Cloud topics and discussion (hybrid/public/private)
This blog will run through the prerequisites and steps to deploy and run the Progress Kemp LoadMaster in Google Cloud. The accompanying video is available here. Prerequisites: 1. Ensure you…
Cloud topics and discussion (hybrid/public/private)
This blog will run through the prerequisites and steps to deploy and run the Progress Kemp LoadMaster in Google Cloud. The accompanying video is available here. Prerequisites: 1. Ensure you…
News recently broke of a serious security vulnerability found in Windows Containers. This security flaw has been exposed in the wild by a newly discovered malware named ‘Siloscape’. The vulnerability enables…
Storage is exciting and hot. Who would have predicted that sentiment 15 years ago? Data is needed for everything from artificial intelligence (AI) to the storage of the more than 500 hours of…
Introduction Following on from last weeks Kuberntes introduction, this week we look at the impact of Kubernetes on network Administrators. Lately, there is massive interest in the move to microservice…
Cloud-first deployment is the choice of many organizations when they are looking to roll out new applications and services, or when they come to upgrade existing ones. The benefits of…
Kemp, the leader in powering always-on application experience [AX], has aquired Flowmon Networks, a leader in actionable network intelligence solutions for network and security operations (NetSecOps) teams.
The IT sector, like all specialized industries, has developed language shorthand and words to make communication easier. Everyone is expected to know what they mean so that conversations and writing…
To help you find the right load balancer for your application we listed 7 reasons why you should consider the Kemp LoadMaster instead of F5’s BIG-IP.
In this blog, I will demonstrate Kusto query language code that can be used to parse the Kemp Technologies ESP CEF logs to provide enhanced visibility of the authentication requests that the LoadMaster is receiving and the outcome.
As the adoption of cloud continues to grow in the enterprise and small organizations alike, some challenges are presented on how to leverage the same set of credentials for protecting both the cloud native and legacy applications. When it comes to Microsoft Azure, most of the cloud native applications include seamless integration with Azure AD with added support for Multi-Factor Authentication (MFA) to secure these solutions.
When combining Kemp Web Application Firewall (WAF) and Kemp Edge Security Pack (ESP), LoadMaster becomes an integral part of a Security Information and Event Management (SIEM) system that helps protect networks.
Microsoft will stop support for Exchange 2010 on October 13, 2020. This post will explain the best known methods on upgrading Microsoft exchange 2010.
Preventing outages requires knowledge of what frequently causes them, and then learning how to mitigate the risks. Let’s take a look at the leading causes of outages and how you can mitigate them.
Some of the ways that LoadMaster load balancers can help with application delivery in a modern hybrid cloud environment.
So, we are going to see a shift in how networks delivering applications and services are configured. This begs the question: Does the trend towards edge computing impact how load balancing technology is applied?
Many organizations are embracing the cloud and deploying applications via public and private cloud servers. When using this deployment model, it is still essential to include load balancers in the…
What you didn’t know about the Kemp LoadMaster security posture.
The move towards a multi-cloud and software-defined infrastructure stack has been accelerating over the last few years. The use of hyperconverged infrastructure (HCI) has been gathering pace for some time…
The world is getting automated. We have self-driving cars that can navigate roads and avoid obstacles. There are virtual assistants that can search the internet for answers to your most…
As application development teams in the organization are taking more ownership of the business-critical applications, the NetOps team can transfer some responsibilities such as application publishing. While the system configuration…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More