span></p><div style="font-family: arial;font-family:arial;" ><span style="font-size:100%;"><span style="font-size:100%;"><span style="font-size:100%;"><span class="Apple-style-span" style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Find customer stories and product information on our resource sites for current users of </span><span style="background-color: rgb(255, 255, 255);"><a href="//www.google.com/apps/exchange#utm_campaign=exchange&amp;utm_medium=blog&amp;utm_source=en-blog-na-us-exchange_footer" id="b0_a" title="Microsoft Exchange">Microsoft Exchange</a> and <a href="//www.google.com/apps/notes#utm_campaign=lotus&amp;utm_medium=blog&amp;utm_source=en-blog-na-us-lotus_footer" id="sn_g" title="Lotus Notes/Domino">Lotus Notes/Domino</a>. </span></span></span></span></span></div> </script> <noscript> <p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;">Providers of cloud computing services like Google are equipped to protect millions of users' data every day &#8211; it's core to how we run our business. Our users enjoy our economies of scale at minimal expense. We also employ some of the world's best security experts to help to make sure that your data stays safe.&#8232;<br /></span></p><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;">On October 1, join us for a live <span class="misspell" suggestions="web cast,web-cast,webmaster,website,weakest">webcast</span> with some of our top security experts who are on the front lines of fighting spam, <span class="misspell" suggestions="Malawi,Malorie,malaria,Delaware,Mallorie">malware</span>, and <span class="misspell" suggestions="phis hing,phis-hing,fishing,hushing,poshing">phishing</span> for Google Apps users, designing identity management systems for hosted web apps, and monitoring the Google network for potential threats. Register for this live <span class="misspell" suggestions="web cast,web-cast,webmaster,website,weakest">webc</span><a>ast</a>, </span><span style="font-size:100%;"><a href="http://whitepapers.techrepublic.com.com/webcast.aspx?docid=1140537">&#8220;How Google Tackles IT Security &#8211; and What You Can Learn From It</a>,&#8221; to learn about security in the cloud and get your questions answered by members of <span class="misspell" suggestions="Googly's,Gogol's,Googlies,Goggles,Googled">Google's</span> Security team.</span><span style="font-size:100%;"> Participants include:</span></p><p style="margin-right: 0pt; margin-left: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;"><b>Eran <span class="misspell" suggestions="">Feigenbaum</span></b> &#8211; <span style="font-weight: normal;">As the Director of Security for Google Apps,</span><span style="font-weight: normal;"> </span><span style="font-weight: normal;">Eran <span class="misspell" suggestions="">Feigenbaum</span></span><span style="font-weight: normal;"> </span><span style="font-weight: normal;">defines and implements security strategy for <span class="misspell" suggestions="Googly's,Gogol's,Googlies,Goggles,Googled">Google's</span> suite of solutions for enterprises. Prior to joining Google in 2007,</span><span style="font-weight: normal;"> </span><span style="font-weight: normal;">Eran</span><span style="font-weight: normal;"> </span><span style="font-weight: normal;">was the US Chief Information Security Officer for <span class="misspell" suggestions="">PricewaterhouseCoopers</span>.</span></span></p><span style="font-family: arial;font-family:arial;font-size:100%;" ><b><p style="margin-left: 0pt; margin-right: 0pt;"><b>John Flynn</b> &#8211; <span style="font-weight: normal;">John &#8220;Four&#8221; Flynn has an extensive background in network monitoring, intrusion detection, and incident response. John currently leads <span class="misspell" suggestions="Googly's,Gogol's,Googlies,Goggles,Googled">Google's</span> Security Monitoring program and is a founder of <span class="misspell" suggestions="Googly's,Gogol's,Googlies,Goggles,Googled">Google's</span> Security Metrics group.</span><br /></p><p style="margin-left: 0pt; margin-right: 0pt;">Bradley Taylor<span style="font-weight: normal;"> &#8211; </span><span style="font-weight: normal;" class="misspell" suggestions="Jamil's,Gail's,Mail's,Grail's,Email's">Gmail's</span><span style="font-weight: normal;"> &#8220;Spam Czar,&#8221; Brad Taylor leads </span><span style="font-weight: normal;" class="misspell" suggestions="Jamil's,Gail's,Mail's,Grail's,Email's">Gmail's</span><span style="font-weight: normal;"> technical anti-spam, anti-abuse, and email delivery engineering efforts. Brad has played a key role in the development of </span><span style="font-weight: normal;" class="misspell" suggestions="Jamil's,Gail's,Mail's,Grail's,Email's">Gmail's</span><span style="font-weight: normal;"> spam filter since Gmail launched in April, 2004.</span></p></b></span><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;"><b>Eric Sachs</b> &#8211; Eric Sachs has over 15 years of experience with user identity and security for hosted web applications. During his years at Google, he has worked as a Product Manager for many services including Google Accounts, Google Apps, orkut, Google Health, Google Security, and Internal Systems. </span></p><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;">While circumstances may vary, most IT departments face similar security challenges. Find out more from the people who confront these issues every day here at Google.<br /></span></p><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;"><a href="http://whitepapers.techrepublic.com.com/webcast.aspx?docid=1140537">Join us for our live webcast</a> to learn about the people, best practices, and technologies that we have in place to minimize security threats.<br /><br /></span><span style="font-size:100%;"><span><span><a href="http://whitepapers.techrepublic.com.com/webcast.aspx?docid=1140537">How Google Tackles IT Security &#8211; and What You Can Learn From It</a></span></span><br />Thursday, October 1, 2009<br />11:00 a.m. PDT / 2:00 p.m. EDT / 6:00 p.m. GMT </span></p><span style="font-family: arial;font-family:arial;font-size:100%;" ></span><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;"><span class="Apple-style-span" style="font-size:100%;">We hope to see you there.</span></p><p style="margin-left: 0pt; margin-right: 0pt; font-family: arial;font-family:arial;"><span style="font-size:100%;">Posted by Serena <span class="misspell" suggestions="Satyrs,Stasis,Stayers,Stays,Katya's">Satyasai</span>, Google Apps team</span></p><div style="font-family: arial;font-family:arial;" ><span style="font-size:100%;"><span style="font-size:100%;"><span style="font-size:100%;"><span class="Apple-style-span" style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Find customer stories and product information on our resource sites for current users of </span><span style="background-color: rgb(255, 255, 255);"><a href="//www.google.com/apps/exchange#utm_campaign=exchange&amp;utm_medium=blog&amp;utm_source=en-blog-na-us-exchange_footer" id="b0_a" title="Microsoft Exchange">Microsoft Exchange</a> and <a href="//www.google.com/apps/notes#utm_campaign=lotus&amp;utm_medium=blog&amp;utm_source=en-blog-na-us-lotus_footer" id="sn_g" title="Lotus Notes/Domino">Lotus Notes/Domino</a>. </span></span></span></span></span></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/09/how-google-tackles-it-security-and-what.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:How Google tackles IT security – and what you can learn from it&url=https://cloud.googleblog.com/2009/09/how-google-tackles-it-security-and-what.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/09/how-google-tackles-it-security-and-what.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='6' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/09/how-google-tackles-it-security-and-what.html?hl=en' data-url='https://cloud.googleblog.com/2009/09/how-google-tackles-it-security-and-what.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/09/how-google-tackles-it-security-and-what.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/cloud%20computing?hl=en' rel='tag'> cloud computing </a> , <a class='label' href='https://cloud.googleblog.com/search/label/enterprise?hl=en' rel='tag'> enterprise </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Apps?hl=en' rel='tag'> Google Apps </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/large%20business?hl=en' rel='tag'> large business </a> , <a class='label' href='https://cloud.googleblog.com/search/label/medium%20business?hl=en' rel='tag'> medium business </a> , <a class='label' href='https://cloud.googleblog.com/search/label/small%20business?hl=en' rel='tag'> small business </a> , <a class='label' href='https://cloud.googleblog.com/search/label/webinar?hl=en' rel='tag'> webinar </a> </span> </div> </div> </div> <div class='post' data-id='1275121112555465549' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html?hl=en' itemprop='url' title='Q2 2009 Spam Trends'> Q2 2009 Spam Trends </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, July 1, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div style="font-family:arial;"> <span style="font-size:100%;"><i><span style="background-color: rgb(255, 255, 255);"><span style="font-weight: bold;">Editor's Note: </span>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which provide email security to more than 50,000 organizations, including businesses of all sizes, government agencies, and educational institutions. To learn more about what the Gmail team is doing to keep spam out of your inboxes, check out <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html"><span class="Apple-style-span" style="color: rgb(0, 0, 255);">this post</span></a>. </span></i></span> </div> <span style=";font-family:arial;font-size:100%;" ><br /><a href="http://googleenterprise.blogspot.com/2009/03/spam-data-and-trends-q1-2009.html" id="e5qm" style="background-color: rgb(255, 255, 255);" target="_blank" title="Our update last quarter">Our "Spam Trend" update last quarter</a><span style="background-color: rgb(255, 255, 255);"> summarized the rise in both levels and types of spam, with new players and techniques entering the market. This quarter, proliferation continues, with an unpredictable pattern of drops and spikes as 2009 moves along. Overall, spam is measurably up: Q2'09 average spam levels are 53% higher than in Q1'09 and 6% higher than in Q2'08.</span><br /></span><div style="font-family:arial;"><span style="font-size:100%;"><br /><span style="background-color: rgb(255, 255, 255);">After last November's McColo ISP takedown, when spam volumes dropped by 70%, spammers worked overtime to fill the void. They succeeded: Within four months, spam levels rose back to pre-McColo levels. This upward trend continued through June 4, when another large ISP spam source, 3FN, <a href="http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html" id="o-st" title="was reported to have been dismantled">was reported to have been dismantled</a>. Spam volume immediately dropped 30% &#8211; not as extreme as McColo, but still significant. Although this created a sudden dip in spam levels, it also created an open invitation for opportunistic spammers to once again seize a market opportunity.<br /><br />Over the coming months, we anticipate watching new players once again drive spam levels back up. Since June 4, spammers have already made up a significant amount of ground, climbing 14% from the initial drop.<br /> <br />Here's what the trend looked like, as tracked through Postini filters, over the past six months:<br /><br /> </span><span style="background-color: rgb(255, 255, 255);"><div id="ry0r" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="qgkd"> <img src="https://docs.google.com/a/google.com/File?id=d68vshw_693gfvdr8ds_b" style="width: 520px; height: 355px;" /> </div> </div> <br />"Unpredictability" summarizes the overall trend as <span style="background-color: rgb(255, 255, 255);">Q2'09</span> winds down and spammers test both new and "retro" techniques. For example, on June 18 we tracked a new attack that unleashed 50% of a typical day's spam volume in just two hours' time. This attack used a simple "newsletter" template &#8211; somewhat "old school" by today's spam standard &#8211; with malevolent links and images inserted into the content. Google's Postini filters detected more than 11,000 variants of this spam during those two hours. Because this spam enabled spoofing of the recipient domain <span style="background-color: rgb(255, 255, 255);">(meaning the "from" field was falsified)</span>, distribution lists were especially hard-hit by this attack.</span></span> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"> <div id="t8-d"> <span style="font-size:100%;"><br /></span> </div> <span style="font-size:100%;"><b>Resurgence of image spam<br /> <br /> </b>One of the other trends we're watching closely is the sudden popularity of "image spam"<span style="background-color: rgb(255, 255, 255);"> &#8211; </span>a form of spam that rose to prominence in 2007, before most anti-spam filters learned how to block it. It's simple stuff: basic email with advertising content, usually containing a related image. They can also include malicious links or content<span style="background-color: rgb(255, 255, 255);"> &#8211; </span>and either way, the large file size of an image spam can place a heavy load on an email network.<br /><br />An image spam email might look something like this:<br /><br /></span> <div id="ejfy" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_696fmnv2kmw_b" style="width: 520px; height: 410px;" /><br /></span></div> <span style="font-size:100%;"><br /></span> </div> </div> <span style=";font-family:Trebuchet MS;font-size:100%;" >Evidence of<span style="background-color: rgb(255, 255, 255);"> the resurgence in image spam can be seen in the graph below, which shows that the actual size of spam messages, measured in bytes, is back on the rise:</span><br /> <br /> </span> <div id="lz9n" style="text-align: left; font-family: arial;"><div style="text-align: center;"> </div><div id="el2-" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="om23"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_694gpjw5xfr_b" style="width: 520px; height: 356px;" /></span> </div> <span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);"><br />There are a couple of possible explanations for the resurgence in image spam, despite the fact that most spam filters out there have adapted to the technique. One theory is that this wave is designed to test the defenses</span> of the different spam filters out there, so that spammers can do statistical analysis on what subject lines and content have the highest probability of success.