Loadbalancer proud to announce ISO 27001:2022 compliance with NQA certification
Loadbalancer is proud to announce that it is now formally ISO 27001 compliant, cementing our position as a market-leader in Application Delivery solutions.
Loadbalancer is proud to announce that it is now formally ISO 27001 compliant, cementing our position as a market-leader in Application Delivery solutions.
The web-based login to your application is a juicy target for hackers. And once they get past the login, they can cause you some serious pain.
An engineer at a business using Darktrace, confessed that many IT staff ignored the pricey security software because it sent so many false alerts.
A critical security issue has been found in HAProxy, leaving certain systems vulnerable to remote attack. We want to keep you informed, and we understand that this news might cause you some anxiety. But be reassured - most of our customers won’t be affected.
Let’s Encrypt is awesome! Not only is it more secure than your existing certificate authority. It's also reliable, scalable, fully automated — and free!
With our 9 years expertise in making applications within AWS indestructible, Loadbalancer.org was able to provide FC Barcelona with an intelligent application delivery controller built on 15 years' worth of battle‑hardened software.
We have built upon our existing strengths in virtualized environments to become Nutanix certified, with the addition of support for Nutanix AHV positions.
Cloudflare provides a content delivery network (CDN). A CDN is a worldwide network of servers that delivers web content to clients based on the geographic location of the client.
In the Azure Management Portal, select the Virtual Machines option, click on the newly deployed Load Balancer VM, click on Network interfaces and then select the network interface attached to the load balancer, then click IP configurations and ensure that IP forwarding is Enabled.
The WAF addresses the OWASP Top 10 vulnerabilities and is very quick and simple to deploy.
Security through obscurity is not a great idea when it is your ONLY protection technique. For example moving your SSH port from 22 -> 23 won't fool any hackers for long! However, I've always liked putting a 'double login' in front of important web sites to frustrate simple automated hacking tools.
Using client certificates for security is a pretty cool idea! You can protect an entire application or even just a specific Uniform Resource Identifier (URI) to only those that provide a valid client certificate.
SSL offload is handled by STunnel, while HAProxy handles back-end server re-encryption.
How frustrating do you find it when hackers or robots fill in your website forms with "Buy Viagra Now!" type spam?
The long and short of it is, there are updates to the Linux kernel and glibc packages which will 'fix' the issue
Different vendors have widely different opinions on which method should be used to deploy web filters or SWGs. Historically, vendors struggled to implement authentication in Transparent mode, and maybe they remember some awkward conversations with customers that chose the wrong method.
The Web Application Firewall is based on ModSecurity which is an open source WAF for Apache, IIS, and Nginx for protecting against a many variety of attacks and allows for HTTP traffic monitoring and logging.
SNI is an extension to the TLS protocol which enables the client to broadcast its hostname when it tries to connect to your server. This allows you to use multiple SSL certificates on a single IP.
Due to the way that PuTTY uses a signed integer variable to store the number of characters to be erased and there was inadequate checking for overflow, there was the potential for an attacker to corrupt important data in certain circumstances.
The integrated WAF in version 8 of the Loadbalancer.org appliance has been designed for fast, low latency PCI compliance for our customers.
Updates include an enhanced process for high availability appliance pairing, improved LBCLI, and advancement of the web user interface.
Anomaly score based blocking is more flexible and effective than simple first error blocking.
Denial of Service (DOS) attacks can be used to degrade or cripple the functionality of a site.
Is getting an A+ rating with the Qualys scanner starting to feel a bit like chasing a mythical unicorn? Every time you get close to catching and keeping the beast — it run's away and they change the rules again!
So here we go again... Another vulnerability has been found in OpenSSL. However, this is very hard to exploit and requires the hacker to have control of your wireless hotspot or network.
There seems to have been so much hype over the recent bash bug, shell shock! And there were all the people in the Microsoft world thinking YES we are so cool we are NOT affected by it!