This blog details the format of the JavaScript Object Notation (JSON) logs that the LoadMaster Web Application Firewall (WAF) produces and demonstrates how those logs can be exported in real-time from the LoadMaster and provided to log data endpoints including ELK stack and Azure Sentinel.
Web Application FIrewall
-
Kemp LoadMaster is a great addition to any application delivery or general network infrastructure. In addition to features like application delivery, load balancing, SSL/TLS offloading, and authentication, LoadMaster also helps protect against common web security threats.
-
The Trustwave Global Security report demonstrates that most organizations need to do more to mitigate risks to their applications on the web. Kemp can be your partner in achieving this as we have the experience and the tools you need.
-
What you didn’t know about the Kemp LoadMaster security posture.
-
Organizations execute their missions based on available resources. Availability is critical whether it is facilities, personnel, processes, or technologies. For you to be able to depend on your information technology,…
-
Providing seamless, secure access to web applications for users is vital for many organizations. With more and more users accessing business applications via the web and from mobile devices, the…
-
The Big Migration For the last 5 years, the “great cloud migration” has been underway as IT organizations plan and orchestrate the exodus of applications from data centers to Infrastructure…
-
Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years.…
-
Applications, whether deployed in the cloud or on-premise, are more often falling victim to external DoS (and Distributed DoS) attacks. We created this experiment to demonstrate how KEMP LoadMaster can…
-
As I referenced in my last blog post the last two years have been brutal from a security perspective, we are in the era of the 1) massive data breaches,…
-
Contents Load Balancing Overview KEMP Virtual LoadMaster for Azure Use Cases Simplified Access to Complex Infrastructure Secure Traffic Management with SSL Offload and Reencrypt Single Sign-On and Active Directory integration…
-
What is the vulnerability? An Insecure Direct Object Reference vulnerability occurs when data in an application is exposed without appropriate checks being made before the access is granted. The data…
-
Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common…
-
Code Injection What is the vulnerability? A Code Injection occurs when untrusted data is injected or manually entered into an input sent to an application or database. The untrusted data…
Application Security is more important now than ever. The second part of the Kemp security series details how to keep your applications secure with the LoadMaster.
Making Complicated Enterprise Tools Accessible and Flexible for Service Providers
As a service provider you are faced with ensuring the support that you provide to your customers is backed by SLAs. When you are relying on cloud providers and hosted…
If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via…
When considering a Defense-in-Depth strategy for the Cloud, the applications themselves are probably the greatest risk factor. Vulnerabilities in applications, be it from poor coding or inadequate access controls, account…
Missing Function Level Access Control What is the vulnerability? Web applications typically only show functionality that a user has the need for and rights to use in the UI on…
Security Misconfiguration Modern web applications are built from many different parts. There are front end components such as a web browser, a desktop application with embedded web viewer, or increasingly…