Kemp is committed to providing the best application experience while at the same time fully embracing the multi-cloud , multi-vendor, and hybrid IT infrastructure that most organizations use. To deliver …
December 18, 2018
WHAT IS THE 4TH INDUSTRIAL REVOLUTION, HOW DOES IT RELATE TO INVISIBLE TECHNOLOGY, AND WHY IS IT IMPORTANT TO KEMP? For those of you who actually paid attention to history …
November 26, 2018
Transport Layer Security (TLS) is a cryptographic protocol that is used to secure communication over a network. The latest specification is TLS 1.2 as defined by the Internet Engineering Task …
by Kurt Jung
September 19, 2018
Microsoft released a public preview of Exchange Server 2019 in July. This early release is designed to let system administrators and technical architects install the next version of Exchange …
by Kurt Jung
September 11, 2018
Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …
August 7, 2018
Injection attack remains at the A1 position on the latest 2017 OWASP Top 10 list of most prevalent security threats for web-based applications. It is straightforward to exploit on systems …
June 6, 2018
Introduction When implementing Windows 10 Always On VPN, eliminating single points of failure is crucial to ensuring the highest levels of productivity for mobile workers. Enabling load balancing for VPN …
January 22, 2018
This document is intended to provide technical guidance on how to deploy a High Available SAP system using KEMP LoadMaster to provide various Application Delivery network services for SAP on …
November 6, 2017
A10 – Underprotected APIs is one of two new additions to the OWASP Top 10 list of threats to web applications. The other new addition is A7 – Insufficient Attack …
September 11, 2017