Kemp is committed to providing the best application experience while at the same time fully embracing the multi-cloud , multi-vendor, and hybrid IT infrastructure that most organizations use. To deliver …
December 18, 2018
WHAT IS THE 4TH INDUSTRIAL REVOLUTION, HOW DOES IT RELATE TO INVISIBLE TECHNOLOGY, AND WHY IS IT IMPORTANT TO KEMP? For those of you who actually paid attention to history …
November 26, 2018
Transport Layer Security (TLS) is a cryptographic protocol that is used to secure communication over a network. The latest specification is TLS 1.2 as defined by the Internet Engineering Task …
by Kurt Jung
September 19, 2018
Microsoft released a public preview of Exchange Server 2019 in July. This early release is designed to let system administrators and technical architects install the next version of Exchange …
by Kurt Jung
September 11, 2018
Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …
August 7, 2018
Introduction When implementing Windows 10 Always On VPN, eliminating single points of failure is crucial to ensuring the highest levels of productivity for mobile workers. Enabling load balancing for VPN …
January 22, 2018
This document is intended to provide technical guidance on how to deploy a High Available SAP system using KEMP LoadMaster to provide various Application Delivery network services for SAP on …
November 6, 2017
KEMP 360 Central’s availability in the Microsoft Azure Cloud Marketplace, AWS and across many common hypervisor platforms enables customers to provide centralized management, control and orchestration of their application delivery …
August 1, 2017
DirectAccess provides seamless and transparent, always on secure remote access for managed Windows clients. To provide scalability and eliminate single points-of-failure, DirectAccess servers can be configured in load-balanced clusters. Supported …
November 17, 2016
Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident …
November 3, 2016
If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …
November 2, 2016
Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years. …
August 3, 2016
Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …
February 15, 2016
This month marked an exciting milestone for KEMP, and for me personally, as CEO of the company. Gartner published the 2015 Magic Quadrant for Application Delivery Controllers on October 6, …
October 20, 2015
Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …
October 13, 2015
KEMP Technologies’ award-winning LoadMaster range of Load Balancers & Application Delivery Controllers, enhance the resilience and performance of any network in which they are deployed. We believe more organizations should …
June 4, 2015
A free version of our popular VLM application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from …
March 3, 2015
Application Load Balancing: Learn more about the ins and outs of application load balancing and delivery with J.Peter Brusseze and KEMP Technologies in this lesson, we’ll discuss setting up Layer …
July 9, 2014
A look back at how much data and e-mail we’re sending. See our new inforgraphic.
June 27, 2014
Reverse proxy is a vitally important element within application infrastructures to provide an additional layer of security for server instances by retrieving resources on behalf of users located in untrusted …
June 23, 2014