<br /><br />Another is that there may be some new players entering the spam game, following the McColo and 3FN takedowns, and these new players are opening with some well-tested techniques. Either way, we're watching this trend and will share insights as we gain them in the weeks and months ahead.<br /><br /></span> <div id="rk54" style="text-align: left;"> <span style="font-size:100%;"><b>Spike in payload viruses</b></span> </div> <div id="qzym" style="text-align: left;"> <span style="font-size:100%;"><br /></span> </div> <span style="font-size:100%;">June was also an active month for viruses sent as email attachments, otherwise known as "payload viruses." Volumes rose to their highest level in almost two years as spammers returned to yet another tried-and-true technique to expand their <a href="http://en.wikipedia.org/wiki/Botnet" id="i7sx" title="botnets">botnets</a>.<br /><br />As you can see in the chart below, June's activity is almost as high as the two-month payload virus surge seen in Q3'07. Fortunately, Google's Postini zero-hour heuristics detected this uprise early and kept payload attacks in the cloud and away from users' email networks. </span> <div id="tnmj" style="text-align: left;"> <div id="j_5x" style="text-align: left;"> <span style="font-size:100%;"><br /></span> <div id="zp9j" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="w9:j"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_698ctj4fgfp_b" style="width: 520px; height: 355px;" /></span> </div> </div> </div> <div id="xttd" style="text-align: left;"> <span style="font-size:100%;"><br /><b>Everything old might be new again</b><br /><br />In summary, <span style="background-color: rgb(255, 255, 255);">Q2'09</span> saw continued unpredictability and the resurgence of old-style spam attacks. Are spammers finally running out of original ideas? And if so, like Hollywood, are we now starting to see spam "remakes," based on originals of a few years ago? And what are spammers looking to accomplish as they unleash these remakes? Only time will tell. </span> </div> <div id="tvhu" style="text-align: left;"> <span style="font-size:100%;"><br /></span> </div> <div id="iht_" style="text-align: left;"><span style="font-size:100%;"> For more information on how Google email security services, powered by Postini, can help your organization provide better spam protection and take a load off your network by halting spam in the cloud, visit <a href="//www.google.com/postini" id="qvqb" title="www.google.com/postini">www.google.com/postini</a>.<br /><br /></span><div> <span style="font-size:100%;">Posted by Amanda Kleha, </span><span style="font-size:100%;">Google message security and archiving team </span> </div> <span style="font-size:100%;"><br /></span></div> </div> </div> </div> </script> <noscript> <div style="font-family:arial;"> <span style="font-size:100%;"><i><span style="background-color: rgb(255, 255, 255);"><span style="font-weight: bold;">Editor's Note: </span>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which provide email security to more than 50,000 organizations, including businesses of all sizes, government agencies, and educational institutions. To learn more about what the Gmail team is doing to keep spam out of your inboxes, check out <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html"><span class="Apple-style-span" style="color: rgb(0, 0, 255);">this post</span></a>. </span></i></span> </div> <span style=";font-family:arial;font-size:100%;" ><br /><a href="http://googleenterprise.blogspot.com/2009/03/spam-data-and-trends-q1-2009.html" id="e5qm" style="background-color: rgb(255, 255, 255);" target="_blank" title="Our update last quarter">Our "Spam Trend" update last quarter</a><span style="background-color: rgb(255, 255, 255);"> summarized the rise in both levels and types of spam, with new players and techniques entering the market. This quarter, proliferation continues, with an unpredictable pattern of drops and spikes as 2009 moves along. Overall, spam is measurably up: Q2'09 average spam levels are 53% higher than in Q1'09 and 6% higher than in Q2'08.</span><br /></span><div style="font-family:arial;"><span style="font-size:100%;"><br /><span style="background-color: rgb(255, 255, 255);">After last November's McColo ISP takedown, when spam volumes dropped by 70%, spammers worked overtime to fill the void. They succeeded: Within four months, spam levels rose back to pre-McColo levels. This upward trend continued through June 4, when another large ISP spam source, 3FN, <a href="http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html" id="o-st" title="was reported to have been dismantled">was reported to have been dismantled</a>. Spam volume immediately dropped 30% &#8211; not as extreme as McColo, but still significant. Although this created a sudden dip in spam levels, it also created an open invitation for opportunistic spammers to once again seize a market opportunity.<br /><br />Over the coming months, we anticipate watching new players once again drive spam levels back up. Since June 4, spammers have already made up a significant amount of ground, climbing 14% from the initial drop.<br /> <br />Here's what the trend looked like, as tracked through Postini filters, over the past six months:<br /><br /> </span><span style="background-color: rgb(255, 255, 255);"><div id="ry0r" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="qgkd"> <img src="https://docs.google.com/a/google.com/File?id=d68vshw_693gfvdr8ds_b" style="width: 520px; height: 355px;" /> </div> </div> <br />"Unpredictability" summarizes the overall trend as <span style="background-color: rgb(255, 255, 255);">Q2'09</span> winds down and spammers test both new and "retro" techniques. For example, on June 18 we tracked a new attack that unleashed 50% of a typical day's spam volume in just two hours' time. This attack used a simple "newsletter" template &#8211; somewhat "old school" by today's spam standard &#8211; with malevolent links and images inserted into the content. Google's Postini filters detected more than 11,000 variants of this spam during those two hours. Because this spam enabled spoofing of the recipient domain <span style="background-color: rgb(255, 255, 255);">(meaning the "from" field was falsified)</span>, distribution lists were especially hard-hit by this attack.</span></span> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"> <div id="t8-d"> <span style="font-size:100%;"><br /></span> </div> <span style="font-size:100%;"><b>Resurgence of image spam<br /> <br /> </b>One of the other trends we're watching closely is the sudden popularity of "image spam"<span style="background-color: rgb(255, 255, 255);"> &#8211; </span>a form of spam that rose to prominence in 2007, before most anti-spam filters learned how to block it. It's simple stuff: basic email with advertising content, usually containing a related image. They can also include malicious links or content<span style="background-color: rgb(255, 255, 255);"> &#8211; </span>and either way, the large file size of an image spam can place a heavy load on an email network.<br /><br />An image spam email might look something like this:<br /><br /></span> <div id="ejfy" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_696fmnv2kmw_b" style="width: 520px; height: 410px;" /><br /></span></div> <span style="font-size:100%;"><br /></span> </div> </div> <span style=";font-family:Trebuchet MS;font-size:100%;" >Evidence of<span style="background-color: rgb(255, 255, 255);"> the resurgence in image spam can be seen in the graph below, which shows that the actual size of spam messages, measured in bytes, is back on the rise:</span><br /> <br /> </span> <div id="lz9n" style="text-align: left; font-family: arial;"><div style="text-align: center;"> </div><div id="el2-" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="om23"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_694gpjw5xfr_b" style="width: 520px; height: 356px;" /></span> </div> <span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);"><br />There are a couple of possible explanations for the resurgence in image spam, despite the fact that most spam filters out there have adapted to the technique. One theory is that this wave is designed to test the defenses</span> of the different spam filters out there, so that spammers can do statistical analysis on what subject lines and content have the highest probability of success.<br /><br />Another is that there may be some new players entering the spam game, following the McColo and 3FN takedowns, and these new players are opening with some well-tested techniques. Either way, we're watching this trend and will share insights as we gain them in the weeks and months ahead.<br /><br /></span> <div id="rk54" style="text-align: left;"> <span style="font-size:100%;"><b>Spike in payload viruses</b></span> </div> <div id="qzym" style="text-align: left;"> <span style="font-size:100%;"><br /></span> </div> <span style="font-size:100%;">June was also an active month for viruses sent as email attachments, otherwise known as "payload viruses." Volumes rose to their highest level in almost two years as spammers returned to yet another tried-and-true technique to expand their <a href="http://en.wikipedia.org/wiki/Botnet" id="i7sx" title="botnets">botnets</a>.<br /><br />As you can see in the chart below, June's activity is almost as high as the two-month payload virus surge seen in Q3'07. Fortunately, Google's Postini zero-hour heuristics detected this uprise early and kept payload attacks in the cloud and away from users' email networks. </span> <div id="tnmj" style="text-align: left;"> <div id="j_5x" style="text-align: left;"> <span style="font-size:100%;"><br /></span> <div id="zp9j" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="w9:j"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_698ctj4fgfp_b" style="width: 520px; height: 355px;" /></span> </div> </div> </div> <div id="xttd" style="text-align: left;"> <span style="font-size:100%;"><br /><b>Everything old might be new again</b><br /><br />In summary, <span style="background-color: rgb(255, 255, 255);">Q2'09</span> saw continued unpredictability and the resurgence of old-style spam attacks. Are spammers finally running out of original ideas? And if so, like Hollywood, are we now starting to see spam "remakes," based on originals of a few years ago? And what are spammers looking to accomplish as they unleash these remakes? Only time will tell. </span> </div> <div id="tvhu" style="text-align: left;"> <span style="font-size:100%;"><br /></span> </div> <div id="iht_" style="text-align: left;"><span style="font-size:100%;"> For more information on how Google email security services, powered by Postini, can help your organization provide better spam protection and take a load off your network by halting spam in the cloud, visit <a href="//www.google.com/postini" id="qvqb" title="www.google.com/postini">www.google.com/postini</a>.<br /><br /></span><div> <span style="font-size:100%;">Posted by Amanda Kleha, </span><span style="font-size:100%;">Google message security and archiving team </span> </div> <span style="font-size:100%;"><br /></span></div> </div> </div> </div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Q2 2009 Spam Trends&url=https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='22' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html?hl=en' data-url='https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/admin?hl=en' rel='tag'> admin </a> , <a class='label' href='https://cloud.googleblog.com/search/label/enterprise?hl=en' rel='tag'> enterprise </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Apps?hl=en' rel='tag'> Google Apps </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/hints%20and%20tips?hl=en' rel='tag'> hints and tips </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends?hl=en' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='6258034412174219535' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/04/in-cloud-we-trust.html?hl=en' itemprop='url' title='In Cloud We Trust'> In Cloud We Trust </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Monday, April 6, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style=";font-family:arial;font-size:100%;" ><i style="font-family: Arial;">Editor's Note: There's never dull moment in the world of online security. Threat patterns evolve in volume, sophistication, and the types of exploits and sources. News about the recent <a title="the Conficker virus" href="http://en.wikipedia.org/wiki/Conficker" id="lbxy"><span class="misspell">Conficker</span> virus</a> got us talking with Scott <span class="misspell">Petry</span>, founder of <a title="Postini (original developers of Google&#39;s suite of security and archiving services)" href="//google.com/postini" id="g3:8"><span class="misspell">Postini</span> (original developers of <span class="misspell">Google's</span> suite of security and archiving services)</a>, and Wolfgang <span class="misspell">Kadek</span>, <span class="misspell">CTO</span> of <span id="bad_word" class="misspell"><a title="Qualys" href="http://www.qualys.com/index.php" id="qvoi">Qualys</a></span>. Their comments follow. To learn more about trends in spam, hacking, and ways of keeping email networks safe, <a title="join Google and Qualys in an on-line conversation, &quot;In Cloud We Trust,&quot; on April 16" href="http://events.qualys.com/content/20090416_CIO_Webcast?leadsource=225597" id="n.nn">join Google and <span class="misspell">Qualys</span> in an on-line conversation, "In Cloud We Trust," on April 16</a>, where we'll discuss these topics live.<br /><br /></i><i style="font-family:Arial;"><b>Q: Ten years ago, packaged software was the norm. Yet <span class="misspell">Postini</span> built a hosted service - what we today call cloud computing. Why did you drive a cloud architecture for <span class="misspell">Postini</span>?<br /><br /></b></i><b>Scott: </b>We believed that by offering a service infrastructure we could prove a lower <span class="misspell">TCO</span> than an on-premise alternative. With that service infrastructure aggregating data, we'd also have insight into a wider sample of data, thus providing a more effective solution.<br /></span><p style="font-family: Arial;"> </p><span style=";font-family:arial;font-size:100%;" ><b>Q: How did the idea of having a "perimeter protection service" to protect email networks in the cloud first evolve? Is the right model for the future?