This blog will run through creating dashboards in the ELK (Elasticsearch, Logstash, Kibana) Stack to gain further insight into the LoadMaster WAF (Web Application Firewall). ELK Stack The ELK Stack…
WAF
-
It is nice to develop scripts that you can use to configure your load balancer and Web Application Firewall (WAF). The scripts can help integrate these services into your network orchestration…
-
This blog details the format of the JavaScript Object Notation (JSON) logs that the LoadMaster Web Application Firewall (WAF) produces and demonstrates how those logs can be exported in real-time from the LoadMaster and provided to log data endpoints including ELK stack and Azure Sentinel.
-
Organizations execute their missions based on available resources. Availability is critical whether it is facilities, personnel, processes, or technologies. For you to be able to depend on your information technology,…
-
Providing seamless, secure access to web applications for users is vital for many organizations. With more and more users accessing business applications via the web and from mobile devices, the…
-
The Big Migration For the last 5 years, the “great cloud migration” has been underway as IT organizations plan and orchestrate the exodus of applications from data centers to Infrastructure…
-
If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via…
-
Applications, whether deployed in the cloud or on-premise, are more often falling victim to external DoS (and Distributed DoS) attacks. We created this experiment to demonstrate how KEMP LoadMaster can…
-
When considering a Defense-in-Depth strategy for the Cloud, the applications themselves are probably the greatest risk factor. Vulnerabilities in applications, be it from poor coding or inadequate access controls, account…
-
AzureLoad BalancerMicrosoft
Advanced Traffic Manager and App Gateway in Microsoft Azure
by Dave RendonAdvanced Load Balancer/Traffic Manager and App Gateway for HA for Microsoft Azure from KEMP Load Balancers An important issue when discussing and designing load balancing solutions is how to achieve…
-
Contents Load Balancing Overview KEMP Virtual LoadMaster for Azure Use Cases Simplified Access to Complex Infrastructure Secure Traffic Management with SSL Offload and Reencrypt Single Sign-On and Active Directory integration…
-
What is the vulnerability? An Insecure Direct Object Reference vulnerability occurs when data in an application is exposed without appropriate checks being made before the access is granted. The data…
-
Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common…
-
Code Injection What is the vulnerability? A Code Injection occurs when untrusted data is injected or manually entered into an input sent to an application or database. The untrusted data…
Kemp LoadMaster is a great addition to any application delivery or general network infrastructure. In addition to features like application delivery, load balancing, SSL/TLS offloading, and authentication, LoadMaster also helps protect against common web security threats.
Trustwave is a leading cybersecurity organization with more than 200,000 clients spread over 96 countries. As a result, they get to see and investigate many cybersecurity incidents. They also operate…
Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years.…
As I referenced in my last blog post the last two years have been brutal from a security perspective, we are in the era of the 1) massive data breaches,…
Missing Function Level Access Control What is the vulnerability? Web applications typically only show functionality that a user has the need for and rights to use in the UI on…
Security Misconfiguration Modern web applications are built from many different parts. There are front end components such as a web browser, a desktop application with embedded web viewer, or increasingly…