Kemp Technologies is delighted to announce the availability of the Kemp LoadMaster Content Rule Builder tool.
load balancer
-
Introduction Catch up on last weeks post on the Impact of Kubernetes on Network Administrators here. Container based microservice applications, provide benefits to the development and operation of applications and…
-
Introduction Following on from last weeks Kuberntes introduction, this week we look at the impact of Kubernetes on network Administrators. Lately, there is massive interest in the move to microservice…
-
We recently delivered a webinar outlining why Kemp LoadMaster is a better option than Citrix ADC (formally Citrix NetScaler) as a load balancing solution. During the webinar We outlined five…
-
Having the right data in the right place continues to be a critical mandate for IT professionals responsible for instrumenting and maintaining application ecosystems. While it’s become easier to have…
-
Kemp, the leader in powering always-on application experience [AX], has aquired Flowmon Networks, a leader in actionable network intelligence solutions for network and security operations (NetSecOps) teams.
-
The IT sector, like all specialized industries, has developed language shorthand and words to make communication easier. Everyone is expected to know what they mean so that conversations and writing…
-
Beyond the excitement Kemp selfishly has for winning this award, you should look a level deeper at the significance the load balancer or application delivery controller (ADC) has for being recognized in such a significant category. It’s not only symbolic of how our networks and the use of IT resources have evolved throughout the Coronavirus, but indicative of the new challenges IT professionals currently face in a year none of us will forget.
-
In this post, I will show how to utilise Ansible via Kemp 360 Central to setup ESP Exchange 2013 services, while outlining how to create a LDAP authentication and SSO…
-
Die gängigsten Load Balancer oder auch Application Delivery Controller (ADC) genannt, mischen den traditionellen einfachen Lastausgleich auf Layer 4 mit der fortschrittlicheren, anwendung-sessitiven Content-Switching-Technologie auf Layer 7 (aus dem OSI-Modell…
- AzureCloudLoad BalancerMicrosoft
Legacy Applications + Azure AD = Secure Hybrid Access (SHA)
by Kurt JungAs the adoption of cloud continues to grow in the enterprise and small organizations alike, some challenges are presented on how to leverage the same set of credentials for protecting both the cloud native and legacy applications. When it comes to Microsoft Azure, most of the cloud native applications include seamless integration with Azure AD with added support for Multi-Factor Authentication (MFA) to secure these solutions.
-
Cisco trennt sich konsequent von Geschäftsbereichen, die die Erwartungen nicht erfüllen. Zuletzt waren dies die Tablets der Cius-Reihe und die Consumer-Kameras Flix. Neuestes Opfer sind die Application Control Engine (ACE) 30…
-
When combining Kemp Web Application Firewall (WAF) and Kemp Edge Security Pack (ESP), LoadMaster becomes an integral part of a Security Information and Event Management (SIEM) system that helps protect networks.
-
This blog details the format of the JavaScript Object Notation (JSON) logs that the LoadMaster Web Application Firewall (WAF) produces and demonstrates how those logs can be exported in real-time from the LoadMaster and provided to log data endpoints including ELK stack and Azure Sentinel.
As a certified Citrix Network Engineer my experience of Citrix NetScaler load balancing (now known as Citrix ADC) has changed over the years. I was first introduced into Citrix technologies…
For the last seven years BMC has been identified by Gartner as a leader for IT Service Management Tools. With the recent increase in the remote and mobile workforce, enterprise…
This Load Balancing Design Flaw is Why Kemp is Better than F5
To help you find the right load balancer for your application we listed 7 reasons why you should consider the Kemp LoadMaster instead of F5’s BIG-IP.
In this blog, I will demonstrate Kusto query language code that can be used to parse the Kemp Technologies ESP CEF logs to provide enhanced visibility of the authentication requests that the LoadMaster is receiving and the outcome.
Schon immer schätzen Menschen ihre eigene Sicherheit falsch ein. Eine der bekanntesten Geschichten dazu stammt aus dem Krieg zwischen Griechenland und Troja. Die Trojaner waren sich sicher, dass Troja uneinnehmbar…
The most popular load balancers or application delivery controllers mix traditional simple Layer 4 load balancing with the more advanced application sensitive Layer 7 (Taken from the OSI model) content…