In this blog, I will demonstrate Kusto query language code that can be used to parse the Kemp Technologies ESP CEF logs to provide enhanced visibility of the authentication requests that the LoadMaster is receiving and the outcome.
When combining Kemp Web Application Firewall (WAF) and Kemp Edge Security Pack (ESP), LoadMaster becomes an integral part of a Security Information and Event Management (SIEM) system that helps protect networks.
Augmenting password systems is becoming increasingly standard for internet-facing applications and services. This post explains how you can help secure your Internet facing services.
The Trustwave Global Security report demonstrates that most organizations need to do more to mitigate risks to their applications on the web. Kemp can be your partner in achieving this as we have the experience and the tools you need.
What you didn’t know about the Kemp LoadMaster security posture.
- Load BalancerMicrosoft
Summary Microsoft has announced a remote code execution vulnerability in Exchange, CVE-2020-0688. This could allow an unauthenticated user with a mailbox to pass arbitrary objects to be deserialized by the…
This document is intended to provide technical guidance on how to deploy Multi-Factor Authentication (MFA) with Google reCAPTCHA v2 and LDAP using Kemp LoadMaster to a Microsoft Exchange backend application…
This blog post is intended to provide technical guidance on how to deploy Multi-Factor Authentication (MFA) with Google Authenticator (CAPTCHA) using Kemp LoadMaster load balancer to a Microsoft Exchange backend…
Kemp LoadMaster is a great addition to any application delivery or general network infrastructure. In addition to features like application delivery, load balancing, SSL/TLS offloading, and authentication, LoadMaster also helps protect against common web security threats.
Application Security is more important now than ever. The second part of the Kemp security series details how to keep your applications secure with the LoadMaster.
Sometimes that’s how it feels when it comes to security vulnerabilities, herding the organizational cats to understand the latest security vulnerability and respond in a timely and appropriate manner. Typically,…