Category: Load Balancer

La seguridad en un balanceador de cargar, HA ( alta disponibilidad ) y Reverse Proxy

Posted on

Un Proxy inverso es un elemento de vital importancia dentro de las infraestructuras de aplicaciones para proporcionar una capa adicional de seguridad para las instancias del servidor mediante la recuperación…
Read More

Latest Stories

How To Use Progress Kemp LoadMaster for Oracle Cloud Infrastructure (OCI)

Oracle Cloud Infrastructure (OCI) is a cloud computing service offered by Oracle Corporation providing servers, storage, network, applications, and services through a global network of Oracle’s managed data centers. The …

August 4, 2022

Implement Single Sign-On and Pre-Authentication for any application with Okta and Progress Kemp LoadMaster

Organizations experience a challenge in making applications easily available anytime and anywhere while also maintaining the balance between access security and user experience. Today, application access patterns have moved towards …

August 2, 2022

Making OpenEdge All It Can Be with LoadMaster

Progress customers build some of their most mission-critical applications with the OpenEdge application development platform. Many have also taken the next step, moving these applications to the Progress Application Server …

July 28, 2022

Choosing a Load Balancer: A Buyer’s Guide to Success

Digital infrastructure has become essential to many parts of modern life. It’s hard to think of anything that digital delivery doesn’t touch in some way – shopping, banking, healthcare, entertainment, …

Secure and Optimize eHealth Applications and Gain Reliable Delivery, Resiliency

eHealth applications are reshaping healthcare as we know it and modernizing how healthcare providers:  Compile and store computer-based patient records  Schedule patients, physicians, technicians, and facilities   Store and retrieve digital …

July 19, 2022

Legacy Application Security 101: Protecting enterprises from malicious cyberattacks

Many organizations have legacy applications in use that are delivering essential business functionality. But many of these applications cannot use modern security features available to those built on current technology …

June 9, 2022

Healthcare Organizations are Under Pressure – Progress Kemp Load Balancer Has Your Back

For IT teams tasked with keeping applications available, the last few years were a challenge. Sizing infrastructure correctly to deliver the best application experience at a reasonable cost is a …

A, B, C, D, E(LK) plus LM WAF Equals stunning visualization!

This blog will run through creating dashboards in the ELK (Elasticsearch, Logstash, Kibana) Stack to gain further insight into the LoadMaster WAF (Web Application Firewall). ELK Stack The ELK Stack …

January 20, 2022

How Does Ransomware Spread?

The question in the title of this article gets asked frequently. Those asking it often have two separate subjects in mind: How does ransomware initially infect an organization, and How …

November 30, 2021

Preventing A Facebook Type Services Outage

The October the 4th service outage at Facebook, which also took Instagram and WhatsApp offline, had a major impact on many people. An outage of services that have billions of …

November 25, 2021

Charting the course with Kemp Ingress Controller (KIC)

The numbers on the adoption of Kubernetes vary from report to report, but there can be no argument that the trust organizations have with Kubernetes is increasing year to year …

November 2, 2021

Manage security threats with MITRE ATT&CK Framework

Kemp Technology Evangelist Frank Yue recently posted a blog post called What Is The MITRE ATT&CK Framework? that describes how organizations can use the MITRE ATT&CK framework to bolster their cybersecurity defenses.  …

October 21, 2021

The EMA Radar Report on Network Performance Management Tools

Delivering secure applications to end-users is an increasingly complex task. The ransomware threat from cybercriminals has been in the news frequently in the last year. Plus, other cyberthreats haven’t gone …

October 8, 2021

Power(Shell) your WAF deployment

It is nice to develop scripts that you can use to configure your load balancer and Web Application Firewall (WAF).  The scripts can help integrate these services into your network orchestration …

October 7, 2021

Progress to Acquire Kemp

I’m excited to share that Progress (NASDAQ: PRGS) today announced that it will acquire Kemp, bringing our LoadMaster ADC and Flowmon network visibility products into its extensive and complementary product portfolio. This …

September 23, 2021

General Availability of LoadMaster 7.2.55.0

Kemp was pleased to announce the availability of LMOS Version 7.2.55.0 to all customers on September 15, 2021. The major themes of the release are Configuration, Stability, Security, Capacity, and …

September 16, 2021

What is Ransomware, and how do I stop it?

Ransomware attacks have exploded over the last few years. This is due to the success rate and the financial returns that cybercriminals have seen from this cyberattack method.  Ransomware works …

September 15, 2021

What is the MITRE ATT&CK framework?

Various organizations maintain public cybersecurity defense frameworks that anyone can use to benchmark and improve their cybersecurity posture. Examples include the Lockheed Martin Cyber Kill Chain® and the MITRE ATT&CK® …

September 10, 2021

What’s New in LoadMaster Certificate Management

It’s a System Admins worst nightmare. There you are at your desk. Everything is calm for once, and you can finally catch up on all those things you have wanted …

September 2, 2021

Surfacing LoadMaster SSO User Logins in Flowmon Collector

This blog describes how you can use LoadMaster and Flowmon Collector to pair specific users with the corresponding network traffic and application transactions when investigating performance issues, to provide dashboards, …

August 26, 2021