Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile Messaging Gateways: Page 4 of 16

When using a wireless e-mail gateway, there are two main configurations. One is where IT operates the gateway behind the firewall. The other is a utility model, where a service provider, generally the cellular one, operates a gateway serving many different customers. In both cases, the gateway vendor provides client software.

The behind-the-firewall gateway offers the greatest functionality. Yes, it's one more system IT has to worry about. But for large deployments, it will quickly pay for itself in ease of management. Just more than half our poll respondents preferred this approach.

Typical features for both behind-the-firewall and operator-provided gateways include:

• Easy-to-use clients. Your users will spend a lot of time with them, so vendors are emphasizing intuitive, full-featured clients.

• Push. The gateway pushes new e-mail as well as new appointments, and even other corporate data. The systems also synchronize contact databases.