Home Application Delivery

Application Delivery

Embarking on a Cloud Journey: Expect More from Your Load Balancer

Many enterprises are in transition to the cloud, either building their own private cloud, managing a hybrid environment – both physical and virtualized—or deploying...

Simple to Use Link Availability Solutions

Previously, I discussed how rerouting data center host infrastructure should be part of next-generation DDoS solutions. In this blog, I will discuss how link...

Digital Transformation – Take Advantage of Application Delivery in Your Journey

The adoption of new technologies is accelerating business transformation. In its essence, the digital transformation of businesses uses technologies to drive significant improvement in...

DevSecOps Automation? The Roadmap

In my previous blog post, I addressed the need and the process of creating applications faster and building an adaptive infrastructure that suits my...

DevOps: Application Automation? The Inescapable Path

The world is changing. IoT is becoming more and applications hold a prominent place in this new world. As IT infrastructure carries a huge...

Optimizing Multi-Cloud, Cross-DC Web Apps and Sites

If you are working from your organization's office, the chances are good that you are enjoying the responsiveness of your corporate LAN, thereby guaranteeing...

Adopt TLS 1.3 – Kill Two Birds with One Stone

Transport Layer Security (TLS) version 1.3 provides significant business benefits by making applications more secure, improving performance and reducing latency for the client. Changes...

DDoS Protection is the Foundation for Application, Site and Data Availability

When we think of DDoS protection, we often think about how to keep our website up and running. While searching for a security solution,...

Considerations for Load Balancers When Migrating Applications to the Cloud

According to a new forecast from the International Data Corporation (IDC) Worldwide Quarterly Cloud IT Infrastructure Tracker, total spending on IT infrastructure for deployment in...

Should Business Risk Mitigation Be A Factor When We Choose Our Suppliers And Manufacturers?

This is something that I have struggled with for most of my working life. As a technology professional, it is my job to pick...

Single Sign On (SSO) Use Cases

SSO reduces password fatigue for users having to remember a password for each application. With SSO, a user logs into one application and then...

Global Server Load Balancing (GSLB) Use Cases

Whenever applications are deployed to multiple locations (physical or virtualized data centers and/or public cloud), some mechanism is required to distribute the user requests...

Must Read

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.

A Buyer’s Guide to Bot Management

Web-based bots are a critical part of your business’s digital presence.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than...

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...