Category: Load Balancer

La seguridad en un balanceador de cargar, HA ( alta disponibilidad ) y Reverse Proxy

Posted on

Un Proxy inverso es un elemento de vital importancia dentro de las infraestructuras de aplicaciones para proporcionar una capa adicional de seguridad para las instancias del servidor mediante la recuperación…
Read More

Latest Stories

Citrix NetScaler Gateway Perpetual License End of Sale (EoS) - What to do next?

Citrix NetScaler has recently announced some licensing changes. Learn how this may affect customer and why LoadMaster is a better choice for your organization.

August 7, 2023

Securing your Cloud Application and API with LoadMaster

Learn how Progress Kemp LoadMaster can help secure your cloud and API environments.

August 3, 2023

Forward Proxy Vs. Reverse Proxy: Differences and Similarities

Many are confused about the differences between a reverse proxy and a load balancer.

July 27, 2023

What Healthcare Companies Need from Application Availability and Load Balancing – Three Case Studies Say Everything You Need to Know

Healthcare companies and their eHealth applications are very demanding of IT’s resources, priorities and solutions. Three case studies will walk you through what healthcare companies require from application availability and load balancing.

July 21, 2023

What is an Application Delivery Controller (ADC) and Why Should You Use One?

An Application Delivery Controller (ADC) is a networking device that improves the performance, security, and availability of applications. This article explains what an ADC is, how it works, and why you should use one.

June 15, 2023

What is Zero Trust Network Access (ZTNA) and How Does it Promote a Positive Customer Experience?

Zero Trust Network Access (ZTNA) is a new approach to network security that promotes a positive customer experience. In this article, we'll explore what ZTNA is and how it can benefit your business by maintaining high levels of security while still allowing customers access.

June 8, 2023

How LoadMaster Supports your Security Strategy

Learn how to enhance the security of your applications and APIs with LoadMaster.

May 25, 2023

Reverse Proxy Versus Load Balancer: The Key Differences

Many are confused about the differences between a reverse proxy and a load balancer.

May 18, 2023

Why You Need to Get DevOps and NetOps on the Same Page

Adopting a unified DevOps and NetOps approach across data centers and public cloud environments is imperative to have a highly scalable, ultrareliable and secure load balancing architecture strategy.

May 4, 2023

Global Server Load Balancing - How It Works

This blog provides a high-level overview on How Global Server Load Balancing (GSLB) defeats application downtime.

April 27, 2023

LoadMaster Common Criteria Certification

Progress Kemp LoadMaster was certified at the collaborative Protection Profile for Network Devices Version 2.2e in January 2023. This Common Criteria certification is the latest in a long list of features and reasons why LoadMaster is the best choice for many organizations.

March 28, 2023

Layer 4 vs. Layer 7 Load Balancing: What's the Difference and Which One Do I Need?

Load balancing for web applications is essential to deliver a good application experience Load balancing algorithms operate using techniques that map to the conceptual layers of a network stack. Most load balancer functions can be mapped to activities at Layers 4 & 7 of the OSI stack. This blog outlines of comparison of each type.

February 23, 2023

Business Risks of Application Downtime

Keeping these applications online and responsive is vital to all organizations. Maximizing application availability is foundational to delivering a good user experience for staff and customers.

February 16, 2023

How Load Balancers Respond to Advanced Persistent Threats and Vulnerabilities

Learn more about how LoadMaster secures applications, including information on DDoS protection, web application firewall security and more.

February 6, 2023

Load Balancing Algorithms Explained

Read more about load balancers and number of algorithms to deliver improved performance.

January 31, 2023

Infografik F5 Kemp Load Balancer

Warum bevorzugen Kunden den Load Balancer von Kemp gegenüber F5?

Mitte der 1990er Jahre, lange bevor Begriffe wie Virtualisierung, Public Clouds oder Software-Defined-Infrastrukturen die IT-Welt beherrschten, brachte F5 seinen vielverkauften Load Balancer erstmals auf den Markt. Seitdem blieb kein Chip mehr lange auf dem anderen: In Zeiten der digitalen Transformation sehen IT-Architekturen völlig anders aus; nicht alle einst beliebten Produkte vermögen es, die aktuellen Ansprüche der Nutzer zu erfüllen.

January 28, 2023

Securing Network Access for Modern-Day Hybrid Workplaces with Zero Trust

The working model in business has dramatically shifted over the last few years — a trend accelerated by the pandemic. The shifting to a work-from-home environment has provided proof that …

October 24, 2022

Adding Layered Security to Cloud Applications

The internet is a dangerous place, with many bad actors using automated tools to attack organizations of all sizes, 24 hours a day, seven days a week. Regardless of your …

October 17, 2022

What’s At Stake If Your Business Is Hit With a DDoS Attack

Distributed Denial of Service, referred to as DDoS, attacks are a fact of life in the modern business landscape. Any company with an online presence is, unfortunately, vulnerable to DDoS attacks …

October 11, 2022

Microsoft Offers Zero-Day Exchange Exploit Workaround: LoadMaster Load Balancers Block and Repair Zero-Day Attacks

In recent days, two zero-day vulnerabilities against Microsoft on-premises Exchange Servers have been publicized and attacked. The good news is Exchange Cloud users, such as Microsoft 365 customers, need not …

October 6, 2022