Tag: Load Balancing

How LoadMaster Supports your Security Strategy

Learn how to enhance the security of your applications and APIs with LoadMaster.

May 25, 2023

Reverse Proxy Versus Load Balancer: The Key Differences

Many are confused about the differences between a reverse proxy and a load balancer.

May 18, 2023

Why You Need to Get DevOps and NetOps on the Same Page

Adopting a unified DevOps and NetOps approach across data centers and public cloud environments is imperative to have a highly scalable, ultrareliable and secure load balancing architecture strategy.

May 4, 2023

Global Server Load Balancing - How It Works

This blog provides a high-level overview on How Global Server Load Balancing (GSLB) defeats application downtime.

April 27, 2023

LoadMaster Common Criteria Certification

Progress Kemp LoadMaster was certified at the collaborative Protection Profile for Network Devices Version 2.2e in January 2023. This Common Criteria certification is the latest in a long list of features and reasons why LoadMaster is the best choice for many organizations.

March 28, 2023

Layer 4 vs. Layer 7 Load Balancing: What's the Difference and Which One Do I Need?

Load balancing for web applications is essential to deliver a good application experience Load balancing algorithms operate using techniques that map to the conceptual layers of a network stack. Most load balancer functions can be mapped to activities at Layers 4 & 7 of the OSI stack. This blog outlines of comparison of each type.

February 23, 2023

Business Risks of Application Downtime

Keeping these applications online and responsive is vital to all organizations. Maximizing application availability is foundational to delivering a good user experience for staff and customers.

February 16, 2023

What is a Web Application Firewall (WAF) and Why Do You Need One?

Read more about Web Application Firewall to protect your applications from cyber attacks.

February 1, 2023

Load Balancing Algorithms Explained

Read more about load balancers and number of algorithms to deliver improved performance.

January 31, 2023

A, B, C, D, E(LK) plus LM WAF Equals stunning visualization!

This blog will run through creating dashboards in the ELK (Elasticsearch, Logstash, Kibana) Stack to gain further insight into the LoadMaster WAF (Web Application Firewall). ELK Stack The ELK Stack …

January 20, 2022

Content Rules and the Joy of Regular Expressions

Kemp Technologies is delighted to announce the availability of the Kemp LoadMaster Content Rule Builder tool.

February 25, 2021

Legacy Applications + Azure AD = Secure Hybrid Access (SHA)

As the adoption of cloud continues to grow in the enterprise and small organizations alike, some challenges are presented on how to leverage the same set of credentials for protecting both the cloud native and legacy applications. When it comes to Microsoft Azure, most of the cloud native applications include seamless integration with Azure AD with added support for Multi-Factor Authentication (MFA) to secure these solutions.

September 22, 2020

Unlimited Capacity, Unlimited Scale, Unlimited Instances Virtual ADC/Load Balancer…Because You Need it Now

In these challenging times, government, healthcare, and educational institutions (as well as businesses and organizations in all segments of the global economy) are struggling to keep up with the demands …

April 17, 2020