Category: Load Balancer

La seguridad en un balanceador de cargar, HA ( alta disponibilidad ) y Reverse Proxy

Posted on

Un Proxy inverso es un elemento de vital importancia dentro de las infraestructuras de aplicaciones para proporcionar una capa adicional de seguridad para las instancias del servidor mediante la recuperación…
Read More

Latest Stories

Kemp Zero Trust Access Gateway Architecture Overview

In today’s infrastructure security landscape, zero trust means a lot of things to different people. When you think about it, this isn’t too much of a surprise given it’s not …

June 3, 2021

False Positive Handling on LoadMaster

Consider a user setting a password such as ‘ UNION TABLE spaceships; This may look like an SQL Injection, but it’s actually a very good password. It is fairly long, it …

May 25, 2021

Basic Zero Trust Principles for Application Security

Zero-Trust is steadily becoming an emerging cyber buzz word that’s capturing the interest of organizations seeking to address modern security challenges. While sometimes viewed as just a replacement of existing …

May 14, 2021

Deploying custom rules on LoadMaster

Custom rules are where we tweak and refine our security configuration as part of the overall system tuning which is an integral part of an administrator’s role in security. This …

May 13, 2021

5 Steps of Incident Detection and Response

As a security practitioner, every day you experience something new. Sometimes, the new things are not so good and you have to figure out how to respond quickly before the …

May 6, 2021

How do you run OWASP CRS on LoadMaster

The OWASP CRS are more generic in nature than a commercial ruleset and cover a much larger set of applications from a broader attack surface. This means that the CRS protects …

April 29, 2021

Managing the right level of access between NetOps and Dev for Microservice Publishing

Introduction In previous blogs, we have introduced Kubernetes and Microservices and discussed its impact on Network Operations. We also looked at the ways services can be published and how Kemp Ingress Controller can be used …

April 21, 2021

Introduction to OWASP CRS

What is OWASP CRS? The Open Web Application Security Project® (OWASP) is an umbrella organization with several projects under its wings. The OWASP ModSecurity Core Rule Set (shortened to CRS) is one …

April 16, 2021

Why Kemp Flowmon is a Better Choice Versus Darktrace

It’s been a busy news week in the Network Detection and Response (NDR) and Network Performance Monitoring and Diagnostic (NPMD) sectors. Here at Kemp, we announced that the latest update …

April 15, 2021

Getting Started with LoadMaster Network Telemetry

Network Telemetry in LMOS 7.2.53 provides the traffic visibility you need to stay on top of network events. Getting Started with LoadMaster Network Telemetry Today, Kemp is excited to announce …

April 6, 2021

A hybrid approach to microservices with Kemp

Introduction In our previous blogs, we introduced Kubernetes, explained the challenges it brings for Network administrators, particularly exposing Kubernetes services for access. We also looked in detail at the Ingress Controller and its functionality in controlling …

March 30, 2021

Using Kemp LoadMaster and GEO in HashiCorp Vault Deployment

What is HashiCorp Vault  HashiCorp Vault is a secret management tool which allows you to secure, store and tightly control access to various types of sensitive data including tokens, passwords, certificates, and encryption keys. Vault provides a unified …

March 24, 2021

Microsoft Exchange Security Vulnerabilities Mitigation using Kemp LoadMaster

Due to the recent Microsoft Vulnerabilities this post explains how Kemp LoadMaster provides mitigation and protection against such attacks.

March 15, 2021

The Kemp Ingress Controller Explained

Introduction In our previous blogs we explained Kubernetes, the challenges it brings for Network administrators and described the different mechanisms for exposing Kubernetes services for user access. It is clear there are a number of …

March 4, 2021

Content Rules and the Joy of Regular Expressions

Kemp Technologies is delighted to announce the availability of the Kemp LoadMaster Content Rule Builder tool.

February 25, 2021

Exposing Kubernetes Services

Introduction Catch up on last weeks post on the Impact of Kubernetes on Network Administrators here. Container based microservice applications, provide benefits to the development and operation of applications and …

February 24, 2021

Impact of Kubernetes on Network Administrators

Introduction Following on from last weeks Kuberntes introduction, this week we look at the impact of Kubernetes on network Administrators. Lately, there is massive interest in the move to microservice …

February 17, 2021

What is Kubernetes?

Introduction With the recent addition of the Kemp Ingress Controller for Kubernetes (available now in LoadMaster firmware 7.2.53), what better time to look at the role Kubernetes plays in delivering …

February 11, 2021

Q&A: 5 Reasons to Replace Citrix ADC Load Balancing with Kemp

We recently delivered a webinar outlining why Kemp LoadMaster is a better option than Citrix ADC (formally Citrix NetScaler) as a load balancing solution. During the webinar We outlined five …

January 28, 2021

Warum bevorzugen Kunden den Load Balancer von Kemp gegenüber F5?

Mitte der 1990er Jahre, lange bevor Begriffe wie Virtualisierung, Public Clouds oder Software-Defined-Infrastrukturen die IT-Welt beherrschten, brachte F5 seinen vielverkauften Load Balancer erstmals auf den Markt. Seitdem blieb kein Chip mehr lange auf dem anderen: In Zeiten der digitalen Transformation sehen IT-Architekturen völlig anders aus; nicht alle einst beliebten Produkte vermögen es, die aktuellen Ansprüche der Nutzer zu erfüllen.

January 28, 2021