Featured Stories

Latest Stories

10th Magnitude

10th Magnitude and KEMP Partner to Simplify Azure Migration

Helping Customers to Simplify Migration to Microsoft Azure Today, 10th Magnitude and KEMP Technologies are pleased to announce our new partnership to help simplify customer adoption of Microsoft Azure solutions. …

January 11, 2017

Blog Posts

16 KEMP Blog Posts You May Have Missed in 2016

16 Posts You May Have Missed in 2016 As we head into 2017, we’ve consolidated some of the news that you may have missed over the last year. Advanced Application …

January 5, 2017

top 16 blog posts

Top 16 KEMP Blog Posts of 2016

Top 16 of 2016 With 2016 behind us, we’ve collected the most popular KEMP blog posts of 2016 in one place so that you can take another look and prepare …

January 5, 2017

Direct-Access

Load Balancing DirectAccess with the KEMP Loadmaster Load Balancer

DirectAccess provides seamless and transparent, always on secure remote access for managed Windows clients. To provide scalability and eliminate single points-of-failure, DirectAccess servers can be configured in load-balanced clusters. Supported …

November 17, 2016

Migrating DirectAccess from NLB to KEMP LoadMaster Load Balancers

Enabling load balancing for the DirectAccess workload is crucial to eliminating single points of failure. This ensures the highest level of availability, and most importantly productivity, for remote workers. Previously …

November 16, 2016

DNS, Load Balancing and DDOS attacks

Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident …

November 3, 2016

Kemp Default Blog Image

Using a WAF to help Deliver PCI DSS

If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …

November 2, 2016

Kemp Default Blog Image

Application Centric DDOS Protection

Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years. …

August 3, 2016

Top 15 Tips to Increase Exchange Security

Email is an essential business enabler in most organizations. Emails are also considered as legal transactions just like any other document created and circulated by a company. It is therefore …

June 28, 2016