Federal IT projects that go out to tender are required to select bids that deliver the least cost technically acceptable solution. The Federal requirements included in network and application-centric procurements …
by Mike Bomba
June 19, 2019
Our mission statement at Kemp is really quite simple: Provide invisible technology with a visible impact. In line with this, I’m very excited to announce Kemp’s newly recharged identity and …
February 20, 2019
Kemp is committed to providing the best application experience while at the same time fully embracing the multi-cloud , multi-vendor, and hybrid IT infrastructure that most organizations use. To deliver …
December 18, 2018
WHAT IS THE 4TH INDUSTRIAL REVOLUTION, HOW DOES IT RELATE TO INVISIBLE TECHNOLOGY, AND WHY IS IT IMPORTANT TO KEMP? For those of you who actually paid attention to history …
November 26, 2018
Transport Layer Security (TLS) is a cryptographic protocol that is used to secure communication over a network. The latest specification is TLS 1.2 as defined by the Internet Engineering Task …
by Kurt Jung
September 19, 2018
Microsoft released a public preview of Exchange Server 2019 in July. This early release is designed to let system administrators and technical architects install the next version of Exchange …
by Kurt Jung
September 11, 2018
Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …
August 7, 2018
Injection attack remains at the A1 position on the latest 2017 OWASP Top 10 list of most prevalent security threats for web-based applications. It is straightforward to exploit on systems …
June 6, 2018
Introduction When implementing Windows 10 Always On VPN, eliminating single points of failure is crucial to ensuring the highest levels of productivity for mobile workers. Enabling load balancing for VPN …
January 22, 2018