Skip to main content
  • Log In
    • SG
      • United States
      • Canada
      • Europe, Africa
      • Germany
      • UK and Ireland
      • France
      • Middle East
      • Spain
      • Brazil
      • 日本語
      • Australia
      • Asia and Pacific
      • Italy
      • Latin America
      • India
      • Russia
  • Support

Contact SalesTry or Buy

  • Why Kemp
  • Solutions
      • Load Balancing
        • Cloud
        • Virtual
        • Hardware
        • F5/Citrix Comparison
        • Metered Licensing
      • Multi-cloud
        • AWS
        • Azure
        • Hyper-V
        • VMware
        • KVM
        • Nutanix
      • Application Optimization
        • Web Apps
        • Microsoft Applications
        • VMware Workloads
        • Dell EMC ECS
        • VDI
        • SAP
        • Oracle
        • SDN
      • Security
        • Web Application Firewall
        • SSL
        • FIPS
        • PCI-DSS
        • DDoS
      • Service ProvidersProviding licensing and operation options that means services are profitable from day one and easily maintained.
      • GovernmentHelping government organizations meet their compliance needs with the security, reliability and stability needed.
  • Products
      • Cloud-native LoadMasterSimple application delivery in the cloud
      • Virtual LoadMasterVirtual Appliances for application delivery
      • Hardware LoadMasterHardware application delivery
      • Monitoring & Management Platform
        • Kemp 360 Central
      • Preemptive Alerting & Escalation
        • Kemp 360 Vision
      • Support & Services
        • Kemp Support
        • Professional Services
      • Featuring our LoadMaster X15 Hyper-Performance load balancing

        Prices Starting at $11,564

        Buy Now

  • Resources
      • Watch
        • Customer Case Studies
        • Product Videos
        • How To
        • Demo
      • Read
        • Documentation
        • Customer Reviews
        • Product Reviews
        • Solution Briefs
        • Whitepapers
      • Try
        • 30-day Free Trial
        • AWS Test
        • Azure Test Drive
      • Download
        • Firmware
        • Templates
  • Partner
      • Partnerships
        • Service Providers
        • Cloud Service Providers
        • Strategic Alliances
        • Systems Integrators
        • Solution Consultants
      • Existing Partners
        • Partner Central
        • Register Project
        • Training
        • Reseller Locator
      • Tools
        • Sizing Guides
        • Build a quote
        • 30-day trial
  • Company
      • About Kemp
        • Our Story
        • Why Kemp
        • Leadership Team
        • Investors
        • Partnerships
        • Our Brand
        • Policies
      • Our Customers
        • Case Studies
        • Customer Reviews
      • Join the team
        • Life at Kemp
        • Careers
        • Glassdoor
        • Global Offices
      • News & Events
        • News
        • Awards
        • Events & Webinars
        • Blog
      • Contact Us
        • Contact Sales
        • Request a demo
        • Contact Support

Contact Sales

+65-6580-2188

Glossary - Load Balancer and Application Delivery - KEMP

A

Access Control List

Active Hot Standby

Agent based Adaptive Load Balancing

Agile

Amazon Web Services

Ambulatory Meaningful Use

Apache HTTP Server

API economy (application programming interface economy)

APM (Application Performance Monitoring)

App virtualization (application virtualization)

Application Acceleration

Application Delivery Controller

Application delivery controller (ADC)

Application Delivery Fabric

Application Delivery Network

Application Firewall

Application Layer Gateway

Application Layer Security

Application Performance management

Application Plane

Application Request Routing (ARR)

Application Security

Application Traffic Management

Application-defined networking (ADN)

ASIC

Authentication Service (AS)

Azure Resource Manager

Azure Stack

B

Bandwidth

Bare-metal hypervisor

Bash Shell

Blackboard Learn VLE

Blacklist

Brute Force Attack

Buffer

Buffer Overflow

C

Caching

CAMS

CAS (Client Access Server)

Centralized Management

Cisco ACE

Cloud analytics

Cloud application

Cloud bursting

Cloud Computing

Common Access Card (CAC)

Common Access Card Authentication

Common Internet File System (CIFS)

Complex Content Matching

Compression

Computerized Prescription Order Entry (CPOE)

Configuration Drift

Configuration Management

Configuration Management

Configuration Management Database (CMDB)

