Skip to main content
Log In
EMEA
United States
Canada
Germany
UK and Ireland
France
Middle East
Spain
Brazil
日本語
Australia
Asia and Pacific
Italy
Latin America
India
Russia
Singapore
Support
Toggle navigation
Contact Sales
Try or Buy
Why Kemp
Load Balancers
Hardware LoadMaster
Hardware application delivery
Virtual LoadMaster
Virtual Appliances for application delivery
Cloud-native LoadMaster
Simple application delivery in the cloud
Monitoring & Management Platform
Kemp 360 Central
Preemptive Alerting & Escalation
Kemp 360 Vision
Support & Services
Kemp Support
Professional Services
Featuring our LoadMaster X15
Hyper-Performance load balancing
Prices Starting at
€9,800
Buy Now
Solutions
Load Balancing
Cloud
Virtual
Hardware
F5/Citrix Comparison
Metered Licensing
Multi-cloud
AWS
Azure
Hyper-V
VMware
KVM
Nutanix
Application Optimization
Web Apps
Microsoft Applications
VMware Workloads
Dell EMC ECS
VDI
SAP
Oracle
SDN
Security
Web Application Firewall
SSL
FIPS
PCI-DSS
DDoS
Service Providers
Providing licensing and operation options that means services are profitable from day one and easily maintained.
Government
Helping government organizations meet their compliance needs with the security, reliability and stability needed.
Resources
Watch
Customer Case Studies
Product Videos
How To
Demo
Read
Documentation
Customer Reviews
Product Reviews
Solution Briefs
Whitepapers
Industry Research
Try
30-day Free Trial
AWS Test
Azure Test Drive
Download
Firmware
Templates
Partner
Partnerships
Service Providers
Cloud Service Providers
Strategic Alliances
Systems Integrators
Solution Consultants
US Government Resellers
Existing Partners
Partner Central
Register Project
Training
Reseller Locator
Tools
Sizing Guides
Build a quote
30-day trial
TCO Calculator
Company
About Kemp
Our Story
Why Kemp
Leadership Team
Investors
Partnerships
Our Brand
Policies
Our Customers
Case Studies
Customer Reviews
Join the team
Life at Kemp
Careers
Glassdoor
Global Offices
News & Events
News
Awards
Events & Webinars
Blog
Contact Us
Contact Sales
Request a demo
Contact Support
Contact Sales
+353-61-260-101
Glossary - Load Balancer and Application Delivery - KEMP
A
Access Control List
Active Hot Standby
Agent based Adaptive Load Balancing
Agile
Amazon Web Services
Ambulatory Meaningful Use
Apache Hadoop
Apache HTTP Server
API economy (application programming interface economy)
APM (Application Performance Monitoring)
App virtualization (application virtualization)
Application Acceleration
Application Delivery Controller
Application delivery controller (ADC)
Application Delivery Fabric
Application Delivery Network
Application Firewall
Application Layer Gateway
Application Layer Security
Application Lifecycle Management
Application Performance management
Application Plane
Application Request Routing (ARR)
Application Security
Application Traffic Management
Application-defined networking (ADN)
ASIC
Authentication Service (AS)
Azure Resource Manager
Azure Stack
B
Bandwidth
Bare-metal hypervisor
Bash Shell
Blackboard Learn VLE
Blacklist
Blast Radius
Brute Force Attack
Buffer
Buffer Overflow
C
Caching
CAMS
CAS (Client Access Server)
Centralized Management
Cisco ACE
Cloud analytics
Cloud application
Cloud bursting
Cloud Computing
Common Access Card (CAC)
Common Access Card Authentication
Common Internet File System (CIFS)
Complex Content Matching
Compression
Computerized Prescription Order Entry (CPOE)
Configuration Drift
Configuration Management
Configuration Management
Configuration Management Database (CMDB)
Container
Container-based virtualization
Content Management System (CMS)
Control Plane
Cookie Persistence
Cross-Site Scripting
CT-Scan
D
Data Center
Data Harvesting SQL injections
Data Plane
Database
Database Availability Group (DAG)
DDoS attack
Dell
Dell Elastic Cloud Storage (ECS)
Dell EMC
Dell EMC Cloud Storage
Dell EMC Ready Architectures for Hadoop
Desktop as a Service (DaaS)
DevOps
DICOM (Digital Imaging and Communications in Medicine)
Digital Performance Management (DPM)
Direct Server Return
DirectAccess
Disaster Recovery
Distributed virtual switch
DMZ
DNN
DNS
Docker
E
Edupoint Synergy
Elastic load balancing (ELB)
Electronic Health Records (EHR)
Electronic Medical Records (EMR)
Emulation
Encapsulation
Encryption
Enterprise Resource Planning (ERP)
Error Correction
Ethernet
EV Extended Validation Certificates
F
FaaS (Framework as a Service)
