Book Image

Learning Airwatch

Book Image

Learning Airwatch

Overview of this book

Table of Contents (18 chapters)
Learning AirWatch
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
The Future of Mobility
Index

Secure E-mail Gateway (SEG)


Now that we know what options we have with the MEM deployments, we will look at how to set up and configure SEG and the benefits of using this model.

SEG overview

SEG serves as a proxy server that is installed in-line with your corporate e-mail infrastructure. Once installed, you will configure your client profiles to send all traffic through the SEG servers to allow for additional security and controls over e-mail being delivered to mobile devices.

With SEG, you can provide the following additional security controls:

  • Attachment control

  • Hyperlink Management

  • Encryption Enforcement

  • Device Approval/Blocking

  • Whitelisting/Blacklisting of Devices/Users

  • Apply Compliance Policies.

SEG deployment options

The SEG server can only be deployed within your data center whether you are an on-premise or SaaS-based customer. The recommended deployment for your SEG is to install it within your DMZ or behind a reverse proxy server. The following diagram shows the recommended architecture for...