Loadbalancer
  • Solutions
  • Products
  • Pricing
  • Resources
  • Company
  • Contact us
Portal login
Talk to us Get started

Enhanced security

Security that never sleeps

Peak performance

Performance that scales with you

Zero downtime

Because that’s what matters

Multi-site resilience

True high-availability and failover, made easy

Industry solutions

Expertise in healthcare, object storage, and mission critical industries

Application solutions

Every application, documented with care

Partner solutions

Professional services

The ADC Portal

Any load balancer, anywhere, one simple platform

The Enterprise ADC

Smart, flexible, unbreakable — and trusted

Flexible licensing

No hidden costs,  no end of life — just great value

Get a quote

Get technical support

Reviews

based on 1,500+ reviews

Customer stories

Blog

Events

Not your average Load balancer company

Learn why we are different

Help! Our legacy modalities are awesome — but they don't understand DNS!

Connecting remote sites to central data centers necessitates GSLB. But implementation for legacy modalities isn't straightforward.
  • Solutions
  • ADC Enterprise
  • ADC Portal
  • Pricing
  • Company
  • Resources
  • Blog
  • Contact us
Collection of 90 posts

Security

No laughing matter

Back to all posts
How to configure HAProxy's Proxy Protocol with Squid
Latest

How to configure HAProxy's Proxy Protocol with Squid

A customer asked me the other day how to set up Squid Proxy Protocol on their Loadbalancer appliance.

Recent blogs

All posts
  • Healthcare
  • Storage
  • Print
  • Security
  • Microsoft
More Categories
    • F5 / Citrix / Kemp
    • HAProxy
    • Direct Server Return
    • Global Server Load Balancing
    • Web Application Firewall
    • AWS / Azure / GCP
    • Comparisons
    • Load Balancing How-tos
Lessons from InfoSec 2023: how to prevent a cyber crisis with a defense-in-depth strategy
Events

Lessons from InfoSec 2023: how to prevent a cyber crisis with a defense-in-depth strategy

The talk of the town at InfoSec 2023 was the evolving cyber security battleground, and the practical steps organizations might take in order to mitigate some of these threats...
Joshua Turnbull
• 5 mins
Why you shouldn't lose sleep over the commercial end-of-life of ModSecurity
WAF

Why you shouldn't lose sleep over the commercial end-of-life of ModSecurity

The ModSecurity web application firewall (WAF) engine is set to go end-of-life (EOL) on 1 July 2024...
Andrew Howe
• 5 mins
Centralized management for enhanced security with the ADC Portal

Centralized management for enhanced security with the ADC Portal

You need a clear, comprehensive view of your entire load balancing estate to maintain control and security...
Richard Halcrow
• 3 mins
Three scenarios for implementing time-based security and content switching on your load balancer
How-tos

Three scenarios for implementing time-based security and content switching on your load balancer

It can sometimes be useful to make load balancing decisions based on the time and date. This allows you to conditionally refuse or redirect connections based on the time they're received...
Andrew Howe
• 10 mins
Should an ADC be your first line of defense against Denial of Service (DoS) attacks?
Security

Should an ADC be your first line of defense against Denial of Service (DoS) attacks?

There are two schools of thought on this: ‘yes, it should’ and ‘no, it shouldn't’. Let's look at the arguments both for and against...
Neil Hosking
• 10 mins
OWASP doesn't want you to have crAPI security
Security

OWASP doesn't want you to have crAPI security

Here's what we learned from crAPI about API security, and how a Web Application Firewall (WAF) can help you take things one step further...
Nicholas Turnbull
• 6 mins
Security guard in black jacket
Security

The role of load balancers in zero trust architectures

Getting on board with zero trust is the easy part. Actually applying these principles to your architecture is less black and white...
Dave Saunders
• 7 mins
application security padlock and laptop keyboard
WAF

Report back from the OWASP Core Rule Set Community Summit and OWASP Global AppSec 2023: The WAF conundrum

I had the privilege of speaking in Dublin at this year's OWASP Core Rule Set Community Summit before then attending OWASP Global AppSec immediately afterwards...
Andrew Howe
• 4 mins
How to create an SSL certificate
How-tos

How to create an SSL certificate in Linux

I thought I would try and cover the basics here by explaining how to create an SSL certificate and the various files that you'll end up with...
Jon Morby
• 4 mins
Proactive network management for business continuity
High Availability

Proactive network management for business continuity

We'd all rather prevent a disaster than have to live with the consequences of one...
Kashim Cooper
• 5 mins
Handling large requests with a Web Application Firewall (WAF) while avoiding Denial of Service (DoS) attacks
WAF

Handling large requests with a Web Application Firewall (WAF) while avoiding Denial of Service (DoS) attacks

Sometimes, we need to pass unusually large HTTP requests through our WAF stack...
Andrew Howe
• 7 mins
How to rate limit with HAProxy Stick Tables and the WAF
HAProxy

How to rate limit with HAProxy Stick Tables and the WAF

A while ago I was asked if it would be possible to apply some general rate limiting in HAProxy and the WAF, in order to help prevent DOS-style attacks on a customer's servers...
Daniel Tighe
• 6 mins
What can we learn from the recent F5 security vulnerability?
Security

What can we learn from the recent F5 security vulnerability?

