Find White Papers
Home
About Us
List Your Papers
    
> F5 Networks Inc > Guide to Microsoft Exchange Security Solutions
F5 Networks Inc
Published:  Oct 19, 2012
Type:  White Paper
Length:  10 pages

Guide to Microsoft Exchange Security Solutions

White Paper Published By: F5 Networks Inc

The demand for access to email anytime, anywhere, and from any device has made it critical for IT departments to ensure their Microsoft Exchange deployments are secure, fast, and available. But email services delivered over the Internet can be vulnerable since traditional firewalls allow encrypted traffic to pass through open ports without inspecting those payloads. The challenge lies in enforcing security measures before traffic reaches the internal network.

Extending your security perimeter outward can improve security and availability for Microsoft Exchange email services published over the Internet, including Outlook Web App, Exchange ActiveSync, Outlook Anywhere, and Exchange Web Services. This Microsoft Exchange Security Solutions Guide explains how an Application Delivery Controller can prevent potentially malicious traffic from ever reaching Exchange by extending your security perimeter.

You'll discover how an ICSA Labs certified network and application firewall solution will improve security and availability by providing intelligent traffic monitoring, pre-authentication, and access control for mobile devices

Topics discussed include:
  • Using pre-authentication to avert threats before they reach the data center interior
  • Ensuring only authorized traffic reaches Exchange servers
  • Seamlessly supporting access to resources from various types of mobile devices
  • Guarding against application-level attacks to protect sensitive data



Tags : 
microsoft exchange, exchange security, email security, email availability, exchange availability, secure exchange access, remote access to exchange, application security, preventing application attacks, application-layer attacks, application firewall, web application firewall, security, data management, cloud computing