Introduction In our previous blogs, we introduced Kubernetes, explained the challenges it brings for Network administrators, particularly exposing Kubernetes services for access. We also looked in detail at the Ingress Controller and its functionality in controlling…
Kemp LoadMaster
-
What is HashiCorp Vault HashiCorp Vault is a secret management tool which allows you to secure, store and tightly control access to various types of sensitive data including tokens, passwords, certificates, and encryption keys. Vault provides a unified…
-
ADCLoad BalancerMicrosoft
Microsoft Exchange Security Vulnerabilities Mitigation using Kemp LoadMaster
Due to the recent Microsoft Vulnerabilities this post explains how Kemp LoadMaster provides mitigation and protection against such attacks.
-
Kemp Technologies is delighted to announce the availability of the Kemp LoadMaster Content Rule Builder tool.
-
Introduction Catch up on last weeks post on the Impact of Kubernetes on Network Administrators here. Container based microservice applications, provide benefits to the development and operation of applications and…
-
CloudHybrid CloudLoad Balancer
This Load Balancing Design Flaw is Why Kemp is Better than F5
by Frank YueTo help you find the right load balancer for your application we listed 7 reasons why you should consider the Kemp LoadMaster instead of F5’s BIG-IP.
-
In this blog, I will demonstrate Kusto query language code that can be used to parse the Kemp Technologies ESP CEF logs to provide enhanced visibility of the authentication requests that the LoadMaster is receiving and the outcome.
-
Schon immer schätzen Menschen ihre eigene Sicherheit falsch ein. Eine der bekanntesten Geschichten dazu stammt aus dem Krieg zwischen Griechenland und Troja. Die Trojaner waren sich sicher, dass Troja uneinnehmbar…
-
Many organizations are embracing the cloud and deploying applications via public and private cloud servers. When using this deployment model, it is still essential to include load balancers in the…
-
Nearly 20 years ago, Kemp entered the application delivery scene with a focus on easy to use products built through customer-centric development. Fast forward, and we now have more than…
-
ADCAnsibleCloudLoad BalancerReverse Proxy
Automating Always-On Application Experience with Ansible
by Kurt JungAs application development teams in the organization are taking more ownership of the business-critical applications, the NetOps team can transfer some responsibilities such as application publishing. While the system configuration…
-
CloudLoad Balancer
Fueling R&D and Indian subcontinent business growth with Lithops acquisition
by Ray DownesIt’s an exciting time for Kemp, having just closed 2019 with record global revenue and profits, we have also announce the acquisition of Lithops Technologies, a top developer of application…
-
Load Balancer
ISVs and service providers rejoice, from lightweight load balancer hardware to uncapped virtual load balancer throughput
Today, ISVs and service providers are continuously challenged to offer differentiated, dedicated and managed hybrid cloud offerings. To fill this customer need, we are delighted to announce the addition of…
-
Providing seamless, secure access to web applications for users is vital for many organizations. With more and more users accessing business applications via the web and from mobile devices, the…
Businesses are putting their applications and sites in the cloud assuming that the ubiquitous concept of the cloud will ensure application and data availability. Recently, Europe’s largest cloud provider, and the…
For the last seven years BMC has been identified by Gartner as a leader for IT Service Management Tools. With the recent increase in the remote and mobile workforce, enterprise…
Legacy Applications + Azure AD = Secure Hybrid Access (SHA)
As the adoption of cloud continues to grow in the enterprise and small organizations alike, some challenges are presented on how to leverage the same set of credentials for protecting both the cloud native and legacy applications. When it comes to Microsoft Azure, most of the cloud native applications include seamless integration with Azure AD with added support for Multi-Factor Authentication (MFA) to secure these solutions.
A how to guide on how to troubleshoot the Kemp LoadMaster.
Monitoring your Load Balancer for Actionable Insight in 5 Simple Steps – How to install Kemp 360 Vision
If you have deployed a load balancer you are on the road to full application availability as a result of application redundancy. This is great, but in order to fully…
As more businesses across Australia embrace hyperscale cloud platforms, Kemp needed a partner that understands the application experience [AX] challenges customers are faced with, as well as the important role…