Tag: LoadMaster

Web Application Firewall (WAF) Insight

This blog details the format of the JavaScript Object Notation (JSON) logs that the LoadMaster Web Application Firewall (WAF) produces and demonstrates how those logs can be exported in real-time from the LoadMaster and provided to log data endpoints including ELK stack and Azure Sentinel.

September 10, 2020

The best known methods on Upgrading Microsoft Exchange 2010

Microsoft will stop support for Exchange 2010 on October 13, 2020. This post will explain the best known methods on upgrading Microsoft exchange 2010.

August 26, 2020

How I made my Web Application highly available on VMWare using Powershell

This post will describe how to ensure your web application is highly available and behind two LoadMasters in a high availability configuration so that we can easily manage all the server nodes if required, spread the total number of connections across all of them, monitor traffic etc. We will achieve this by automating the entire process of deployment, licensing, and configuration, using PowerShell.

August 19, 2020

Migrating Citrix ADC (Netscaler) Exchange Load Balancing to LoadMaster

A step by step guide on how to migrate the Citrix ADC Netscaler Exchange Load Balancig to LoadMaster.

July 17, 2020

Kemp Security Series 2020 – Part 4: LoadMaster and SIEM Log Analysis

Kemp LoadMaster is a great addition to any application delivery or general network infrastructure. In addition to features like application delivery, load balancing, SSL/TLS offloading, and authentication, LoadMaster also helps protect against common web security threats.

June 3, 2020

Kemp Security Series 2020 – Part 3: Identity Access

Augmenting password systems is becoming increasingly standard for internet-facing applications and services. This post explains how you can help secure your Internet facing services.

June 3, 2020

Kemp Security Series 2020 – Part 1: Application Security

The Trustwave Global Security report demonstrates that most organizations need to do more to mitigate risks to their applications on the web. Kemp can be your partner in achieving this as we have the experience and the tools you need.

June 3, 2020

Kemp Security Series 2020 – Part 0: LoadMaster Security

What you didn’t know about the Kemp LoadMaster security posture.

May 21, 2020

Preventing unauthorized SSH access attempts and closing security gaps

The common reasons for SSH vulnerability that you need to know to prevent an attack.

Unlimited Capacity, Unlimited Scale, Unlimited Instances Virtual ADC/Load Balancer…Because You Need it Now

In these challenging times, government, healthcare, and educational institutions (as well as businesses and organizations in all segments of the global economy) are struggling to keep up with the demands …

April 17, 2020

Load balancing applications on Nutanix Hyperconverged Infrastructure (HCI)

The move towards a multi-cloud and software-defined infrastructure stack has been accelerating over the last few years. The use of hyperconverged infrastructure (HCI) has been gathering pace for some time …

Top 6 iRules Kemp Can Do Without the Headache of Writing iRules

Load balancers do not have to be complicated.  They should not require advanced expertise to configure and manage.  Our intention at Kemp is to make the Kemp LoadMaster load balancer, …

March 30, 2020

How to Protect your Microsoft Exchange Servers From Security Vulnerability CVE-2020-0688

Summary Microsoft has announced a remote code execution vulnerability in Exchange, CVE-2020-0688. This could allow an unauthenticated user with a mailbox to pass arbitrary objects to be deserialized by the …

March 24, 2020

Herding Cats: How to Mitigate GhostCat Vulnerability (CVE-2020-1938)

Sometimes that’s how it feels when it comes to security vulnerabilities, herding the organizational cats to understand the latest security vulnerability and respond in a timely and appropriate manner. Typically, …

March 12, 2020

10 Reasons You Need to Monitor Your Load Balancer

When it comes to application delivery monitoring there are a number of approaches that can be taken. Application performance monitoring (APM) enables insight into almost unlimited performance metrics on application …

February 25, 2020

Kemp How to do MFA with Google CAPTCHA blog post image

How to do MFA with Google CAPTCHA using Kemp LoadMaster

This blog post is intended to provide technical guidance on how to deploy Multi-Factor Authentication (MFA) with Google Authenticator (CAPTCHA) using Kemp LoadMaster load balancer to a Microsoft Exchange backend …

January 24, 2020

KEMP Technologies Python SDK

Getting Started with KEMP Python SDK

One of our goals at KEMP is to help our customers move faster. The LoadMaster provides a user-friendly web interface and a REST API to aid in this ideal. In …

January 19, 2017

10th Magnitude

10th Magnitude and KEMP Partner to Simplify Azure Migration

Helping Customers to Simplify Migration to Microsoft Azure Today, 10th Magnitude and KEMP Technologies are pleased to announce our new partnership to help simplify customer adoption of Microsoft Azure solutions. …

January 11, 2017

Blog Posts

16 KEMP Blog Posts You May Have Missed in 2016

16 Posts You May Have Missed in 2016 As we head into 2017, we’ve consolidated some of the news that you may have missed over the last year. Advanced Application …

January 5, 2017

top 16 blog posts

Top 16 KEMP Blog Posts of 2016

Top 16 of 2016 With 2016 behind us, we’ve collected the most popular KEMP blog posts of 2016 in one place so that you can take another look and prepare …

January 5, 2017