</b><br /><br /><b>Scott: </b><span class="misspell">Postini's</span> innovation was to see SMTP as an integration API and <span class="misspell">DNS</span> as a way to access traffic, thus putting us "upstream" of the customers' infrastructure, alleviating integration challenges and stopping problems before they reached the firewall. We saw this as better for a number of reasons.<br /><br />Email servers have a long shelf life, and customers typically add incrementally to their system, rather than get a complete replacement. This causes a management problem for IT, creating a heterogeneous environment into which they must layer in security and compliance services.<br /><br />We never saw ourselves as just an anti-spam company, so we built infrastructure that allowed a business rule to be configured as tightly as a content string for a single user. This design decision is inherently linked to the cloud. It allows us to deliver a better anti-spam solution, and also expand into content compliance areas.</span><span style=";font-family:arial;font-size:100%;" ><b><br /><br />Q. Wolfgang, you've been keeping a tight watch on the latest vulnerabilities impacting networks worldwide via your Laws of Vulnerabilities research. What are some of the trends you're seeing in 2009?<br /><br /></b></span><span style=";font-family:arial;font-size:100%;" ><b>Wolfgang: </b>Our research into vulnerability trends has shown that the industry overall did not improve significantly its ability to address security problems in a timely manner At the same time attackers have been getting faster and more sophisticated. Proactive security by maintaining systems updated with the latest patches is the cheapest of all security tools, nevertheless it has not grown in the way I would have hoped. </span><span style=";font-family:arial;font-size:100%;" ><br /><br />The first three months of 2009 have been a great example. We've seen <span class="misspell">Conficker</span> infect millions of machines. The simplest way of preventing the outbreak would have been to </span><span style=";font-family:arial;font-size:100%;" ><span class="misspell">preventively</span> </span><span style=";font-family:arial;font-size:100%;" >apply a patch, if available, to stop the worm. But figuring out such patches takes time. In contrast to worms of the past which often gave us months to react, <span class="misspell">Conficker</span> activated only two weeks after the official release of the patch, clearly showing that</span><span style=";font-family:arial;font-size:100%;" > attackers have become faster in their timing. It's getting tougher for patches to keep up.</span><span style=";font-family:arial;font-size:100%;" ><b><br /><br />Q: As network security budgets continue to tighten, how can "security as a service" be advantageous to users?<br /><br /></b></span><span style=";font-family:arial;font-size:100%;" ><span class="misspell"><b>Wolfgang: </b>SaaS</span> solutions have the advantage that they have minimal setup and are immediately usable. Companies can get their feet wet with a small pilot, show success, and then grow it at their own pace to address larger needs. Organizations of any size can take advantage of the functionality and the predictable steady cost of cloud solutions, while at the same time enjoying the usability brought through constant improvements.</span><span style=";font-family:arial;font-size:100%;" ><br /><br /><b>Scott: </b>Agreed. As IT faces more pressure from a changing threat landscape and increased compliance mandates, the cloud model gives maximum leverage to IT &#8211; always important, but especially in this economic climate.<br /></span><p style="font-family:arial;"><span style="font-size:100%;"><a href="http://events.qualys.com/content/20090416_CIO_Webcast?leadsource=225597">Register here for "In Cloud we Trust"<br /></a></span></p><p style="font-family:arial;"><span style="font-size:100%;"><a href="http://events.qualys.com/content/20090416_CIO_Webcast?leadsource=225597">Thursday, April 16, 2009 1:00 p.m. EST / 10:00 a.m. PST</a></span></p> <span style=";font-family:arial;font-size:100%;" class="byline-author" >Posted by Sundar Raghavan, Google security and archiving team</span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" class="byline-author" ></span> </script> <noscript> <span style=";font-family:arial;font-size:100%;" ><i style="font-family: Arial;">Editor's Note: There's never dull moment in the world of online security. Threat patterns evolve in volume, sophistication, and the types of exploits and sources. News about the recent <a title="the Conficker virus" href="http://en.wikipedia.org/wiki/Conficker" id="lbxy"><span class="misspell">Conficker</span> virus</a> got us talking with Scott <span class="misspell">Petry</span>, founder of <a title="Postini (original developers of Google&#39;s suite of security and archiving services)" href="//google.com/postini" id="g3:8"><span class="misspell">Postini</span> (original developers of <span class="misspell">Google's</span> suite of security and archiving services)</a>, and Wolfgang <span class="misspell">Kadek</span>, <span class="misspell">CTO</span> of <span id="bad_word" class="misspell"><a title="Qualys" href="http://www.qualys.com/index.php" id="qvoi">Qualys</a></span>. Their comments follow. To learn more about trends in spam, hacking, and ways of keeping email networks safe, <a title="join Google and Qualys in an on-line conversation, &quot;In Cloud We Trust,&quot; on April 16" href="http://events.qualys.com/content/20090416_CIO_Webcast?leadsource=225597" id="n.nn">join Google and <span class="misspell">Qualys</span> in an on-line conversation, "In Cloud We Trust," on April 16</a>, where we'll discuss these topics live.<br /><br /></i><i style="font-family:Arial;"><b>Q: Ten years ago, packaged software was the norm. Yet <span class="misspell">Postini</span> built a hosted service - what we today call cloud computing. Why did you drive a cloud architecture for <span class="misspell">Postini</span>?<br /><br /></b></i><b>Scott: </b>We believed that by offering a service infrastructure we could prove a lower <span class="misspell">TCO</span> than an on-premise alternative. With that service infrastructure aggregating data, we'd also have insight into a wider sample of data, thus providing a more effective solution.<br /></span><p style="font-family: Arial;"> </p><span style=";font-family:arial;font-size:100%;" ><b>Q: How did the idea of having a "perimeter protection service" to protect email networks in the cloud first evolve? Is the right model for the future?</b><br /><br /><b>Scott: </b><span class="misspell">Postini's</span> innovation was to see SMTP as an integration API and <span class="misspell">DNS</span> as a way to access traffic, thus putting us "upstream" of the customers' infrastructure, alleviating integration challenges and stopping problems before they reached the firewall. We saw this as better for a number of reasons.<br /><br />Email servers have a long shelf life, and customers typically add incrementally to their system, rather than get a complete replacement. This causes a management problem for IT, creating a heterogeneous environment into which they must layer in security and compliance services.<br /><br />We never saw ourselves as just an anti-spam company, so we built infrastructure that allowed a business rule to be configured as tightly as a content string for a single user. This design decision is inherently linked to the cloud. It allows us to deliver a better anti-spam solution, and also expand into content compliance areas.</span><span style=";font-family:arial;font-size:100%;" ><b><br /><br />Q. Wolfgang, you've been keeping a tight watch on the latest vulnerabilities impacting networks worldwide via your Laws of Vulnerabilities research. What are some of the trends you're seeing in 2009?<br /><br /></b></span><span style=";font-family:arial;font-size:100%;" ><b>Wolfgang: </b>Our research into vulnerability trends has shown that the industry overall did not improve significantly its ability to address security problems in a timely manner At the same time attackers have been getting faster and more sophisticated. Proactive security by maintaining systems updated with the latest patches is the cheapest of all security tools, nevertheless it has not grown in the way I would have hoped. </span><span style=";font-family:arial;font-size:100%;" ><br /><br />The first three months of 2009 have been a great example. We've seen <span class="misspell">Conficker</span> infect millions of machines. The simplest way of preventing the outbreak would have been to </span><span style=";font-family:arial;font-size:100%;" ><span class="misspell">preventively</span> </span><span style=";font-family:arial;font-size:100%;" >apply a patch, if available, to stop the worm. But figuring out such patches takes time. In contrast to worms of the past which often gave us months to react, <span class="misspell">Conficker</span> activated only two weeks after the official release of the patch, clearly showing that</span><span style=";font-family:arial;font-size:100%;" > attackers have become faster in their timing. It's getting tougher for patches to keep up.</span><span style=";font-family:arial;font-size:100%;" ><b><br /><br />Q: As network security budgets continue to tighten, how can "security as a service" be advantageous to users?<br /><br /></b></span><span style=";font-family:arial;font-size:100%;" ><span class="misspell"><b>Wolfgang: </b>SaaS</span> solutions have the advantage that they have minimal setup and are immediately usable. Companies can get their feet wet with a small pilot, show success, and then grow it at their own pace to address larger needs. Organizations of any size can take advantage of the functionality and the predictable steady cost of cloud solutions, while at the same time enjoying the usability brought through constant improvements.</span><span style=";font-family:arial;font-size:100%;" ><br /><br /><b>Scott: </b>Agreed. As IT faces more pressure from a changing threat landscape and increased compliance mandates, the cloud model gives maximum leverage to IT &#8211; always important, but especially in this economic climate.<br /></span><p style="font-family:arial;"><span style="font-size:100%;"><a href="http://events.qualys.com/content/20090416_CIO_Webcast?leadsource=225597">Register here for "In Cloud we Trust"<br /></a></span></p><p style="font-family:arial;"><span style="font-size:100%;"><a href="http://events.qualys.com/content/20090416_CIO_Webcast?leadsource=225597">Thursday, April 16, 2009 1:00 p.m. EST / 10:00 a.m. PST</a></span></p> <span style=";font-family:arial;font-size:100%;" class="byline-author" >Posted by Sundar Raghavan, Google security and archiving team</span><span style="font-size:100%;"><br /></span><span style=";font-family:arial;font-size:100%;" class="byline-author" ></span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/04/in-cloud-we-trust.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:In Cloud We Trust&url=https://cloud.googleblog.com/2009/04/in-cloud-we-trust.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/04/in-cloud-we-trust.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/04/in-cloud-we-trust.html?hl=en' data-url='https://cloud.googleblog.com/2009/04/in-cloud-we-trust.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/04/in-cloud-we-trust.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/IT?hl=en' rel='tag'> IT </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/webinar?hl=en' rel='tag'> webinar </a> </span> </div> </div> </div> <div class='post' data-id='3933669717817126620' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html?hl=en' itemprop='url' title='Spam data and trends: Q1 2009'> Spam data and trends: Q1 2009 </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Tuesday, March 31, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div><div><span style="font-size:100%;"><i><span style="background-color: rgb(255, 255, 255);">Editor's Note: The spam data cited in this post is drawn from the Google enterprise security and archiving security network (Postini), which delivers an added layer of security for standalone mail servers and Google Apps Premier Edition customers. For a discussion of the anti-spam measures included in Gmail, please <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html">see this post from the Gmail blog. </a></span></i></span><i><span style="background-color: rgb(255, 255, 255);"><a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html"><br /></a></span></i></div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">In providing email security to more than 50,000 businesses and 15 million business users, Google security and archiving services, powered by <a id="knm_" title="Postini" href="//www.google.com/postini/">Postini</a>, process and cull spam from more than three billion enterprise email connections every day. This gives us strong insights into the state of the spam industry, some of which we share i<span style="background-color: rgb(255, 255, 255);">n </span><span style="background-color: rgb(255, 255, 255);"><span style="text-decoration: none;"><a id="sz2v" title="regular posts to this blog" href="http://googleenterprise.blogspot.com/search/label/spam%20and%20security%20trends">regular posts to this blog</a></span></span><span style="background-color: rgb(255, 255, 255);">.<br /><br />R</span>ead on for a quick overview of spam trends and events in the first quarter of 2009.<br /></span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>What we saw in the Postini data centers</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">The most significant spam-related event in the first quarter of 2009 occurred when spam volume returned to <a id="r7x." title="pre-McColo takedown levels" href="http://googleenterprise.blogspot.com/2008/11/fighting-spam-just-got-little-easier.html">pre-McColo takedown levels</a>. By the second half of March, seven-day average spam volume was at the same volume we saw prior to <a id="y.sj" title="the blocking of ISP McColo in November 2008" href="http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html">the blocking of the McColo ISP in November 2008</a>.<br /><br /></span></div> <div><div style="text-align: center;"> </div><div id="e5gx" style="text-align: left;"><div style="text-align: center;"> </div><div id="esrn" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_102f833rgg_b" style="width: 500px; height: 343px;" /></span></div> </div></div> <div><span style="font-size:100%;"><br />Spammers have clearly rallied following the McColo takedown, and o<span style="background-color: rgb(255, 255, 255);">verall </span><span style="background-color: rgb(255, 255, 255);">spam</span><span style="background-color: rgb(255, 255, 255);"> volume growth during Q1 2009 was the strongest it's been</span> since early 2008, increasing an <span style="background-color: rgb(255, 255, 255);">average of </span><span style="background-color: rgb(255, 255, 255);">1.2% per day. To put that number into context, the growth rate of spam volume in Q1 2008 was <span style="background-color: rgb(255, 255, 255);">approximately 1% per day &#8211; which, at the time, was a record high.