Container

Container-based virtualization

Control Plane

Cookie Persistence

Cross-Site Scripting

CT-Scan

D

Data Center

Data Harvesting SQL injections

Data Plane

Database

Database Availability Group (DAG)

DDoS attack

Dell

Desktop as a Service (DaaS)

DevOps

DICOM (Digital Imaging and Communications in Medicine)

Digital Performance Management (DPM)

Direct Server Return

DirectAccess

Disaster Recovery

Distributed virtual switch

DMZ

DNS

Docker

E

Edupoint Synergy

Elastic load balancing (ELB)

Electronic Health Records (EHR)

Electronic Medical Records (EMR)

Emulation

Encapsulation

Encryption

Enterprise Resource Planning (ERP)

Error Correction

Ethernet

EV Extended Validation Certificates

F

FaaS (Framework as a Service)

Federal Identity Smart Cards

FIPS 140-2 Level 1

Firewall

ForeFront

ForeFront TMG

FTP

Fully Qualified Domain Name (FQDN)

G

Gateway

Global Load Balancing

H

Health Delivery Organization (HDO)

High Availability Load Balancers

HIPAA (Health Insurance Portability and Accountability Act)

Horizontal scalability

Hospital Information System (HIS)

Hospital Meaningful Use

Hosting Providers

HTTP Caching

HTTP Compression

HTTP/2

HTTP/2 Load Balancing

Hybrid Cloud

Hyper-converged appliance

Hypervisor

I

I/O virtualization

IaaS (Infrastructure as a Service)

ICMP Health Checking

IMAP

Incident Management

Industrial Internet

Infrastructure as Code

Intelligent Scheduling Methods

Intelligent Traffic Steering

Internet of Things (IoT)

Internet Protocol (IP)

Intrusion Prevention

IoT Agent

IoT Device

IoT Endpoint

IoT Gateway

IoT Platform

IoT Sensors

IP Address filtering

IP Reputation

IPSec

IPv4

IPv6

IPv6 (Internet Protocol version 6)

ISP

J

Java

JavaScript

K

KEMP Edge Security Pack (ESP)

KEMP Virtual LoadMaster (VLM)

Kerberos

Kerberos Constrained Delegation

Kerberos Constrained Delegation (KCD)

Kerberos Protocol

Key Distribution Center (KDC)

L

Latency

Layer 7 content switching

Least Connection Scheduling

Load Balancer

Load Balancing

Load Balancing as a Service

Load Balancing Methods

LoadMaster

M

Magnetic Resonance Imaging (MRI)

Mean Time to Discover (MTTD)

Mean Time to Repair (MTTR)

MELA (Metered Enterprise Licensing Agreement)

Microsoft Active Directory Federation Services (ADFS)

Microsoft Always On VPN

Microsoft Azure

Microsoft Azure Stack

Microsoft Exchange

Microsoft IIS Services

Microsoft Lync

Microsoft Office 365

Microsoft SharePoint

Microsoft Skype for Business

Microsoft Windows Server 2016

Microsoft Windows Terminal Server

Moodle

N

NBI North Bound Interface

Network Address Translation (NAT)

Network automation

Network Function Virtualization (NFV)

Network Function Virtualization Infrastructure (NFVI)

Network functions virtualization (NFV)

Network hypervisor

Network Management

Network Node

Network Performance

Network Performance Management (NPM)

Network Traffic Management

Network virtualization

NFV Framework

NFV Management and Orchestration (MANO)

Non-HTTP Protocol Support

NTLM

O

OCSP Responder

OCSP Stapling

Online Certificate Status Protocol (OCSP)

Open vSwitch

OpenFlow

OpenSSL

OpenStack

Outage

OWASP Top 10

P

PaaS (Platform as a Service)

PAC (Proxy Auto Config) File

PCI DSS (Payment Card Industry Data Security Standard)

Picture Archiving and Communications Systems (PACS)

POP3

PowerEdge

Private Cloud

Privilege Authentication Certificate:

Protocol Transition

Public Cloud

Public Key Infrastructure (PKI)

Q

Quality of Experience (QoE)

Quality of Service (QoS)

R

RESTFul API

Reverse Proxy

Root Cause

Root Cause Analysis (RCA)

