Category: Load Balancer

La seguridad en un balanceador de cargar, HA ( alta disponibilidad ) y Reverse Proxy

Posted on

Un Proxy inverso es un elemento de vital importancia dentro de las infraestructuras de aplicaciones para proporcionar una capa adicional de seguridad para las instancias del servidor mediante la recuperación…
Read More

Latest Stories

F5 Migrate KEMP

KEMP Rules Migration for Legacy F5 LTM Local Traffic Manager with iRules

Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …

August 7, 2018

Differences Between Legacy Application Delivery and Application Delivery Fabric

The way applications are developed and delivered is rapidly changing. The adoption of Agile methodology, DevOps practices, and multi-cloud hybrid platform delivery means that the load balancing infrastructure practices of …

February 14, 2018

Always on VPN

Always On VPN Redundancy and Failover with KEMP LoadMaster GEO

Introduction When implementing Windows 10 Always On VPN, eliminating single points of failure is crucial to ensuring the highest levels of productivity for mobile workers. Enabling load balancing for VPN …

January 22, 2018

Load Balancer for SAP

Highly Available SAP in Azure with KEMP Load Balancers

This document is intended to provide technical guidance on how to deploy a High Available SAP system using KEMP LoadMaster to provide various Application Delivery network services for SAP on …

November 6, 2017

Dashboard Banner

3 Benefits KEMP 360™ Central Provides for Your Application Delivery Fabric

KEMP 360 Central’s availability in the Microsoft Azure Cloud Marketplace, AWS and across many common hypervisor platforms enables customers to provide centralized management, control and orchestration of their application delivery …

August 1, 2017

Direct-Access

Load Balancing DirectAccess with the KEMP Loadmaster Load Balancer

DirectAccess provides seamless and transparent, always on secure remote access for managed Windows clients. To provide scalability and eliminate single points-of-failure, DirectAccess servers can be configured in load-balanced clusters. Supported …

November 17, 2016

DNS, Load Balancing and DDOS attacks

Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident …

November 3, 2016

Kemp Default Blog Image

Using a WAF to help Deliver PCI DSS

If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …

November 2, 2016

Kemp Default Blog Image

Application Centric DDOS Protection

Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years. …

August 3, 2016

Kemp Default Blog Image

Top 15 consideration before deploying Skype for Business Server 2015 in your Environment

Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …

February 15, 2016

Kemp Default Blog Image

KEMP Technologies – The only Visionary ADC Vendor

This month marked an exciting milestone for KEMP, and for me personally, as CEO of the company. Gartner published the 2015 Magic Quadrant for Application Delivery Controllers on October 6, …

October 20, 2015

Cross-Site-Scripting

OWASP Top Ten Series: Cross Site Scripting

Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …

October 13, 2015

Kemp Default Blog Image

Experience the KEMP Advantage – Riverbed SteelApp Replacement Program

KEMP Technologies’ award-winning LoadMaster range of Load Balancers & Application Delivery Controllers, enhance the resilience and performance of any network in which they are deployed. We believe more organizations should …

Free Loadbalancel

Announcing the New FREE LoadMaster™ Application Load Balancer

A free version of our popular VLM application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from …

Kemp Loadmaster Russia

KEMP LoadMaster в роли обратного прокси

Обратный прокси является жизненно важным элементом в инфраструктуре приложений для обеспечения дополнительного уровня безопасности для сервера, посредством проверки имен пользователей, расположенных в ненадежных зонах, а также публикаций веб сервисов .…

January 19, 2015

kemp loadmaster

Drei Fliegen mit einer Klappe: Reverse Proxy, Hochverfügbarkeit, Load Balancing vereint

Die Reverse Proxy Funktionalität ist ein wichtiges Element von Anwendungs-Infrastrukturen, durch die eine zusätzliche Sicherheitsebene zum Schutz der Anwendungs-Server geschaffen wird. Reverse Proxies dienen zur Bereitstellung von Anwendungen außerhalb der…

January 15, 2015

keymanagementwith-Kemp

La seguridad en un balanceador de cargar, HA ( alta disponibilidad ) y Reverse Proxy

Un Proxy inverso es un elemento de vital importancia dentro de las infraestructuras de aplicaciones para proporcionar una capa adicional de seguridad para las instancias del servidor mediante la recuperación…

January 13, 2015

Kemp Default Blog Image

How to Configure Layer 4 Virtual Services with @KEMPtech

Application Load Balancing: Learn more about the ins and outs of application load balancing and delivery with J.Peter Brusseze and KEMP Technologies in this lesson, we’ll discuss setting up Layer …

Kemp Default Blog Image

A look back at how much data and e-mail we’re sending

A look back at how much data and e-mail we’re sending. See our new inforgraphic.

Kemp Default Blog Image

HA (High Availability) and Reverse Proxy Security From a Load Balancer

Reverse proxy is a vitally important element within application infrastructures to provide an additional layer of security for server instances by retrieving resources on behalf of users located in untrusted …