</span></span></span> </div> <div id="x636" style="text-align: left;"> <div> <div> <div id="x636" style="text-align: left;"> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Of course, like every year before it,</span> 2008 set a new record for overall spam volume. But in 2008 spam growth flattened over the summer and early fall, and then fell off a cliff after the McColo takedown (daily growth declined to .8%, .3%, and then .01% in the last three quarters of the year). <span style="background-color: rgb(255, 255, 255);">T</span><span style="background-color: rgb(255, 255, 255);">his pattern </span><span style="background-color: rgb(255, 255, 255);">raises some interesting questions regarding what we can expect in the rest of 2009: Will spam growth once again flatten or decline after a strong first quarter? Or have spammers &#8211; as part of their recovery from the McColo takedown</span><span style="background-color: rgb(255, 255, 255);"> &#8211; </span><span style="background-color: rgb(255, 255, 255);">rebuilt botnets to be capable of sustaining or even accelerating this early growth spurt?</span></span> </div> <div><span style="font-size:100%;"><br /></span></div></div></div></div></div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">It's difficult to ascertain exactly how spammers have rebuilt in the wake of McColo, but data suggests they're adopting new strategies to avoid a McColo-type takedown from occurring again. Specifically, the recent upward trajectory of spam could indicate that spammers are building botnets that are more robust but send less volume</span><span style="background-color: rgb(255, 255, 255);"> &#8211; </span><span style="background-color: rgb(255, 255, 255);">or at least that they haven't enabled their botnets to run at full capacity because they're wary of exposing a new ISP as a target.</span><span style="background-color: rgb(255, 255, 255);"> </span><br /></span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>New types of spam</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">The most s<span style="background-color: rgb(255, 255, 255);">ignificant development in spam vectors this quarter was the appearance of location-based spam. </span><span style="background-color: rgb(255, 255, 255);">In this type of attack, users click on a link in a spam message and are directed to a page that contains a fraudulent news headline describing a crisis or disaster in a major city nearby.</span><span style="background-color: rgb(255, 255, 255);"> The </span>attack customizes the location for each user by determining the geolocation of the user's source IP and then identifying the nearest major city. The addition of location creates a heightened level of interest, and the user is tempted to click on the embedded video &#8211; which in turn downloads a virus to his or her machine.<br /></span></div><span style="font-size:100%;"><br /></span> <div><span style="font-size:100%;">Meanwhile, the economy, financial markets, job cuts, and resume help continue to be the most prominent topics spammers are employing as lures for more traditional attacks. We also saw increased spam activity around the U.S. presidential inauguration and St. Patrick's Day, in keeping with the recent propensity spammers have demonstrated for reading the news and keeping their eyes on the holiday calendar in targeting their attacks. </span></div> <div><span style="font-size:100%;"><br /></span></div> <div> <div><span style="font-size:100%;"><b>Virus roundup</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">In early 2008, a trend emerged in which we saw spam messages with attached viruses (otherwise known as "payload viruses") spiking every Sunday, possibly targeting a maintenance window to catch corporate defenses when they were undergoing scheduled updates.<br /><br /></span></span> </div> <div style="text-align: center;"> <div id="pi9m"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_6hrk6z5gb_b" style="width: 501px; height: 342px;" /> </span></div></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);"><br />This year we've seen the payload viruses spread out across every day of the week, with no immediately obvious pattern in their distribution. It's difficult to say for certain what prompted the change, but one possible explanation is that spammers switched tactics because they weren't seeing the success they'd hoped for from the focused attacks.<br /><br /></span></span> <div id="zwuo" style="text-align: left;"><div style="text-align: center;"> </div><div id="gzup" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_8gx4khwgq_b" style="width: 501px; height: 343px;" /></span></div> </div></div></div> <div><span style="font-size:100%;"><i><span style="font-style: normal;"><br />Of course, p</span><span style="font-style: normal;">ayload v</span><span style="font-style: normal;">iruses have also seen a recent spike overall -- in the month of March we saw a 9x increase from February. This pales in comparison to the <a id="cq9z" title="highs we saw last summer" style="color: rgb(85, 26, 139);" href="http://googleenterprise.blogspot.com/2008/08/security-spotlight-july-virus-attacks.html">highs we saw last summer</a>, but it may indicate a developing trend that's worth keeping a close eye on. </span></i></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">Viruses delivered as a blended threat (when a spam message directs a user to a malicious website, which then results in a virus being downloaded to the user's computer) continue to be popular with spammers. E-cards are one of the best examples of this vector, and Valentine's Day saw a flurry of activity using e-cards to direct users to malicious websites. </span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>Conclusions</b></span> </div></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">Spammers continue to prove their resilience -- whether it's bouncing back from the biggest takedown on record or finding new ways to exploit the ways we communicate for malicious purposes, they're clearly here to stay. And Google believes firmly in the power of the cloud to protect your enterprise from them: Outsourcing message security to Google enables you to leverage our technical expertise and massive infrastructure to keep spammers from your door. See how<span style="background-color: rgb(255, 255, 255);"> <a id="y8y0" title="much spam is costs your business" href="//www.google.com/postini/roi_calculator.html">much spam is costing your business</a>, learn</span> <a id="yx.c" title="how much you could be saving" href="//www.google.com/a/help/intl/en/security/tco_calculator.html">how much you could be saving</a> with Google Message Security, or <a id="vx86" title="contact our sales team" href="//www.google.com/support/appsecurity/bin/request.py?contact_type=sales">contact us</a> for more information. </span></div><span style="font-size:100%;"><br />Posted by Amanda Kleha, Google security and archiving team </span> </script> <noscript> <div><div><span style="font-size:100%;"><i><span style="background-color: rgb(255, 255, 255);">Editor's Note: The spam data cited in this post is drawn from the Google enterprise security and archiving security network (Postini), which delivers an added layer of security for standalone mail servers and Google Apps Premier Edition customers. For a discussion of the anti-spam measures included in Gmail, please <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html">see this post from the Gmail blog. </a></span></i></span><i><span style="background-color: rgb(255, 255, 255);"><a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html"><br /></a></span></i></div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">In providing email security to more than 50,000 businesses and 15 million business users, Google security and archiving services, powered by <a id="knm_" title="Postini" href="//www.google.com/postini/">Postini</a>, process and cull spam from more than three billion enterprise email connections every day. This gives us strong insights into the state of the spam industry, some of which we share i<span style="background-color: rgb(255, 255, 255);">n </span><span style="background-color: rgb(255, 255, 255);"><span style="text-decoration: none;"><a id="sz2v" title="regular posts to this blog" href="http://googleenterprise.blogspot.com/search/label/spam%20and%20security%20trends">regular posts to this blog</a></span></span><span style="background-color: rgb(255, 255, 255);">.<br /><br />R</span>ead on for a quick overview of spam trends and events in the first quarter of 2009.<br /></span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>What we saw in the Postini data centers</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">The most significant spam-related event in the first quarter of 2009 occurred when spam volume returned to <a id="r7x." title="pre-McColo takedown levels" href="http://googleenterprise.blogspot.com/2008/11/fighting-spam-just-got-little-easier.html">pre-McColo takedown levels</a>. By the second half of March, seven-day average spam volume was at the same volume we saw prior to <a id="y.sj" title="the blocking of ISP McColo in November 2008" href="http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html">the blocking of the McColo ISP in November 2008</a>.<br /><br /></span></div> <div><div style="text-align: center;"> </div><div id="e5gx" style="text-align: left;"><div style="text-align: center;"> </div><div id="esrn" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_102f833rgg_b" style="width: 500px; height: 343px;" /></span></div> </div></div> <div><span style="font-size:100%;"><br />Spammers have clearly rallied following the McColo takedown, and o<span style="background-color: rgb(255, 255, 255);">verall </span><span style="background-color: rgb(255, 255, 255);">spam</span><span style="background-color: rgb(255, 255, 255);"> volume growth during Q1 2009 was the strongest it's been</span> since early 2008, increasing an <span style="background-color: rgb(255, 255, 255);">average of </span><span style="background-color: rgb(255, 255, 255);">1.2% per day. To put that number into context, the growth rate of spam volume in Q1 2008 was <span style="background-color: rgb(255, 255, 255);">approximately 1% per day &#8211; which, at the time, was a record high.</span></span></span> </div> <div id="x636" style="text-align: left;"> <div> <div> <div id="x636" style="text-align: left;"> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Of course, like every year before it,</span> 2008 set a new record for overall spam volume. But in 2008 spam growth flattened over the summer and early fall, and then fell off a cliff after the McColo takedown (daily growth declined to .8%, .3%, and then .01% in the last three quarters of the year). <span style="background-color: rgb(255, 255, 255);">T</span><span style="background-color: rgb(255, 255, 255);">his pattern </span><span style="background-color: rgb(255, 255, 255);">raises some interesting questions regarding what we can expect in the rest of 2009: Will spam growth once again flatten or decline after a strong first quarter? Or have spammers &#8211; as part of their recovery from the McColo takedown</span><span style="background-color: rgb(255, 255, 255);"> &#8211; </span><span style="background-color: rgb(255, 255, 255);">rebuilt botnets to be capable of sustaining or even accelerating this early growth spurt?</span></span> </div> <div><span style="font-size:100%;"><br /></span></div></div></div></div></div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">It's difficult to ascertain exactly how spammers have rebuilt in the wake of McColo, but data suggests they're adopting new strategies to avoid a McColo-type takedown from occurring again. Specifically, the recent upward trajectory of spam could indicate that spammers are building botnets that are more robust but send less volume</span><span style="background-color: rgb(255, 255, 255);"> &#8211; </span><span style="background-color: rgb(255, 255, 255);">or at least that they haven't enabled their botnets to run at full capacity because they're wary of exposing a new ISP as a target.</span><span style="background-color: rgb(255, 255, 255);"> </span><br /></span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>New types of spam</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">The most s<span style="background-color: rgb(255, 255, 255);">ignificant development in spam vectors this quarter was the appearance of location-based spam. </span><span style="background-color: rgb(255, 255, 255);">In this type of attack, users click on a link in a spam message and are directed to a page that contains a fraudulent news headline describing a crisis or disaster in a major city nearby.</span><span style="background-color: rgb(255, 255, 255);"> The </span>attack customizes the location for each user by determining the geolocation of the user's source IP and then identifying the nearest major city. The addition of location creates a heightened level of interest, and the user is tempted to click on the embedded video &#8211; which in turn downloads a virus to his or her machine.<br /></span></div><span style="font-size:100%;"><br /></span> <div><span style="font-size:100%;">Meanwhile, the economy, financial markets, job cuts, and resume help continue to be the most prominent topics spammers are employing as lures for more traditional attacks. We also saw increased spam activity around the U.S. presidential inauguration and St. Patrick's Day, in keeping with the recent propensity spammers have demonstrated for reading the news and keeping their eyes on the holiday calendar in targeting their attacks. </span></div> <div><span style="font-size:100%;"><br /></span></div> <div> <div><span style="font-size:100%;"><b>Virus roundup</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">In early 2008, a trend emerged in which we saw spam messages with attached viruses (otherwise known as "payload viruses") spiking every Sunday, possibly targeting a maintenance window to catch corporate defenses when they were undergoing scheduled updates.