G2’s Most Recommended WAF & DDoS Protection
The G2 Summer 2023 Grid Reports recognize HAProxy as a leader in the Web Application Firewall (WAF) and DDoS Protection categories. These rankings are based on customer satisfaction and market presenc
The G2 Summer 2023 Grid Reports recognize HAProxy as a leader in the Web Application Firewall (WAF) and DDoS Protection categories. These rankings are based on customer satisfaction and market presenc
Improvements in acme.sh integration allows you to manage TLS certificates with Let’s Encrypt without restarting HAProxy.
HAProxy Technologies has announced that HAProxy 2.0 or newer, HAProxy Enterprise 2.0 or newer, and HAProxy ALOHA 12.5 or newer are affected by CVE-2023-25725. If you are using an affected product you
This blog post will discuss web threats and how to protect yourself against DDoS attacks, web scraping, brute-force attacks, and vulnerability scanning.
Cookies have many usages, most notably user authentication and settings. This post will explain the best practices for how to secure your cookies.
In this blog post, you will learn that application acceleration is all about improving the responsiveness of a digital service.
Learn how to secure your APIs against unauthorized access. The OAuth 2 protocol uses JSON Web Tokens to convey a client’s permissions and HAProxy can verify whether a token can be trusted.
HAProxy enables mTLS, supporting client certificate authentication for both clients and backend servers. Learn how to set it up in this blog post.
HAProxy's high-performance security capabilities are utilized as a key line of defense by many of the world's top enterprises. Application-layer DDoS attacks are aimed at overwhelming an application w
The below information is deprecated as HAProxy Enterprise now offers a fully functional native WAF module which supports whitelist-based rulesets, and more.
Showing 3 of 3 Pages