Featured Stories

Latest Stories

Meeting Federal Architecture Requirements

Federal IT projects that go out to tender are required to select bids that deliver the least cost technically acceptable solution. The Federal requirements included in network and application-centric procurements …

June 19, 2019

Kemp Default Blog Image

Our New Kemp Brand Identity is Aligned with Application Experience

Our mission statement at Kemp is really quite simple: Provide invisible technology with a visible impact. In line with this, I’m very excited to announce Kemp’s newly recharged identity and …

February 20, 2019

1920x1080_PPT_KEMP_Nutanix

Nutanix and Kemp enable powerful multi-cloud architecture

Kemp is committed to providing the best application experience while at the same time fully embracing the multi-cloud , multi-vendor, and hybrid IT infrastructure that most organizations use. To deliver …

December 18, 2018

KEMP Multicloud

THE 4TH INDUSTRIAL REVOLUTION

WHAT IS THE 4TH INDUSTRIAL REVOLUTION, HOW DOES IT RELATE TO INVISIBLE TECHNOLOGY, AND WHY IS IT IMPORTANT TO KEMP? For those of you who actually paid attention to history …

November 26, 2018

TLS 1.2 Image

Enabling TLS 1.2 on Exchange Server 2013 & 2016 – Part 1

Transport Layer Security (TLS) is a cryptographic protocol that is used to secure communication over a network. The latest specification is TLS 1.2 as defined by the Internet Engineering Task …

September 19, 2018

Kemp Default Blog Image

Exchange Server 2019 Public Preview Compared to Previous Releases

Microsoft released a public preview of Exchange Server 2019 in July. This early release is designed to let system administrators and technical architects install the next version of Exchange …

September 11, 2018

F5 Migrate KEMP

KEMP Rules Migration for Legacy F5 LTM Local Traffic Manager with iRules

Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …

August 7, 2018

OWASP 2017 – A1 Injection

Injection attack remains at the A1 position on the latest 2017 OWASP Top 10 list of most prevalent security threats for web-based applications. It is straightforward to exploit on systems …

Always on VPN

Always On VPN Redundancy and Failover with KEMP LoadMaster GEO

Introduction When implementing Windows 10 Always On VPN, eliminating single points of failure is crucial to ensuring the highest levels of productivity for mobile workers. Enabling load balancing for VPN …

January 22, 2018