Schon immer schätzen Menschen ihre eigene Sicherheit falsch ein. Eine der bekanntesten Geschichten dazu stammt aus dem Krieg zwischen Griechenland und Troja. Die Trojaner waren sich sicher, dass Troja uneinnehmbar…
When combining Kemp Web Application Firewall (WAF) and Kemp Edge Security Pack (ESP), LoadMaster becomes an integral part of a Security Information and Event Management (SIEM) system that helps protect networks.
This post will describe how to ensure your web application is highly available and behind two LoadMasters in a high availability configuration so that we can easily manage all the server nodes if required, spread the total number of connections across all of them, monitor traffic etc. We will achieve this by automating the entire process of deployment, licensing, and configuration, using PowerShell.
A step by step guide on how to migrate the Citrix ADC Netscaler Exchange Load Balancig to LoadMaster.
Augmenting password systems is becoming increasingly standard for internet-facing applications and services. This post explains how you can help secure your Internet facing services.
The Trustwave Global Security report demonstrates that most organizations need to do more to mitigate risks to their applications on the web. Kemp can be your partner in achieving this as we have the experience and the tools you need.
The common reasons for SSH vulnerability that you need to know to prevent an attack.
- Load Balancer
Unlimited Capacity, Unlimited Scale, Unlimited Instances Virtual ADC/Load Balancer…Because You Need it Now
In these challenging times, government, healthcare, and educational institutions (as well as businesses and organizations in all segments of the global economy) are struggling to keep up with the demands…
Load balancers do not have to be complicated. They should not require advanced expertise to configure and manage. Our intention at Kemp is to make the Kemp LoadMaster load balancer,…
- Load BalancerMicrosoft
Summary Microsoft has announced a remote code execution vulnerability in Exchange, CVE-2020-0688. This could allow an unauthenticated user with a mailbox to pass arbitrary objects to be deserialized by the…
Sometimes that’s how it feels when it comes to security vulnerabilities, herding the organizational cats to understand the latest security vulnerability and respond in a timely and appropriate manner. Typically,…
- Load Balancer
Monitoring your Load Balancer for Actionable Insight in 5 Simple Steps – How to install Kemp 360 Vision
If you have deployed a load balancer you are on the road to full application availability as a result of application redundancy. This is great, but in order to fully…
This blog post is intended to provide technical guidance on how to deploy Multi-Factor Authentication (MFA) with Google Authenticator (CAPTCHA) using Kemp LoadMaster load balancer to a Microsoft Exchange backend…
Microsoft will stop support for Exchange 2010 on October 13, 2020. This post will explain the best known methods on upgrading Microsoft exchange 2010.
Kemp LoadMaster is a great addition to any application delivery or general network infrastructure. In addition to features like application delivery, load balancing, SSL/TLS offloading, and authentication, LoadMaster also helps protect against common web security threats.
What you didn’t know about the Kemp LoadMaster security posture.
The move towards a multi-cloud and software-defined infrastructure stack has been accelerating over the last few years. The use of hyperconverged infrastructure (HCI) has been gathering pace for some time…
Companies and employees all over the world have been moving to a remote or telecommuting strategy recently. From 2006 to 2016, the percentage of Americans working from home has increased…
When it comes to application delivery monitoring there are a number of approaches that can be taken. Application performance monitoring (APM) enables insight into almost unlimited performance metrics on application…