Featured Stories

Latest Stories

Infografik F5 Kemp Load Balancer

Warum bevorzugen Kunden den Load Balancer von Kemp gegenüber F5?

Mitte der 1990er Jahre, lange bevor Begriffe wie Virtualisierung, Public Clouds oder Software-Defined-Infrastrukturen die IT-Welt beherrschten, brachte F5 seinen vielverkauften Load Balancer erstmals auf den Markt. Seitdem blieb kein Chip mehr lange auf dem anderen: In Zeiten der digitalen Transformation sehen IT-Architekturen völlig anders aus; nicht alle einst beliebten Produkte vermögen es, die aktuellen Ansprüche der Nutzer zu erfüllen.

January 28, 2023

OpenSSL Vulnerability: What You Need to Know

OpenSSL Vulnerability: What You Need To Know

At Progress, security is a top priority. Upon notification, we conducted a thorough review of the Progress product portfolio, and our internal diligence indicates that our products are not using the impacted version of OpenSSL as shipped and/or deployed.

November 1, 2022

Securing Network Access for Modern-Day Hybrid Workplaces with Zero Trust

The working model in business has dramatically shifted over the last few years — a trend accelerated by the pandemic. The shifting to a work-from-home environment has provided proof that …

October 24, 2022

Adding Layered Security to Cloud Applications

The internet is a dangerous place, with many bad actors using automated tools to attack organizations of all sizes, 24 hours a day, seven days a week. Regardless of your …

October 17, 2022

What’s At Stake If Your Business Is Hit With a DDoS Attack

Distributed Denial of Service, referred to as DDoS, attacks are a fact of life in the modern business landscape. Any company with an online presence is, unfortunately, vulnerable to DDoS attacks …

October 11, 2022

Microsoft Offers Zero-Day Exchange Exploit Workaround: LoadMaster Load Balancers Block and Repair Zero-Day Attacks

In recent days, two zero-day vulnerabilities against Microsoft on-premises Exchange Servers have been publicized and attacked. The good news is Exchange Cloud users, such as Microsoft 365 customers, need not …

October 6, 2022

Application Delivery the CIO Will Thank You For

Do you remember the biggest problem Microsoft had in the early days of selling Windows? It was too slow. While the visual user experience was compelling, the lag of the …

October 4, 2022

Web Traffic Encryption with TLS/SSL and Progress Kemp LoadMaster

Protecting your organization from the ever-changing threat landscape requires a defense strategy that deploys multiple technologies and human factors at multiple levels. One of the most important is data encryption …

September 27, 2022

How a DDoS Attack Works: History, Mitigation and Remediation

Distributed Denial of Service (DDoS). The words and the letters themselves create foreboding. Whatever it is, it is bad. Hackers do it, it causes damage, and only IT pros seemingly …

September 22, 2022