Category: Load Balancer

La seguridad en un balanceador de cargar, HA ( alta disponibilidad ) y Reverse Proxy

Posted on

Un Proxy inverso es un elemento de vital importancia dentro de las infraestructuras de aplicaciones para proporcionar una capa adicional de seguridad para las instancias del servidor mediante la recuperación…
Read More

Latest Stories

Secure and Optimize eHealth Applications and Gain Reliable Delivery, Resiliency

eHealth applications are reshaping healthcare as we know it and modernizing how healthcare providers:  Compile and store computer-based patient records  Schedule patients, physicians, technicians, and facilities   Store and retrieve digital …

July 19, 2022

Legacy Application Security 101: Protecting enterprises from malicious cyberattacks

Many organizations have legacy applications in use that are delivering essential business functionality. But many of these applications cannot use modern security features available to those built on current technology …

June 9, 2022

Healthcare Organizations are Under Pressure – Progress Kemp Load Balancer Has Your Back

For IT teams tasked with keeping applications available, the last few years were a challenge. Sizing infrastructure correctly to deliver the best application experience at a reasonable cost is a …

A, B, C, D, E(LK) plus LM WAF Equals stunning visualization!

This blog will run through creating dashboards in the ELK (Elasticsearch, Logstash, Kibana) Stack to gain further insight into the LoadMaster WAF (Web Application Firewall). ELK Stack The ELK Stack …

January 20, 2022

How Does Ransomware Spread?

The question in the title of this article gets asked frequently. Those asking it often have two separate subjects in mind: How does ransomware initially infect an organization, and How …

November 30, 2021

Preventing A Facebook Type Services Outage

The October the 4th service outage at Facebook, which also took Instagram and WhatsApp offline, had a major impact on many people. An outage of services that have billions of …

November 25, 2021

Charting the course with Kemp Ingress Controller (KIC)

The numbers on the adoption of Kubernetes vary from report to report, but there can be no argument that the trust organizations have with Kubernetes is increasing year to year …

November 2, 2021

Manage security threats with MITRE ATT&CK Framework

Kemp Technology Evangelist Frank Yue recently posted a blog post called What Is The MITRE ATT&CK Framework? that describes how organizations can use the MITRE ATT&CK framework to bolster their cybersecurity defenses.  …

October 21, 2021

The EMA Radar Report on Network Performance Management Tools

Delivering secure applications to end-users is an increasingly complex task. The ransomware threat from cybercriminals has been in the news frequently in the last year. Plus, other cyberthreats haven’t gone …

October 8, 2021

Power(Shell) your WAF deployment

It is nice to develop scripts that you can use to configure your load balancer and Web Application Firewall (WAF).  The scripts can help integrate these services into your network orchestration …

October 7, 2021

Progress to Acquire Kemp

I’m excited to share that Progress (NASDAQ: PRGS) today announced that it will acquire Kemp, bringing our LoadMaster ADC and Flowmon network visibility products into its extensive and complementary product portfolio. This …

September 23, 2021

General Availability of LoadMaster 7.2.55.0

Kemp was pleased to announce the availability of LMOS Version 7.2.55.0 to all customers on September 15, 2021. The major themes of the release are Configuration, Stability, Security, Capacity, and …

September 16, 2021

What is Ransomware, and how do I stop it?

Ransomware attacks have exploded over the last few years. This is due to the success rate and the financial returns that cybercriminals have seen from this cyberattack method.  Ransomware works …

September 15, 2021

What is the MITRE ATT&CK framework?

Various organizations maintain public cybersecurity defense frameworks that anyone can use to benchmark and improve their cybersecurity posture. Examples include the Lockheed Martin Cyber Kill Chain® and the MITRE ATT&CK® …

September 10, 2021

What’s New in LoadMaster Certificate Management

It’s a System Admins worst nightmare. There you are at your desk. Everything is calm for once, and you can finally catch up on all those things you have wanted …

September 2, 2021

Surfacing LoadMaster SSO User Logins in Flowmon Collector

This blog describes how you can use LoadMaster and Flowmon Collector to pair specific users with the corresponding network traffic and application transactions when investigating performance issues, to provide dashboards, …

August 26, 2021

Let’s Encrypt on LoadMaster – Free & automated certificate renewal

LoadMaster fully integrates the Let’s Encrypt automated enrollment and renewal processes without requiring an external webserver.  Why you should automate certificate renewal  Certificate expiration causes an embarrassing sort of downtime.  Though your website …

August 19, 2021

How to Simplify Kubernetes with Load Balancers

This blog post supports the Kemp BrightTALK technical discussion from the 26th of May 2021. In the talk, which you can view here, Barry Gleeson (Product Manager), Roy Dunican (Platform Ops at …

August 4, 2021

6 Reasons You Need to Replace Your F5 Load Balancer

There are many options available to IT teams when it comes to choosing load balancers for their organizations. Indeed, it can often be hard to determine which vendor and product …

Kemp ZTAG Zero Trust Use Case

When it comes to the security of our networks today, does that concept of a trusted entity really exist anymore? As the reality of the cyber threats that we face …

July 8, 2021