Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …
August 7, 2018
The way applications are developed and delivered is rapidly changing. The adoption of Agile methodology, DevOps practices, and multi-cloud hybrid platform delivery means that the load balancing infrastructure practices of …
February 14, 2018
Introduction When implementing Windows 10 Always On VPN, eliminating single points of failure is crucial to ensuring the highest levels of productivity for mobile workers. Enabling load balancing for VPN …
January 22, 2018
This document is intended to provide technical guidance on how to deploy a High Available SAP system using KEMP LoadMaster to provide various Application Delivery network services for SAP on …
November 6, 2017
KEMP 360 Central’s availability in the Microsoft Azure Cloud Marketplace, AWS and across many common hypervisor platforms enables customers to provide centralized management, control and orchestration of their application delivery …
August 1, 2017
DirectAccess provides seamless and transparent, always on secure remote access for managed Windows clients. To provide scalability and eliminate single points-of-failure, DirectAccess servers can be configured in load-balanced clusters. Supported …
November 17, 2016
Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident …
November 3, 2016
If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …
November 2, 2016
Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years. …
August 3, 2016
Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …
February 15, 2016
This month marked an exciting milestone for KEMP, and for me personally, as CEO of the company. Gartner published the 2015 Magic Quadrant for Application Delivery Controllers on October 6, …
October 20, 2015
Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …
October 13, 2015
KEMP Technologies’ award-winning LoadMaster range of Load Balancers & Application Delivery Controllers, enhance the resilience and performance of any network in which they are deployed. We believe more organizations should …
June 4, 2015
A free version of our popular VLM application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from …
March 3, 2015
Обратный прокси является жизненно важным элементом в инфраструктуре приложений для обеспечения дополнительного уровня безопасности для сервера, посредством проверки имен пользователей, расположенных в ненадежных зонах, а также публикаций веб сервисов .…
January 19, 2015
Die Reverse Proxy Funktionalität ist ein wichtiges Element von Anwendungs-Infrastrukturen, durch die eine zusätzliche Sicherheitsebene zum Schutz der Anwendungs-Server geschaffen wird. Reverse Proxies dienen zur Bereitstellung von Anwendungen außerhalb der…
January 15, 2015
Un Proxy inverso es un elemento de vital importancia dentro de las infraestructuras de aplicaciones para proporcionar una capa adicional de seguridad para las instancias del servidor mediante la recuperación…
January 13, 2015
Application Load Balancing: Learn more about the ins and outs of application load balancing and delivery with J.Peter Brusseze and KEMP Technologies in this lesson, we’ll discuss setting up Layer …
July 9, 2014
A look back at how much data and e-mail we’re sending. See our new inforgraphic.
June 27, 2014
Reverse proxy is a vitally important element within application infrastructures to provide an additional layer of security for server instances by retrieving resources on behalf of users located in untrusted …
June 23, 2014