Applications

Exchange Active Sync Gateway anyone?

Do you think that username/password is sufficient to access Exchange mailboxes by any device from everywhere in the Internet?
Resume control over your mobile devices (smartphones, tablets etc.) accessing your Exchange mail server via the Exchange Active Sync (EAS) protocol.

  • Only identified devices are allowed to access the mail server.
  • The users cannot change the client hardware without central permission.
  • Additional authentication by certificates can be enforced.
  • Monitoring and administration can be delegated.

Use Cases/TechInfo

Control Access

Monitor and control/restrict access from mobile devices (using the EAS protocol) to Exchange server mailboxes. No unidentified device is allowed to access the Exchange mailbox.

TECHINFO
  • ApplicGate intercepts the connection from the mobile device to the Exchange server.
  • It builds up a database of connected mobile devices automatically.
  • The administrator can allow a specified number of mobile devices per user mailbox.
  • Connection attempts of additional devices are blocked.
SCHEMA
Appset image

Log mobile Device Access

Get usage data of mobile devices.

TECHINFO

Various data are logged (as far as they are transmitted by the device):

  • DeviceId
  • DeviceType
  • User-Agent
  • Last used (date/time)
  • IP address
  • Model
  • IMEI
  • OS
  • OSLanguage
  • Phone Number
  • Mobile Operator
SCHEMA
EAS Gateway

Block Devices, Enforce client certificates

Unwanted mobile device types can be blocked. For mailboxes with high protection requirements the usage of client certificates can be enforced.

TECHINFO
  • The administrator can define a list of devices that are not allowed and that are blocked.
  • For specific mailboxes client certificates can be enforced:
  • Then the mobile device must have a certificate where the email address in the certificate matches the email address of the mailbox.
SCHEMA
EAS Gateway

Active Directory Integration

Easy delegation of management rights via synchronization of the ApplicGate user database with Microsoft Active Directory (AD)

TECHINFO
  • Extracts of the Active Directory (AD) can be loaded into ApplicGate automatically, e.g. every hour.
  • Now ApplicGate knows in which AD Organizational Unit the user object is located.
  • Based on this information management rights can be delegated to different users:
    > A two-level hierarchy can be built: e.g. country, site
    > Different OUs can be managed by different persons.
    > Access type may be W (write access), R (read access) and N (notification).
SCHEMA
Appset image

FAQ + Techblog

Q: Is ApplicGate available for Linux also?

A: Yes, it is. Send an email to contact@applicgate.com and we will be glad to send you a version built for Linux.

Looking for a Reverse Proxy?

How to tunnel UDP traffic over TCP

If you would like to secure UDP traffic via unsecure networks or network segments you can add authentication and encryption easily.

Subscribe to ApplicGate News

Interested in new use cases and ApplicGate applications? Subscribe to our newsletter and never miss a new topic!

Quick Contact Form