Category: Load Balancing

How to do MFA with Google CAPTCHA using Kemp LoadMaster

This blog post is intended to provide technical guidance on how to deploy Multi-Factor Authentication (MFA) with Google Authenticator (CAPTCHA) using Kemp LoadMaster load balancer to a Microsoft Exchange backend …

January 24, 2020

How the cloud is changing Application Delivery

The State of Application Experience [AX] 2019 Report from Kemp has highlighted some interesting points on how the move to cloud is changing the way applications are delivered. Moving to …

November 19, 2019

How Load Balancer Licensing and Consumption Impacts IT Agility

IT system agility is an essential design criterion for modern web, cloud, and hybrid application delivery. The ability to flex provision as demand changes needs to be built into designs …

October 21, 2019

Pay-As-You-Go Load Balancing for VMware Cloud on AWS

VMware virtualization solutions provide the foundation for many of the applications and systems at the core of the modern business. The advent of VMware Cloud™ on AWS has allowed many …

August 26, 2019

Our New Kemp Brand Identity is Aligned with Application Experience

Our mission statement at Kemp is really quite simple: Provide invisible technology with a visible impact. In line with this, I’m very excited to announce Kemp’s newly recharged identity and …

February 20, 2019

Nutanix and Kemp enable powerful multi-cloud architecture

Kemp is committed to providing the best application experience while at the same time fully embracing the multi-cloud , multi-vendor, and hybrid IT infrastructure that most organizations use. To deliver …

December 18, 2018

THE 4TH INDUSTRIAL REVOLUTION

WHAT IS THE 4TH INDUSTRIAL REVOLUTION, HOW DOES IT RELATE TO INVISIBLE TECHNOLOGY, AND WHY IS IT IMPORTANT TO KEMP? For those of you who actually paid attention to history …

November 26, 2018

Enabling TLS 1.2 on Exchange Server 2013 & 2016 – Part 1

Transport Layer Security (TLS) is a cryptographic protocol that is used to secure communication over a network. The latest specification is TLS 1.2 as defined by the Internet Engineering Task …

September 19, 2018

Exchange Server 2019 Public Preview Compared to Previous Releases

Microsoft released a public preview of Exchange Server 2019 in July. This early release is designed to let system administrators and technical architects install the next version of Exchange …

September 11, 2018

KEMP Rules Migration for Legacy F5 LTM Local Traffic Manager with iRules

Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …

August 7, 2018

Always On VPN Redundancy and Failover with KEMP LoadMaster GEO

Introduction When implementing Windows 10 Always On VPN, eliminating single points of failure is crucial to ensuring the highest levels of productivity for mobile workers. Enabling load balancing for VPN …

January 22, 2018

Highly Available SAP in Azure with KEMP Load Balancers

This document is intended to provide technical guidance on how to deploy a High Available SAP system using KEMP LoadMaster to provide various Application Delivery network services for SAP on …

November 6, 2017

3 Benefits KEMP 360™ Central Provides for Your Application Delivery Fabric

KEMP 360 Central’s availability in the Microsoft Azure Cloud Marketplace, AWS and across many common hypervisor platforms enables customers to provide centralized management, control and orchestration of their application delivery …

August 1, 2017

Load Balancing DirectAccess with the KEMP Loadmaster Load Balancer

DirectAccess provides seamless and transparent, always on secure remote access for managed Windows clients. To provide scalability and eliminate single points-of-failure, DirectAccess servers can be configured in load-balanced clusters. Supported …

November 17, 2016

DNS, Load Balancing and DDOS attacks

Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident …

November 3, 2016

Using a WAF to help Deliver PCI DSS

If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …

November 2, 2016

Application Centric DDOS Protection

Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years. …

August 3, 2016

Top 15 consideration before deploying Skype for Business Server 2015 in your Environment

Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …

February 15, 2016

KEMP Technologies – The only Visionary ADC Vendor

This month marked an exciting milestone for KEMP, and for me personally, as CEO of the company. Gartner published the 2015 Magic Quadrant for Application Delivery Controllers on October 6, …

October 20, 2015

OWASP Top Ten Series: Cross Site Scripting

Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …

October 13, 2015