Maurice McMullin

Maurice McMullin is a Principal Product Marketing Manager in Kemp with too many years of experience in the development and marketing of networking and security products. He has worked in organizations of all sizes ranging from two person startups through to multinationals in roles as varied as programmer and CTO.

Implement Single Sign-On and Pre-Authentication for any application with Okta and Progress Kemp LoadMaster

Organizations experience a challenge in making applications easily available anytime and anywhere while also maintaining the balance between access security and user experience. Today, application access patterns have moved towards …

August 2, 2022

Healthcare Organizations are Under Pressure – Progress Kemp Load Balancer Has Your Back

For IT teams tasked with keeping applications available, the last few years were a challenge. Sizing infrastructure correctly to deliver the best application experience at a reasonable cost is a …

May 18, 2022

How the cloud is changing Application Delivery

The State of Application Experience [AX] 2019 Report from Kemp has highlighted some interesting points on how the move to cloud is changing the way applications are delivered. Moving to …

November 19, 2019

F5 Migrate KEMP

KEMP Rules Migration for Legacy F5 LTM Local Traffic Manager with iRules

Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …

August 7, 2018

OWASP 2017 – A1 Injection

Injection attack remains at the A1 position on the latest 2017 OWASP Top 10 list of most prevalent security threats for web-based applications. It is straightforward to exploit on systems …

June 6, 2018

Differences Between Legacy Application Delivery and Application Delivery Fabric

The way applications are developed and delivered is rapidly changing. The adoption of Agile methodology, DevOps practices, and multi-cloud hybrid platform delivery means that the load balancing infrastructure practices of …

February 14, 2018

OWASP 2017 A10 – Underprotected APIs

A10 – Underprotected APIs is one of two new additions to the OWASP Top 10 list of threats to web applications. The other new addition is A7 – Insufficient Attack …

September 11, 2017

Kemp Default Blog Image

SDN and NFV – Better Together

Software Defined Networking (SDN) and Network Function Virtualization (NFV) are significant and exciting developments in the field of computer networking. They are great individually, but when deployed together with automation …

July 25, 2017

DNS, Load Balancing and DDOS attacks

Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident …

November 3, 2016

Kemp Default Blog Image

Using a WAF to help Deliver PCI DSS

If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …

November 2, 2016

Top 15 Tips to Increase Exchange Security

Email is an essential business enabler in most organizations. Emails are also considered as legal transactions just like any other document created and circulated by a company. It is therefore …

June 28, 2016

Kemp Default Blog Image

Top 15 consideration before deploying Skype for Business Server 2015 in your Environment

Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …

February 15, 2016