<br /><br /></span></span> </div> <div style="text-align: center;"> <div id="pi9m"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_6hrk6z5gb_b" style="width: 501px; height: 342px;" /> </span></div></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);"><br />This year we've seen the payload viruses spread out across every day of the week, with no immediately obvious pattern in their distribution. It's difficult to say for certain what prompted the change, but one possible explanation is that spammers switched tactics because they weren't seeing the success they'd hoped for from the focused attacks.<br /><br /></span></span> <div id="zwuo" style="text-align: left;"><div style="text-align: center;"> </div><div id="gzup" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_8gx4khwgq_b" style="width: 501px; height: 343px;" /></span></div> </div></div></div> <div><span style="font-size:100%;"><i><span style="font-style: normal;"><br />Of course, p</span><span style="font-style: normal;">ayload v</span><span style="font-style: normal;">iruses have also seen a recent spike overall -- in the month of March we saw a 9x increase from February. This pales in comparison to the <a id="cq9z" title="highs we saw last summer" style="color: rgb(85, 26, 139);" href="http://googleenterprise.blogspot.com/2008/08/security-spotlight-july-virus-attacks.html">highs we saw last summer</a>, but it may indicate a developing trend that's worth keeping a close eye on. </span></i></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">Viruses delivered as a blended threat (when a spam message directs a user to a malicious website, which then results in a virus being downloaded to the user's computer) continue to be popular with spammers. E-cards are one of the best examples of this vector, and Valentine's Day saw a flurry of activity using e-cards to direct users to malicious websites. </span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>Conclusions</b></span> </div></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">Spammers continue to prove their resilience -- whether it's bouncing back from the biggest takedown on record or finding new ways to exploit the ways we communicate for malicious purposes, they're clearly here to stay. And Google believes firmly in the power of the cloud to protect your enterprise from them: Outsourcing message security to Google enables you to leverage our technical expertise and massive infrastructure to keep spammers from your door. See how<span style="background-color: rgb(255, 255, 255);"> <a id="y8y0" title="much spam is costs your business" href="//www.google.com/postini/roi_calculator.html">much spam is costing your business</a>, learn</span> <a id="yx.c" title="how much you could be saving" href="//www.google.com/a/help/intl/en/security/tco_calculator.html">how much you could be saving</a> with Google Message Security, or <a id="vx86" title="contact our sales team" href="//www.google.com/support/appsecurity/bin/request.py?contact_type=sales">contact us</a> for more information. </span></div><span style="font-size:100%;"><br />Posted by Amanda Kleha, Google security and archiving team </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Spam data and trends: Q1 2009&url=https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='3' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html?hl=en' data-url='https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/admin?hl=en' rel='tag'> admin </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/IT?hl=en' rel='tag'> IT </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends?hl=en' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='1492889602366162383' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/03/everything-you-always-wanted-to-know.html?hl=en' itemprop='url' title='Everything you always wanted to know about keeping email safe...in the cloud'> Everything you always wanted to know about keeping email safe...in the cloud </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Tuesday, March 3, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> What if we told you that a 35 minute tutorial would teach you everything you needed about keeping your Microsoft Exchange, Lotus Notes, or other on-premise email system safe from spam, malware, and viruses? We hope that you'd believe us, and that you'd give our <a title="Everything you always wanted to know about email security in the cloud" target="_blank" href="http://www.postini.com/webdocs/training/en/email_admin/email_admin.html" id="vwuu">new "Nuts to Bolts" on Google Message Security</a>, powered by Postini, a view.<br /><br />Don't have 35 minutes? We know the feeling. The <a title="Choose the topics that interest you most" target="_blank" href="http://www.postini.com/webdocs/training/en/email_admin/email_admin.html" id="u70y">topic overview (on the left)</a> lets you pinpoint the subjects that interest you most.<br /><br />This tutorial is just one from a <a title="Message security and archiving Learning Center" href="//www.google.com/support/appsecurity/bin/answer.py?answer=87508" id="eg9a">growing library of information and resources in our Security and Archiving Learning Center.</a> Find a moment to come in and look around.<br /><br /><span class="byline-author">Posted by </span>Ellen Petry Leanse, Google Enterprise Team </script> <noscript> What if we told you that a 35 minute tutorial would teach you everything you needed about keeping your Microsoft Exchange, Lotus Notes, or other on-premise email system safe from spam, malware, and viruses? We hope that you'd believe us, and that you'd give our <a title="Everything you always wanted to know about email security in the cloud" target="_blank" href="http://www.postini.com/webdocs/training/en/email_admin/email_admin.html" id="vwuu">new "Nuts to Bolts" on Google Message Security</a>, powered by Postini, a view.<br /><br />Don't have 35 minutes? We know the feeling. The <a title="Choose the topics that interest you most" target="_blank" href="http://www.postini.com/webdocs/training/en/email_admin/email_admin.html" id="u70y">topic overview (on the left)</a> lets you pinpoint the subjects that interest you most.<br /><br />This tutorial is just one from a <a title="Message security and archiving Learning Center" href="//www.google.com/support/appsecurity/bin/answer.py?answer=87508" id="eg9a">growing library of information and resources in our Security and Archiving Learning Center.</a> Find a moment to come in and look around.<br /><br /><span class="byline-author">Posted by </span>Ellen Petry Leanse, Google Enterprise Team </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/03/everything-you-always-wanted-to-know.html?hl=en'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Everything you always wanted to know about keeping email safe...in the cloud&url=https://cloud.googleblog.com/2009/03/everything-you-always-wanted-to-know.html?hl=en&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/03/everything-you-always-wanted-to-know.html?hl=en'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/03/everything-you-always-wanted-to-know.html?hl=en' data-url='https://cloud.googleblog.com/2009/03/everything-you-always-wanted-to-know.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/03/everything-you-always-wanted-to-know.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/admin?hl=en' rel='tag'> admin </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl=en' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/IT?hl=en' rel='tag'> IT </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini?hl=en' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/productivity?hl=en' rel='tag'> productivity </a> </span> </div> </div> </div> <div class='blog-pager' id='blog-pager'> <a class='home-link' href='https://cloud.googleblog.com/?hl=en'> <i class='material-icons'> &#59530; </i> </a> <i class='material-icons disabled'> &#58820; </i> <span id='blog-pager-older-link'> <a class='blog-pager-older-link' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?updated-max=2009-03-03T14:19:00-08:00&max-results=20&start=20&by-date=false&hl=en' id='Blog1_blog-pager-older-link' title='Older Posts'> <i class='material-icons'> &#58824; </i> </a> </span> </div> <div class='clear'></div> </div></div> </div> </div> <div class='col-right'> <div class='section' id='sidebar-top'><div class='widget HTML' data-version='1' id='HTML8'> <div class='widget-content'> <div class='searchBox'> <input type='text' title='Search This Blog' placeholder='Search blog ...' /> </div> </div> <div class='clear'></div> </div></div> <div id='aside'> <div class='section' id='sidebar'><div class='widget Label' data-version='1' id='Label1'> <div class='tab'> <img class='sidebar-icon' src='data:image/png;base64,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'/> <h2> Labels </h2> <i class='material-icons arrow'> &#58821; </i> </div> <div class='widget-content list-label-widget-content'> <ul> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23innovationupgrade?hl=en'> #innovationupgrade </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23InspireGirls?hl=en'> #InspireGirls </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23moregoogleapps?hl=en'> #moregoogleapps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23SysAdminDay?hl=en'> #SysAdminDay </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23tbt?hl=en'> #tbt </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23throwbackthursday?hl=en'> #throwbackthursday </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23top10trust?hl=en'> #top10trust </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/100%25%20web?hl=en'> 100% web </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/50states?hl=en'> 50states </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/ad%20contest?hl=en'> ad contest </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/add-ons?hl=en'> add-ons </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/admin?hl=en'> admin </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Admin%20console?hl=en'> Admin console </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/admin%20sdk?hl=en'> admin sdk </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/AirPlay?hl=en'> AirPlay </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android?hl=en'> Android </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20for%20Work?hl=en'> Android for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20for%20Work%20Live?hl=en'> Android for Work Live </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20Marshmellow?hl=en'> Android Marshmellow </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20Nougat?hl=en'> Android Nougat </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20security?hl=en'> Android security </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20security%20tips?hl=en'> Android security tips </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Apps%20Adventures?hl=en'> Apps Adventures </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/apps%20script?hl=en'> apps script </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/apptuesday?hl=en'> apptuesday </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Armed%20Forces%20Day?hl=en'> Armed Forces Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Asia%20Pacific?hl=en'> Asia Pacific </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Atmosphere%20Live?hl=en'> Atmosphere Live </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Audi?hl=en'> Audi </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Audi%20Connect?hl=en'> Audi Connect </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/audit?hl=en'> audit </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Australia?hl=en'> Australia </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/big%20data?hl=en'> big data </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Big%20Query?hl=en'> Big Query </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/bigquery?hl=en'> bigquery </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Boston?hl=en'> Boston </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/browser?hl=en'> browser </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chomebox%20for%20Meetings?hl=en'> Chomebox for Meetings </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome?hl=en'> Chrome </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20Device%20Management?hl=en'> Chrome Device Management </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20digital%20signage?hl=en'> Chrome digital signage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20for%20Business?hl=en'> Chrome for Business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20for%20Work?hl=en'> Chrome for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20Frame?hl=en'> Chrome Frame </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20OS?hl=en'> Chrome OS </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebit?hl=en'> Chromebit </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebooks?hl=en'> Chromebooks </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebooks%20for%20Business?hl=en'> Chromebooks for Business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebooks%20for%20Education?hl=en'> Chromebooks for Education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebooks%20for%20Work?hl=en'> Chromebooks for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebox%20for%20digital%20signage?hl=en'> Chromebox for digital signage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebox%20for%20meetings?hl=en'> Chromebox for meetings </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebox%20for%20signage?hl=en'> Chromebox for signage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromeboxes?hl=en'> Chromeboxes </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromecast?hl=en'> Chromecast </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/City%2024%2F7?hl=en'> City 24/7 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Classroom?hl=en'> Classroom </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Clearing%20Kosovo?hl=en'> Clearing Kosovo </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Cloud?hl=en'> Cloud </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing?hl=en'> cloud computing </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing%20gonegoogle?hl=en'> cloud computing gonegoogle </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing%20gonegoogle%20Google%20Apps?hl=en'> cloud computing gonegoogle Google Apps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing%20gonegoogle%20Google%20Apps%20google%20docs%20small%20business%20success%20story?hl=en'> cloud computing gonegoogle Google Apps google docs small business success story </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing%20gonegoogle%20Google%20Apps%20google%20docs%20small%20business%20success%20story%20switch?hl=en'> cloud computing gonegoogle Google Apps google docs small business success story switch </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20datastore?hl=en'> cloud datastore </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20platform?hl=en'> cloud platform </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Cloud%20Platform%20Live?hl=en'> Cloud Platform Live </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20print?hl=en'> cloud print </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20series?hl=en'> cloud series </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20services?hl=en'> cloud services </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20sql?hl=en'> cloud sql </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/collaboration?hl=en'> collaboration </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Colorado?hl=en'> Colorado </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Connectors?hl=en'> Connectors </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/contacts?hl=en'> contacts </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Control%20Panel?hl=en'> Control Panel </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/customer?hl=en'> customer </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/customer%20love?hl=en'> customer love </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Customer%20story?hl=en'> Customer story </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Customer%20support?hl=en'> Customer support </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Customer%20testimonial?hl=en'> Customer testimonial </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/data%20centers?hl=en'> data centers </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/data%20processing%20amendment?hl=en'> data processing amendment </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/data%20protection?hl=en'> data protection </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Developer?hl=en'> Developer </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/developers?hl=en'> developers </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Digital%20Learning%20Day?hl=en'> Digital Learning Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Docs?hl=en'> Docs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/documents?hl=en'> documents </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/DPA?hl=en'> DPA </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Drawings?hl=en'> Drawings </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Drive%20for%20Education?hl=en'> Drive for Education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/drive%20sharing?hl=en'> drive sharing </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Earth?hl=en'> Earth </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/earth%20and%20maps?hl=en'> earth and maps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/EC?hl=en'> EC </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/education?hl=en'> education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Education%20on%20Air?hl=en'> Education on Air </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/EMC?hl=en'> EMC </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/EMM?hl=en'> EMM </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Energy?hl=en'> Energy </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/enterprise?hl=en'> enterprise </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/EU?hl=en'> EU </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/events?hl=en'> events </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/FedEx?hl=en'> FedEx </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Fedex.com?hl=en'> Fedex.com </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Finance?hl=en'> Finance </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Firebase?hl=en'> Firebase </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Forms?hl=en'> Forms </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/franchises?hl=en'> franchises </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GAFE?hl=en'> GAFE </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Gartner?hl=en'> Gartner </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GE?hl=en'> GE </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/geo?hl=en'> geo </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Global%20Partner%20Summit?hl=en'> Global Partner Summit </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/gmail?hl=en'> gmail </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Gone%20Google?hl=en'> Gone Google </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/gonegoogle?hl=en'> gonegoogle </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20AdWords?hl=en'> Google AdWords </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20App%20Engine?hl=en'> Google App Engine </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps?hl=en'> Google Apps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Blog?hl=en'> Google Apps Blog </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20for%20Business?hl=en'> Google Apps for Business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20for%20Education?hl=en'> Google Apps for Education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20for%20Government?hl=en'> Google Apps for Government </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20for%20Work?hl=en'> Google Apps for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Marketplace?hl=en'> Google Apps Marketplace </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Reseller?hl=en'> Google Apps Reseller </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Script?hl=en'> Google Apps Script </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Vault?hl=en'> Google Apps Vault </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20BigQuery?hl=en'> Google BigQuery </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Calendar?hl=en'> Google Calendar </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Calendar%20app?hl=en'> Google Calendar app </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Certified%20Teachers?hl=en'> Google Certified Teachers </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Chrome?hl=en'> Google Chrome </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Chromebases?hl=en'> Google Chromebases </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Classroom?hl=en'> Google Classroom </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Cloud%20Datastore?hl=en'> Google Cloud Datastore </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Cloud%20DNS?hl=en'> Google Cloud DNS </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Cloud%20Platform?hl=en'> Google Cloud Platform </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20cloud%20storage?hl=en'> google cloud storage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Cloud%20Vision%20API?hl=en'> Google Cloud Vision API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20commerce%20search?hl=en'> google commerce search </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Compute%20Engine?hl=en'> Google Compute Engine </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Doc?hl=en'> Google Doc </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Docs?hl=en'> Google Docs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Domains?hl=en'> Google Domains </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Draw?hl=en'> Google Draw </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Drive?hl=en'> Google Drive </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Drive%20for%20Work?hl=en'> Google Drive for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth?hl=en'> Google Earth </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth%20Engine?hl=en'> Google Earth Engine </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth%20Enterprise?hl=en'> Google Earth Enterprise </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth%20Images?hl=en'> Google Earth Images </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth%20Pro?hl=en'> Google Earth Pro </a> </li> <li> <span dir='ltr'> Google Email Security and Archiving </span> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Enterprise?hl=en'> Google Enterprise </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Enterprise%20Search?hl=en'> Google Enterprise Search </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Expeditions?hl=en'> Google Expeditions </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Education?hl=en'> Google for Education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Education%20Partner%20Program?hl=en'> Google for Education Partner Program </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Education%20Training%20Center?hl=en'> Google for Education Training Center </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Entrepreneurs?hl=en'> Google for Entrepreneurs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Work?hl=en'> Google for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Work%20and%20Google%20for%20Education%20Partner%20Program?hl=en'> Google for Work and Google for Education Partner Program </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Work%20partner%20program?hl=en'> Google for Work partner program </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Forms?hl=en'> Google Forms </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Green?hl=en'> Google Green </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20groups?hl=en'> google groups </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Hangout?hl=en'> Google Hangout </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Hangouts?hl=en'> Google Hangouts </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20I%2FO?hl=en'> Google I/O </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Keep?hl=en'> Google Keep </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps?hl=en'> Google Maps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20API?hl=en'> Google Maps API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20APIs?hl=en'> Google Maps APIs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Coordinate?hl=en'> Google Maps Coordinate </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Engine?hl=en'> Google Maps Engine </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Engine%20Pro?hl=en'> Google Maps Engine Pro </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Engine%20public%20data%20program?hl=en'> Google Maps Engine public data program </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20for%20Business?hl=en'> Google Maps for Business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20for%20Work?hl=en'> Google Maps for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Gallery?hl=en'> Google Maps Gallery </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Tracks%20API?hl=en'> Google Maps Tracks API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Message%20Continuity?hl=en'> Google Message Continuity </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20message%20security?hl=en'> google message security </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Mobile%20Device%20Management?hl=en'> Google Mobile Device Management </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20My%20Maps?hl=en'> Google My Maps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20My%20Maps%20Pro?hl=en'> Google My Maps Pro </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Places%20API?hl=en'> Google Places API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Play?hl=en'> Google Play </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20play%20for%20education?hl=en'> google play for education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Prediction%20API?hl=en'> Google Prediction API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Research%20tool?hl=en'> Google Research tool </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Science%20Fair?hl=en'> Google Science Fair </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Search%20Appliance?hl=en'> Google Search Appliance </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Security%20Key?hl=en'> Google Security Key </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Sheets?hl=en'> Google Sheets </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Site%20Search?hl=en'> Google Site Search </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20sites?hl=en'> google sites </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Slides%20API?hl=en'> Google Slides API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Smart%20Lock?hl=en'> Google Smart Lock </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20spreadsheets?hl=en'> Google spreadsheets </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Springboard?hl=en'> Google Springboard </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20storage?hl=en'> google storage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Storage%20for%20Developers?hl=en'> Google Storage for Developers </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Translate?hl=en'> Google Translate </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Vault?hl=en'> Google Vault </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Video?hl=en'> Google Video </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Wave?hl=en'> Google Wave </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%2B?hl=en'> google+ </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%2B%20api?hl=en'> Google+ api </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%2B%20Communities?hl=en'> Google+ Communities </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/googlenew?hl=en'> googlenew </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/government?hl=en'> government </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GSA?hl=en'> GSA </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GSA%207.0?hl=en'> GSA 7.0 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GSA%20for%20Commerce?hl=en'> GSA for Commerce </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/guest%20post?hl=en'> guest post </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/HALO%20Trust?hl=en'> HALO Trust </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Hangout%20on%20Air?hl=en'> Hangout on Air </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Hangouts%20on%20Air?hl=en'> Hangouts on Air </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/HEAT?hl=en'> HEAT </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/hints%20and%20tips?hl=en'> hints and tips </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/HIPAA?hl=en'> HIPAA </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Inbox?hl=en'> Inbox </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Inbox%20by%20Gmail?hl=en'> Inbox by Gmail </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/innovation?hl=en'> innovation </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/international%20trade?hl=en'> international trade </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Internet%20Explorer?hl=en'> Internet Explorer </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/intranet?hl=en'> intranet </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/io2011?hl=en'> io2011 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/iOS?hl=en'> iOS </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/iPad?hl=en'> iPad </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/IT?hl=en'> IT </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/K-12?hl=en'> K-12 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Kubernetes?hl=en'> Kubernetes </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/large%20business?hl=en'> large business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/MAM?hl=en'> MAM </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/manufacturing?hl=en'> manufacturing </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Mapping%20a%20better%20world?hl=en'> Mapping a better world </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/marketplace?hl=en'> marketplace </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/marketplace%20highlights?hl=en'> marketplace highlights </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/mashups?hl=en'> mashups </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/MCCs?hl=en'> MCCs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/MDM?hl=en'> MDM </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/medium%20business?hl=en'> medium business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/migration?hl=en'> migration </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/mobile?hl=en'> mobile </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/mobile%20management?hl=en'> mobile management </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/model%20contract%20clauses?hl=en'> model contract clauses </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/moms?hl=en'> moms </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Mother%27s%20Day?hl=en'> Mother&#39;s Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/mpstaffpick?hl=en'> mpstaffpick </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/MyHEAT?hl=en'> MyHEAT </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/NAVMAN?hl=en'> NAVMAN </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/new%20features?hl=en'> new features </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/news?hl=en'> news </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Niagara%20International%20Transportation%20Technology%20Coalition?hl=en'> Niagara International Transportation Technology Coalition </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/non-profit?hl=en'> non-profit </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/noteworthy?hl=en'> noteworthy </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/offline?hl=en'> offline </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/OpenID%20Connect?hl=en'> OpenID Connect </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Parters?hl=en'> Parters </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/partner?hl=en'> partner </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Partner%20Showcase?hl=en'> Partner Showcase </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/partners?hl=en'> partners </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Place%20Summaries?hl=en'> Place Summaries </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Postini?hl=en'> Postini </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/privacy?hl=en'> privacy </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/product%20ideas?hl=en'> product ideas </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/productivity?hl=en'> productivity </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Quickoffice?hl=en'> Quickoffice </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Receptionist%27s%20Day?hl=en'> Receptionist&#39;s Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/reports?hl=en'> reports </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Reseller?hl=en'> Reseller </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/retail?hl=en'> retail </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/RSA?hl=en'> RSA </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Safer%20Internet%20Day?hl=en'> Safer Internet Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/SBW2013?hl=en'> SBW2013 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/SBW2014?hl=en'> SBW2014 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/sbweek?hl=en'> sbweek </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/SCCs?hl=en'> SCCs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Search?hl=en'> Search </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Security?hl=en'> Security </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Security%20Key?hl=en'> Security Key </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/small%20business?hl=en'> small business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Small%20Business%20Week?hl=en'> Small Business Week </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Small%20businesses?hl=en'> Small businesses </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/SMB?hl=en'> SMB </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends?hl=en'> spam and security trends </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Startups?hl=en'> Startups </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/success%20story?hl=en'> success story </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/support?hl=en'> support </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/switch?hl=en'> switch </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/System%20Admin?hl=en'> System Admin </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/T%20Dispatch?hl=en'> T Dispatch </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Teamwork%202015?hl=en'> Teamwork 2015 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Thanksgiving?hl=en'> Thanksgiving </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Transport%20and%20Logistics?hl=en'> Transport and Logistics </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Trust?hl=en'> Trust </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/UK?hl=en'> UK </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/university?hl=en'> university </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/University%20of%20Calgary?hl=en'> University of Calgary </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Updates?hl=en'> Updates </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/utilities?hl=en'> utilities </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Veteran%20Owned%20Businesses?hl=en'> Veteran Owned Businesses </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Veterans%20Day?hl=en'> Veterans Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Veterans%20Day%202013?hl=en'> Veterans Day 2013 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Veterans%20Day%202014?hl=en'> Veterans Day 2014 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/viewpoint?hl=en'> viewpoint </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/VNX?hl=en'> VNX </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/wallet?hl=en'> wallet </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/webinar?hl=en'> webinar </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/webmaster?hl=en'> webmaster </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Winter?hl=en'> Winter </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/women%20in%20tech?hl=en'> women in tech </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Women%27s%20History%20Month?hl=en'> Women&#39;s History Month </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Work%20Resolutions?hl=en'> Work Resolutions </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/World%20Bank?hl=en'> World Bank </a> </li> </ul> <div class='clear'></div> </div> </div><div class='widget BlogArchive' data-version='1' id='BlogArchive1'> <div class='tab'> <i class='material-icons icon'> &#58055; </i> <h2> Archive </h2> <i class='material-icons arrow'> &#58821; </i> </div> <div class='widget-content'> <div id='ArchiveList'> <div id='BlogArchive1_ArchiveList'> <ul class='hierarchy'> <li class='archivedate expanded'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy toggle-open'> <i class='material-icons'> &#58823; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2016/?hl=en'> 2016 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate expanded'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2015/?hl=en'> 2015 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2014/?hl=en'> 2014 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2013/?hl=en'> 2013 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2012/?hl=en'> 2012 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2011/?hl=en'> 2011 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2010/?hl=en'> 2010 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2009/?hl=en'> 2009 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2008/?hl=en'> 2008 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2007/?hl=en'> 2007 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2006/?hl=en'> 2006 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/12/?hl=en'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/11/?hl=en'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/10/?hl=en'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/09/?hl=en'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/08/?hl=en'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/07/?hl=en'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/06/?hl=en'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/05/?hl=en'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/04/?hl=en'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/03/?hl=en'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/02/?hl=en'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/01/?hl=en'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> </div> </div> <div class='clear'></div> </div> </div><div class='widget HTML' data-version='1' id='HTML6'> <div class='widget-content'> <a href="http://cloud.blogspot.com/atom.xml"> <img src="data:image/png;base64,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" class="sidebar-icon" /> <h2>Feed</h2> </a> </div> <div class='clear'></div> </div></div> <div class='section' id='sidebar-bottom'><div class='widget HTML' data-version='1' id='HTML5'> <div class='widget-content'> <div class="followgooglewrapper"> <a href="http://plus.google.com/+googlecloud" rel="publisher" style="text-decoration:none;display:inline-block;color:#333;text-align:center; font:13px/16px arial,sans-serif;white-space:nowrap;"> <span style="display:inline-block;font-weight:bold;vertical-align:top;margin-right:5px; margin-top:0px;">Google</span><span style="display:inline-block;vertical-align:top;margin-right:13px; margin-top:0px;">on</span> <img src="//ssl.gstatic.com/images/icons/gplus-16.png" alt="Google+" style="border:0;width:16px;height:16px;"/></a> </div> <div class='followgooglewrapper'> <script src="https://apis.google.com/js/plusone.js"></script> <div class="g-ytsubscribe" data-channel="GoogleApps" data-layout="full"></div> </div> <!--Twitter--> <div class="share followgooglewrapper"> <button data-href="https://twitter.com/gsuite" onclick='sharingPopup(this);' id='twitter-share'><span class="twitter-follow">Follow @gsuite</span></button> <script> function sharingPopup (button) { var url = button.getAttribute("data-href"); window.open( url,'popUpWindow','height=500,width=500,left=10,top=10,resizable=yes,scrollbars=yes,toolbar=yes,menubar=no,location=no,directories=no,status=yes'); } </script> </div> </div> <div class='clear'></div> </div><div class='widget HTML' data-version='1' id='HTML1'> <h2 class='title'> Useful Links </h2> <div class='widget-content'> <a href="https://gsuite.google.com/together/">G Suite</a><br /><a href="https://apps.google.com/products/gmail/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=gmail">Gmail</a><br /><a href="https://apps.google.com/products/hangouts/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=hangouts">Hangouts</a><br /><a href="https://apps.google.com/products/calendar/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=calendar">Calendar</a><br /><a href="https://apps.google.com/products/googleplus/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=gplus">Google+</a><br /><a href="https://apps.google.com/products/drive/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=drive">Google Drive</a><br /><a href="https://www.google.com/work/mapsearth/">Google Maps</a><br /><a href="https://cloud.google.com/">Google Cloud Platform</a> </div> <div class='clear'></div> </div></div> </div> </div> <div style='clear:both;'></div> </div> <!