Publishing & Securing Legacy Applications
In the previous blog post, we discussed load balancing essentials and methods of traffic distribution among the real servers. When you publish an application with Kemp LoadMaster you can add lots of extra capabilities on top of the basic load balancing.
Investigating Network Anomalies – A sample workflow
Network anomalies vary in nature. While some of them are easy to understand at first sight, there are anomalies that require investigation before a resolution can be made. The MITRE ATT&CK framework introduced in Flowmon ADS 11.3 streamlines the analysis process and gives security analyst additional insight by leveraging knowledge of adversaries' techniques explaining network anomalies via the ATT&CK framework point of view.
Meet Stephan Leferink, Senior Sales Director at Progress
Stephan Leferink has worked at Progress since 1992. In that time, both his professional and personal endeavors have been fulfilling and sometimes thrilling.
Understanding Load Balancing Essentials
In this post we’ll review some of the essential ideas in Load Balancing to help you understand how to get the best configuration for your application.
SSH File Transfer Protocol 101: What It Is and When to Use It
Picture this: "Webhosting Company loses 13 million plaintext passwords" in bold at the head of a blog or a paper.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation