Featured Stories

Latest Stories

Kemp Default Blog Image

Experience the KEMP Advantage – Riverbed SteelApp Replacement Program

KEMP Technologies’ award-winning LoadMaster range of Load Balancers & Application Delivery Controllers, enhance the resilience and performance of any network in which they are deployed. We believe more organizations should …

Free Loadbalancel

Announcing the New FREE LoadMaster™ Application Load Balancer

A free version of our popular VLM application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from …

keymanagementwith-Kemp

La seguridad en un balanceador de cargar, HA ( alta disponibilidad ) y Reverse Proxy

Un Proxy inverso es un elemento de vital importancia dentro de las infraestructuras de aplicaciones para proporcionar una capa adicional de seguridad para las instancias del servidor mediante la recuperación…

January 13, 2015

WAF – Web Application Firewall 101

Traditional network firewalls placed in front web servers offer protection by limiting webserver access to the HTTP and HTTPS protocol ports – normally port 80 and 443. This approach prevents …

November 25, 2014

Dude, Where’s My Reverse Proxy?!

In the past the “Reverse Proxy” shown in the diagram below would have said “TMG”, Microsoft’s Threat Management Gateway product. With that option no longer available a lot of people …

August 19, 2014

Kemp Default Blog Image

How to Configure Layer 4 Virtual Services with @KEMPtech

Application Load Balancing: Learn more about the ins and outs of application load balancing and delivery with J.Peter Brusseze and KEMP Technologies in this lesson, we’ll discuss setting up Layer …

Kemp Default Blog Image

A look back at how much data and e-mail we’re sending

A look back at how much data and e-mail we’re sending. See our new inforgraphic.

Kemp Default Blog Image

HA (High Availability) and Reverse Proxy Security From a Load Balancer

Reverse proxy is a vitally important element within application infrastructures to provide an additional layer of security for server instances by retrieving resources on behalf of users located in untrusted …

Kemp Default Blog Image

How to Choose a Load Balancer for Microsoft Exchange

When your organization is in the market for a load balancer, and you happen to find yourself as the one tasked with the project, it can be a bit confusing …