-- Footer --> <div class='footer-outer loading'> <div class='footer-inner'> <div class='footer-inner-2'> <div style='width:33%;float:left;'> <div class='section' id='footer-1'><div class='widget HTML' data-version='1' id='HTML2'> <h2 class='title'> Company-wide </h2> <div class='widget-content'> <ul> <li> <a href="//googleblog.blogspot.com/" title="Official Google">Official Google Blog</a> </li> <li> <a href="//googlepublicpolicy.blogspot.com/" title="Public Policy">Public Policy Blog</a> </li> <li> <a href="//googleforstudents.blogspot.com/" title="Student">Student Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='width:33%;float:left;'> <div class='section' id='footer-2'><div class='widget HTML' data-version='1' id='HTML3'> <h2 class='title'> Products </h2> <div class='widget-content'> <ul> <li> <a href="//officialandroid.blogspot.com/" title="Android">Android Blog</a> </li> <li> <a href="//chrome.blogspot.com/" title="Chrome">Chrome Blog</a> </li> <li> <a href="//google-latlong.blogspot.com/" title="Lat Long">Lat Long Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='width:33%;float:left;'> <div class='section' id='footer-3'><div class='widget HTML' data-version='1' id='HTML4'> <h2 class='title'> Developers </h2> <div class='widget-content'> <ul> <li> <a href="//googledevelopers.blogspot.com/" title="Developers">Developers Blog</a> </li> <li> <a href="//googleadsdeveloper.blogspot.com/" title="Ads Developer">Ads Developer Blog</a> </li> <li> <a href="//android-developers.blogspot.com/" title="Android">Android Developers Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='clear:both;'></div> </div> </div> </div> <div class='google-footer-outer loading'> <div id='google-footer'> <a href='//www.google.com/'> <img class='google-logo-dark' height='36' src='data:image/png;base64,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' style='margin-top: -16px;' width='92'/> </a> <ul> <li> <a href='//www.google.com/'> Google </a> </li> <li> <a href='//www.google.com/policies/privacy/'> Privacy </a> </li> <li> <a href='//www.google.com/policies/terms/'> Terms </a> </li> </ul> </div> </div> <script type='text/javascript'> //<![CDATA[ // Social sharing popups. var postEl = document.getElementsByClassName('social-wrapper'); var postCount = postEl.length; for(i=0; i<postCount;i++){ postEl[i].addEventListener("click", function(event){ var postUrl = this.getAttribute("data-href"); window.open( postUrl,'popUpWindow','height=500,width=500,left=10,top=10,resizable=yes,scrollbars=yes,toolbar=yes,menubar=no,location=no,directories=no,status=yes'); });} //]]> </script> <script type='text/javascript'> //<![CDATA[ var BreakpointHandler = function() { this.initted = false; this.isHomePage = false; this.isMobile = false; }; BreakpointHandler.prototype.finalizeSummary = function(summaryHtml, lastNode) { // Use $.trim for IE8 compatibility summaryHtml = $.trim(summaryHtml).replace(/(<br>|\s)+$/,''); if (lastNode.nodeType == 3) { var lastChar = summaryHtml.slice(-1); if (!lastChar.match(/[.”"?]/)) { if (!lastChar.match(/[A-Za-z]/)) { summaryHtml = summaryHtml.slice(0, -1); } summaryHtml += ' ...'; } } else if (lastNode.nodeType == 1 && (lastNode.nodeName == 'I' || lastNode.nodeName == 'A')) { summaryHtml += ' ...'; } return summaryHtml; }; BreakpointHandler.prototype.generateSummaryFromContent = function(content, numWords) { var seenWords = 0; var summaryHtml = ''; for (var i=0; i < content.childNodes.length; i++) { var node = content.childNodes[i]; var nodeText; if (node.nodeType == 1) { if (node.hasAttribute('data-about-pullquote')) { continue; } nodeText = node.textContent; if (nodeText === undefined) { // innerText for IE8 nodeText = node.innerText; } if (node.nodeName == 'DIV' || node.nodeName == 'B') { // Don't end early if we haven't seen enough words. if (seenWords < 10) { continue; } if (i > 0) { summaryHtml = this.finalizeSummary(summaryHtml, content.childNodes[i-1]); } break; } summaryHtml += node.outerHTML; } else if (node.nodeType == 3) { nodeText = node.nodeValue; summaryHtml += nodeText + ' '; } var words = nodeText.match(/\S+\s*/g); if (!words) { continue; } var remain = numWords - seenWords; if (words.length >= remain) { summaryHtml = this.finalizeSummary(summaryHtml, node); break; } seenWords += words.length; } return summaryHtml; }; BreakpointHandler.prototype.detect = function() { var match, pl = /\+/g, search = /([^&=]+)=?([^&]*)/g, decode = function (s) { return decodeURIComponent(s.replace(pl, " ")); }, query = window.location.search.substring(1); var urlParams = {}; while (match = search.exec(query)) urlParams[decode(match[1])] = decode(match[2]); this.isListPage = $('html').hasClass('list-page'); this.isMobile = urlParams['m'] === '1'; this.isHomePage = window.location.pathname == '/'; }; BreakpointHandler.prototype.initContent = function() { var self = this; $('.post').each(function(index) { var body = $(this).children('.post-body')[0]; var content = $(body).children('.post-content')[0]; $(content).addClass('post-original'); var data = $(content).children('script').html(); data = self.rewriteForSSL(data); // If exists, extract specified editor's preview. var match = data.match(/([\s\S]+?)<div data-is-preview.+?>([\s\S]+)<\/div>/m); if (match) { data = match[1]; } // Prevent big images from loading when they aren't needed. // This must be done as a pre-injection step, since image loading can't be // canceled once embedded into the DOM. if (self.isListPage && self.isMobile) { data = data.replace(/<(img|iframe) .+?>/g, ''); } // Insert template to be rendered as nodes. content.innerHTML = data; if (self.isListPage) { var summary = document.createElement('div'); $(summary).addClass('post-content'); $(summary).addClass('post-summary'); body.insertBefore(summary, content); if (match) { // Use provided summary. summary.innerHTML = match[2]; } else { // Generate a summary. // Summary generation relies on DOM, so it must occur after content is // inserted into the page. summary.innerHTML = self.generateSummaryFromContent(content, 30); } // Add read more link to summary. var titleAnchor = $(this).find('.title a')[0]; var link = titleAnchor.cloneNode(true); link.innerHTML = 'Read More'; $(link).addClass('read-more'); summary.appendChild(link); } }); // Firefox does not allow for proper styling of BR. if (navigator.userAgent.indexOf('Firefox') > -1) { $('.post-content br').replaceWith('<span class="space"></span>'); } $('.loading').removeClass('loading'); }; BreakpointHandler.prototype.process = function() { if (!this.initted) { var makeInsecureImageRegex = function(hosts) { var whitelist = hosts.join('|').replace(/\./g,'\\.'); // Normal image tags, plus input images (yes, this is possible!) return new RegExp('(<(img|input)[^>]+?src=("|\'))http:\/\/(' + whitelist +')', 'g'); }; this.sslImageRegex = makeInsecureImageRegex(BreakpointHandler.KNOWN_HTTPS_HOSTS); this.sslImageCurrentDomainRegex = makeInsecureImageRegex([window.location.hostname]); this.detect(); this.initContent(); this.initted = true; } }; BreakpointHandler.KNOWN_HTTPS_HOSTS = [ "www.google.org", "www.google.com", "services.google.com", "blogger.com", "draft.blogger.com", "www.blogger.com", "photos1.blogger.com", "photos2.blogger.com", "photos3.blogger.com", "blogblog.com", "img1.blogblog.com", "img2.blogblog.com", "www.blogblog.com", "www1.blogblog.com", "www2.blogblog.com", "0.bp.blogspot.com", "1.bp.blogspot.com", "2.bp.blogspot.com", "3.bp.blogspot.com", "4.bp.blogspot.com", "lh3.googleusercontent.com", "lh4.googleusercontent.com", "lh5.googleusercontent.com", "lh6.googleusercontent.com", "themes.googleusercontent.com", ]; BreakpointHandler.prototype.rewriteForSSL = function(html) { // Handle HTTP -> HTTPS source replacement of images, movies, and other embedded content. return html.replace(this.sslImageRegex, '$1https://$4') .replace(this.sslImageCurrentDomainRegex, '$1//$4') .replace(/(<(embed|iframe)[^>]+?src=("|'))http:\/\/([^"']*?(youtube|picasaweb\.google)\.com)/g, '$1https://$4') // Slideshow SWF takes a image host, so we need to rewrite that parameter. .replace(/(<embed[^>]+?feed=http(?=[^s]))/g, '$1s'); }; $(document).ready(function() { var handler = new BreakpointHandler(); handler.process(); // Top-level navigation. $(".BlogArchive .tab").click(function(ev) { ev.preventDefault(); $(this).parent().toggleClass('active'); $(this).siblings().slideToggle(300); }); $(".Label .tab").click(function(ev) { ev.preventDefault(); $(this).parent().toggleClass('active'); $(this).siblings().slideToggle(300); }); // Blog archive year expansion. $('.BlogArchive .intervalToggle').click(function(ev) { ev.preventDefault(); if ($(this).parent().hasClass('collapsed')) { $(this).parent().removeClass('collapsed'); $(this).parent().addClass('expanded'); } else { $(this).parent().removeClass('expanded'); $(this).parent().addClass('collapsed'); } }); // Reverse order of months. $('.BlogArchive .intervalToggle + div').each(function(_, items) { var year = $(this); year.children().each(function(_, month) { year.prepend(month); }); }); // Set anchors to open in new tab. $('.post-content img').parent().each(function(_, node) { if (node.nodeName == 'A') { $(this).attr('target', '_blank'); } }); // Process search requests. $('.searchBox input').on("keypress", function(ev) { if (ev.which == 13) { window.location.href = 'https://www.google.com/search?q=site%3A' + window.location.hostname + '%20' + encodeURIComponent ($(this).val()); } }); }); //]]> </script> <script type="text/javascript" src="https://www.blogger.com/static/v1/widgets/688949419-widgets.js"></script> <script type='text/javascript'> window['__wavt'] = 'AOuZoY5pJLzSvt6og3Pqv1k1S_5jwsMbdw:1739996335034';_WidgetManager._Init('//www.blogger.com/rearrange?blogID\x3d6567687196385815607','//cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl\x3den','6567687196385815607'); _WidgetManager._SetDataContext([{'name': 'blog', 'data': {'blogId': '6567687196385815607', 'title': 'Official Google Cloud Blog', 'url': 'https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl\x3den', 'canonicalUrl': 'https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving', 'homepageUrl': 'https://cloud.googleblog.com/?hl\x3den', 'searchUrl': 'https://cloud.googleblog.com/search', 'canonicalHomepageUrl': 'https://cloud.googleblog.com/', 'blogspotFaviconUrl': 'https://cloud.googleblog.com/favicon.ico', 'bloggerUrl': 'https://www.blogger.com', 'hasCustomDomain': true, 'httpsEnabled': true, 'enabledCommentProfileImages': true, 'gPlusViewType': 'FILTERED_POSTMOD', 'adultContent': false, 'analyticsAccountNumber': 'UA-18038-3', 'encoding': 'UTF-8', 'locale': 'en', 'localeUnderscoreDelimited': 'en', 'languageDirection': 'ltr', 'isPrivate': false, 'isMobile': false, 'isMobileRequest': false, 'mobileClass': '', 'isPrivateBlog': false, 'isDynamicViewsAvailable': true, 'feedLinks': '\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Official Google Cloud Blog - Atom\x22 href\x3d\x22https://cloud.googleblog.com/feeds/posts/default\x22 /\x3e\n\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/rss+xml\x22 title\x3d\x22Official Google Cloud Blog - RSS\x22 href\x3d\x22https://cloud.googleblog.com/feeds/posts/default?alt\x3drss\x22 /\x3e\n\x3clink rel\x3d\x22service.post\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Official Google Cloud Blog - Atom\x22 href\x3d\x22https://www.blogger.com/feeds/6567687196385815607/posts/default\x22 /\x3e\n', 'meTag': '', 'adsenseHostId': 'ca-host-pub-1556223355139109', 'adsenseHasAds': false, 'adsenseAutoAds': false, 'boqCommentIframeForm': true, 'loginRedirectParam': '', 'view': '', 'dynamicViewsCommentsSrc': '//www.blogblog.com/dynamicviews/4224c15c4e7c9321/js/comments.js', 'dynamicViewsScriptSrc': '//www.blogblog.com/dynamicviews/65a146b0489ee6a5', 'plusOneApiSrc': 'https://apis.google.com/js/platform.js', 'disableGComments': true, 'interstitialAccepted': false, 'sharing': {'platforms': [{'name': 'Get link', 'key': 'link', 'shareMessage': 'Get link', 'target': ''}, {'name': 'Facebook', 'key': 'facebook', 'shareMessage': 'Share to Facebook', 'target': 'facebook'}, {'name': 'BlogThis!', 'key': 'blogThis', 'shareMessage': 'BlogThis!', 'target': 'blog'}, {'name': 'X', 'key': 'twitter', 'shareMessage': 'Share to X', 'target': 'twitter'}, {'name': 'Pinterest', 'key': 'pinterest', 'shareMessage': 'Share to Pinterest', 'target': 'pinterest'}, {'name': 'Email', 'key': 'email', 'shareMessage': 'Email', 'target': 'email'}], 'disableGooglePlus': true, 'googlePlusShareButtonWidth': 0, 'googlePlusBootstrap': '\x3cscript type\x3d\x22text/javascript\x22\x3ewindow.___gcfg \x3d {\x27lang\x27: \x27en\x27};\x3c/script\x3e'}, 'hasCustomJumpLinkMessage': false, 'jumpLinkMessage': 'Read more', 'pageType': 'index', 'searchLabel': 'Google Email Security and Archiving', 'pageName': 'Google Email Security and Archiving', 'pageTitle': 'Official Google Cloud Blog: Google Email Security and Archiving'}}, {'name': 'features', 'data': {}}, {'name': 'messages', 'data': {'edit': 'Edit', 'linkCopiedToClipboard': 'Link copied to clipboard!', 'ok': 'Ok', 'postLink': 'Post Link'}}, {'name': 'template', 'data': {'name': 'custom', 'localizedName': 'Custom', 'isResponsive': false, 'isAlternateRendering': false, 'isCustom': true}}, {'name': 'view', 'data': {'classic': {'name': 'classic', 'url': '?view\x3dclassic'}, 'flipcard': {'name': 'flipcard', 'url': '?view\x3dflipcard'}, 'magazine': {'name': 'magazine', 'url': '?view\x3dmagazine'}, 'mosaic': {'name': 'mosaic', 'url': '?view\x3dmosaic'}, 'sidebar': {'name': 'sidebar', 'url': '?view\x3dsidebar'}, 'snapshot': {'name': 'snapshot', 'url': '?view\x3dsnapshot'}, 'timeslide': {'name': 'timeslide', 'url': '?view\x3dtimeslide'}, 'isMobile': false, 'title': 'Official Google Cloud Blog', 'description': 'Built in the cloud. Engineered for your enterprise.', 'url': 'https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving?hl\x3den', 'type': 'feed', 'isSingleItem': false, 'isMultipleItems': true, 'isError': false, 'isPage': false, 'isPost': false, 'isHomepage': false, 'isArchive': false, 'isSearch': true, 'isLabelSearch': true, 'search': {'label': 'Google Email Security and Archiving', 'resultsMessage': 'Showing posts with the label Google Email Security and Archiving', 'resultsMessageHtml': 'Showing posts with the label \x3cspan class\x3d\x27search-label\x27\x3eGoogle Email Security and Archiving\x3c/span\x3e'}}}]); _WidgetManager._RegisterWidget('_HeaderView', new _WidgetInfo('Header1', 'header', document.getElementById('Header1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogView', new _WidgetInfo('Blog1', 'main', document.getElementById('Blog1'), {'cmtInteractionsEnabled': false, 'navMessage': 'Showing posts with label \x3cb\x3eGoogle Email Security and Archiving\x3c/b\x3e. \x3ca href\x3d\x22https://cloud.googleblog.com/\x22\x3eShow all posts\x3c/a\x3e'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML8', 'sidebar-top', document.getElementById('HTML8'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_LabelView', new _WidgetInfo('Label1', 'sidebar', document.getElementById('Label1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogArchiveView', new _WidgetInfo('BlogArchive1', 'sidebar', document.getElementById('BlogArchive1'), {'languageDirection': 'ltr', 'loadingMessage': 'Loading\x26hellip;'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML6', 'sidebar', document.getElementById('HTML6'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML5', 'sidebar-bottom', document.getElementById('HTML5'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML1', 'sidebar-bottom', document.getElementById('HTML1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML2', 'footer-1', document.getElementById('HTML2'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML3', 'footer-2', document.getElementById('HTML3'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML4', 'footer-3', document.getElementById('HTML4'), {}, 'displayModeFull')); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10