Learn how to enhance the security of your applications and APIs with LoadMaster.
by Doug Barney
May 25, 2023
Many are confused about the differences between a reverse proxy and a load balancer.
by Doug Barney
May 18, 2023
Adopting a unified DevOps and NetOps approach across data centers and public cloud environments is imperative to have a highly scalable, ultrareliable and secure load balancing architecture strategy.
by Doug Barney
May 4, 2023
This blog provides a high-level overview on How Global Server Load Balancing (GSLB) defeats application downtime.
by Doug Barney
April 27, 2023
Progress Kemp LoadMaster was certified at the collaborative Protection Profile for Network Devices Version 2.2e in January 2023. This Common Criteria certification is the latest in a long list of features and reasons why LoadMaster is the best choice for many organizations.
by Doug Barney
March 28, 2023
Load balancing for web applications is essential to deliver a good application experience Load balancing algorithms operate using techniques that map to the conceptual layers of a network stack. Most load balancer functions can be mapped to activities at Layers 4 & 7 of the OSI stack. This blog outlines of comparison of each type.
by Doug Barney
February 23, 2023
Keeping these applications online and responsive is vital to all organizations. Maximizing application availability is foundational to delivering a good user experience for staff and customers.
by Doug Barney
February 16, 2023
Today's complex IT infrastructure require comprehensive load balancing strategies.
by Doug Barney
February 13, 2023
Learn more about how LoadMaster secures applications, including information on DDoS protection, web application firewall security and more.
February 6, 2023
Read more about Web Application Firewall to protect your applications from cyber attacks.
February 1, 2023
Read more about load balancers and number of algorithms to deliver improved performance.
January 31, 2023
The working model in business has dramatically shifted over the last few years — a trend accelerated by the pandemic. The shifting to a work-from-home environment has provided proof that …
October 24, 2022
The internet is a dangerous place, with many bad actors using automated tools to attack organizations of all sizes, 24 hours a day, seven days a week. Regardless of your …
by Doug Barney
October 17, 2022
Distributed Denial of Service, referred to as DDoS, attacks are a fact of life in the modern business landscape. Any company with an online presence is, unfortunately, vulnerable to DDoS attacks …
by Doug Barney
October 11, 2022
In recent days, two zero-day vulnerabilities against Microsoft on-premises Exchange Servers have been publicized and attacked. The good news is Exchange Cloud users, such as Microsoft 365 customers, need not …
by Doug Barney
October 6, 2022
Do you remember the biggest problem Microsoft had in the early days of selling Windows? It was too slow. While the visual user experience was compelling, the lag of the …
by Doug Barney
October 4, 2022
Protecting your organization from the ever-changing threat landscape requires a defense strategy that deploys multiple technologies and human factors at multiple levels. One of the most important is data encryption …
September 27, 2022
Distributed Denial of Service (DDoS). The words and the letters themselves create foreboding. Whatever it is, it is bad. Hackers do it, it causes damage, and only IT pros seemingly …
by Doug Barney
September 22, 2022
Dell ECS ™ offers scalable, high performance storage solutions across a range of workloads. In this blog, we’ll explore how ECS Connection Manager enhances Dell storage environments with real-world examples …
September 19, 2022
Businesses of all sizes, in all industries, are vulnerable to DDoS attacks. This statement is as true today as it was when I first wrote about the state of DDoS …
September 13, 2022