F5 recently announced a critical security vulnerability, allowing an attacker to bypass its iControl REST authentication, and execute commands such as creating or deleting files and disabling services...
Lea Friend
• 4 mins
When is it right to SSL offload?
How-tos

When is it right to SSL offload?

It's a fair question, right? Let's take away the strain of SSL terminations from our application servers and let the load balancers deal with it. After all, why would we want to bog down our nifty application with network-level considerations?..
Scott Weedon
• 4 mins
Spring Framework vulnerabilities
Security

Spring Framework vulnerabilities

It is understandable that SysAdmins, DevOps, and most in the IT and Security Departments involved want to ensure all load balancers are fully patched and protected, given that our product plays an important role in their topology...
Dave Saunders
• 2 mins
DoS vulnerability in OpenSSL related to certificate parsing (CVE-2022-0778)
Security

DoS vulnerability in OpenSSL related to certificate parsing (CVE-2022-0778)

Customers with manually configured, custom client authentication deployments (rare) or using “re-encrypt to backend” to communicate with untrusted third-party servers (very rare) may be impacted...
Lea Friend
• 1 min
PwnKit Vulnerability (CVE-2021-4034)
Security

PwnKit Vulnerability (CVE-2021-4034)

A local privilege escalation vulnerability was found on polkit's pkexec utility. It is a critical vulnerability because it gives full root privileges to any local user or attacker...
Lea Friend
• 1 min
ModSecurity DoS vulnerability (CVE-2021-42717)
Open source

ModSecurity DoS vulnerability (CVE-2021-42717)

All WAF vendors and services using ModSecurity are affected by this vulnerability (unless they have the vulnerable piece of code disabled, by chance)...
Andrew Howe
• 3 mins
Does Niagara Networks have the answer to scaling Secure Web Gateways all the way up to 100G?
Security

Does Niagara Networks have the answer to scaling Secure Web Gateways all the way up to 100G?

Network Security devices such as firewalls, WAF, SWG, IPS etc. are often deployed inline with bridge mode., which has two major problems...
Malcolm Turnbull
• 2 mins
Simplifying web application security with the Core Rule Set v3
How-tos

Simplifying web application security with the Core Rule Set v3

A WAF isn't a magic bullet, but, as part of a defense in depth strategy, a properly configured WAF should catch and stop common, everyday attacks...
Andrew Howe
• 7 mins
Apache Log4j vulnerability CVE-2021-44228
Security

Apache Log4j vulnerability CVE-2021-44228

The Apache Log4j utility is commonly used for logging requests by millions of Java applications to log error messages. However, recently the critical vulnerability CVE-2021-44228 was discovered in the Apache Log4j library...
Damian Pacuszka
• 3 mins
What can we learn from the recent Facebook outage?
High Availability

What can we learn from the recent Facebook outage?

On the 4th October 2021, the social media giant Facebook experienced a global outage, affecting not only Facebook, but also Instagram and WhatsApp...
Seamus Toth
• 4 mins
Extending ModSecurity: How to add completely custom WAF functionality
WAF

Extending ModSecurity: How to add completely custom WAF functionality

In this example, I’m going to add a new transformation function to ModSecurity to calculate the Scrabble score of a variable. This will allow us to block HTTP requests containing query string parameters with a Scrabble score above a chosen threshold...
Andrew Howe
• 12 mins
How to create a load balancer SSL/TLS certificates report
Integration

How to create a load balancer SSL/TLS certificates report

I should really say that not every request of this type can be turned around on the same day - but we do try!..
Andrew Smalley
• 6 mins

Get Started Today, for Free

Try us out—no strings, no stress, just seriously good load balancing and top-notch support. Let's make your apps unstoppable!

Try for free Book a meeting
  • Load balancer
    • Zero Downtime
    • Enhanced Security
    • Peak Performance
    • Industry Solutions
    • ADC Comparison
    • Citrix NetScaler Migration
  • Product
    • Enterprise ADC
    • ADC Portal
    • Pricing
    • ADC Free Trial
    • Portal Free Trial
  • Features
    • Layer 4 & Layer 7
    • WAF
    • GSLB
    • Reverse Proxy
    • Feedback Agent
  • Company
    • It’s About You
    • Solutions
    • Load Balancer
    • HPE Partnership
  • Resources
    • Applications
    • Blog
    • Case Studies
    • Documentation
    • Quick Start
  • Support
    • Open Support Ticket
    • Security News
    • Reviews

Connect

Contact

  • Tel: +1 833 274 2566
  • Email: [email protected]

2025 Loadbalancer.org, Inc.

  • Contact
  • Privacy
  • Terms
  • Legal
Navigate
Close