Failover
Farm
Federal Identity Smart Cards
FIPS 140-2 Level 1
Firewall
ForeFront
ForeFront TMG
FTP
Fully Qualified Domain Name (FQDN)
G
Gateway
Git
GitHub
Global Load Balancing
H
Health Delivery Organization (HDO)
High Availability Load Balancers
HIPAA (Health Insurance Portability and Accountability Act)
Horizontal scalability
Hospital Information System (HIS)
Hospital Meaningful Use
Hosting Providers
HTTP Caching
HTTP Compression
HTTP/2
HTTP/2 Load Balancing
Hybrid Cloud
Hyper-converged appliance
Hypervisor
I
I/O virtualization
IaaS (Infrastructure as a Service)
ICMP Health Checking
IMAP
Incident Management
Industrial Internet
Infrastructure as Code
Intelligent Scheduling Methods
Intelligent Traffic Steering
Internet of Things (IoT)
Internet Protocol (IP)
Intrusion Prevention
IoT Agent
IoT Device
IoT Endpoint
IoT Gateway
IoT Platform
IoT Sensors
IP Address filtering
IP Reputation
IPSec
IPv4
IPv6
IPv6 (Internet Protocol version 6)
ISP
J
Java
JavaScript
K
KEMP Edge Security Pack (ESP)
KEMP Virtual LoadMaster (VLM)
Kerberos
Kerberos Constrained Delegation
Kerberos Constrained Delegation (KCD)
Kerberos Protocol
Key Distribution Center (KDC)
L
Latency
Layer 7 content switching
Least Connection Scheduling
Load Balancer
Load Balancing
Load Balancing as a Service
Load Balancing Methods
LoadMaster
M
Magnetic Resonance Imaging (MRI)
Mean Time to Discover (MTTD)
Mean Time to Repair (MTTR)
MELA (Metered Enterprise Licensing Agreement)
Microsoft Active Directory Federation Services (ADFS)
Microsoft Always On VPN
Microsoft Azure
Microsoft Azure Stack
Microsoft Exchange
Microsoft IIS Services
Microsoft Lync
Microsoft SharePoint
Microsoft Skype for Business
Microsoft Windows Server 2016
Microsoft Windows Terminal Server
Moodle
N
NBI North Bound Interface
Network Address Translation (NAT)
Network automation
Network Function Virtualization (NFV)
Network Function Virtualization Infrastructure (NFVI)
Network functions virtualization (NFV)
Network hypervisor
Network Management
Network Node
Network Performance
Network Performance Management (NPM)
Network Traffic Management
Network virtualization
NFV Framework
NFV Management and Orchestration (MANO)
Node
Non-HTTP Protocol Support
NTLM
O
OCSP Responder
OCSP Stapling
Online Certificate Status Protocol (OCSP)
Open vSwitch
OpenFlow
OpenSSL
OpenStack
Outage
OWASP Top 10
P
PaaS (Platform as a Service)
PAC (Proxy Auto Config) File
PCI DSS (Payment Card Industry Data Security Standard)
Per-Application ADC
Persistence
Picture Archiving and Communications Systems (PACS)
Pool
POP3
PowerEdge
Private Cloud
Privilege Authentication Certificate:
Protocol Transition
Public Cloud
Public Key Infrastructure (PKI)
Q
Quality of Experience (QoE)
Quality of Service (QoS)
R
Replication
RESTFul API
Root Cause
Root Cause Analysis (RCA)
Round Robin DNS
Router
S
SaaS (Software as a Service)
SAML
SAML Assertion
SAP BOE
SAP Business Intelligence Solutions
SAP Business Suite
SAP HANA
SAP SE
SCOM
SDN Application
SDN Controller
SDN Datapath
Security-as-a-service (SaaS)
Server Farm
Server Load Balancing (SLB)
Server Pool
Server Sprawl
Server virtualization
Service Principal Name (SPN)
Service Provider
Service Ticket
Services for User to Self (S4U2Self)
Services for Users to Proxy (S4U2Proxy)
Session Affinity
Single Pane of glass
Sitecore
SMTP
SNORT
Snowflake Servers
Software Defined Networking (SDN)
Software-defined data center (SDDC)
Software-defined storage (SDS)
Software-defined WAN (SD-WAN)
Source IP Hash load balancing
Southbound Interface
SQL Server
SSH
SSL Accelerator
SSL Offload
STARTTLS offload for mail protocols
Stateful failover
T
TCP
TCP/IP
TELNET
Ticket Granting Ticket (TGT)
Ticket-Granting Service (TGS)
Topology
Transport Protocol
U
UDP
Uniform Resource Locator (URL)
Uninterruptible Power Supply (UPS)
Unix
User Principal Name (UN):
UTM (Unified Threat Management)
V
Vendor Neutral Archiving (VNA)
Version Control System
Virtual desktop
Virtual firewall
Virtual Learning Environment (VLE)
Virtual Machine
Virtual network function (VNF)
Virtual private cloud (VPC)
Virtualization
Virtualized Network Function (VNF)
VLAN Trunking (802.1Q)
VMware
VoIP
VPN
VXLAN gateway
W
WAN Acceleration
WAN accelerator
Web Server
Web User Interface (WUI)
What is a Reverse Proxy?
What is a Web Application Firewall (WAF)?
What is Microsoft office 365
Windows Network Load Balancing
WordPress
X
X-Forwarded-For (XFF)
X-ray