Round Robin DNS

Router

S

SaaS (Software as a Service)

SAML

SAML Assertion

SAP BOE

SAP Business Intelligence Solutions

SAP Business Suite

SAP HANA

SAP SE

SCOM

SDN Application

SDN Controller

SDN Datapath

Security-as-a-service (SaaS)

Server Load Balancing (SLB)

Server Sprawl

Server virtualization

Service Principal Name (SPN)

Service Provider

Service Ticket

Services for User to Self (S4U2Self)

Services for Users to Proxy (S4U2Proxy)

Session Affinity

Single Pane of glass

SMTP

SNORT

Snowflake Servers

Software Defined Networking (SDN)

Software-defined data center (SDDC)

Software-defined storage (SDS)

Software-defined WAN (SD-WAN)

Source IP Hash load balancing

Southbound Interface

SQL Server

SSH

SSL Accelerator

SSL Offload

STARTTLS offload for mail protocols

Stateful failover

T

TCP

TCP/IP

TELNET

Ticket Granting Ticket (TGT)

Ticket-Granting Service (TGS)

Topology

Transport Protocol

U

UDP

Uninterruptible Power Supply (UPS)

Unix

User Principal Name (UN):

UTM (Unified Threat Management)

V

Vendor Neutral Archiving (VNA)

Virtual desktop

Virtual firewall

Virtual Learning Environment (VLE)

Virtual Machine

Virtual network function (VNF)

Virtual private cloud (VPC)

Virtualized Network Function (VNF)

VLAN Trunking (802.1Q)

VMware

VoIP

VPN

VXLAN gateway

W

WAN Acceleration

WAN accelerator

Web Application Firewall

Web Server

Web User Interface (WUI)

Windows Network Load Balancing

WordPress

X

X-Forwarded-For (XFF)

X-ray

Start powering your always-on application experience today

30-Day Free Trial  Contact Sales

Company

  • About Us
  • Load Balancer
  • Why Kemp
  • Contact Us
  • FAQ
  • Sitemap
  • Blog
  • Strategic Partners
  • Load Balancer Blog
  • Jobs at Kemp
  • Press Portal

LoadMaster

  • Bare Metal
  • SDN
  • Virtual
  • Hardware
  • Cloud
  • iRules Migration Tool
  • Multi-Tenant
  • Metered Licensing

Load Balancer Resources

  • Cisco ACE Load Balancer Migration
  • Load Balancer Videos
  • Load Balancer White Papers
  • Load Balancer Case Studies
  • Sizing Guide
  • Glossary
  • HTTP/2

Load Balancing

  • URL ReWrite
  • What is a load balancer?
  • Network Load Balancer
  • Apache Load Balancer
  • Load Balancing NGINX
  • Load Balancing Software
  • DNS Failover
  • Reverse Proxy
  • Round Robin Load Balancing
  • DNS Load Balancer

Microsoft Load Balancing

  • Azure Load Balancer
  • Windows NLB
  • IIS Load Balancer
  • Microsoft Exchange 2016
  • Remote Desktop Services
  • Microsoft SharePoint
  • Skype for Business

Load Balancer Solutions

  • SSL Acceleration
  • Application Delivery
  • Hosting
  • E-Commerce
  • Healthcare
  • Education
  • Federal
  • Load Balancer Cluster

Security

  • OWASP Top 10
  • DirectAccess Load Balancer
  • Web Application Firewall (WAF)
  • DevOps
  • DDoS Protection
  • Always-on-VPN Load Balancer

Cloud Load Balancing

  • Hybrid Load Balancers
  • Hybrid Cloud
  • AWS Load Balancer (Amazon)
  • Azure Cloud
  • VMware on AWS Cloud
  • Nutanix
[ {"Region": "[Singapore]"} ]
  • Contact Us
  • Support
  • Kemp Policies
Kemp Technologies
Kemp Technologies Pte Ltd, 3 Church Street, #12-01 Samsung Hub, Singapore 049483.
Phone +65-6580-2188

Follow Kemp

© 2019 Kemp Technologies, all rights reserved. Kemp®, Kemp Technologies®, LoadMaster®, and the K logo are trademarks of Kemp Technologies, Inc.
Copyright © Kemp Technologies, Inc. All Rights Reserved