par HAProxy Technologies | Fév 21, 2018 | Événements, Webinars
We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise...
par Chad Lavoie | Mar 24, 2017 | Security
The Proxy protocol is a widely used invention of our CTO at HAProxy Technologies, Willy Tarreau, to solve the problem of TCP connection parameters being lost when relaying TCP connections through proxies. Its primary purpose is to chain proxies and reverse-proxies...
par Baptiste Assmann | Fév 10, 2016 | Non classifié(e), Security
One of the biggest security challenges that companies face in today’s modern climate is the POST attack. Unlike a more traditional « Denial-of-Service » attack, POST attacks target a servers logical resources – making them particularly powerful when...
par Nenad Merdanovic | Juil 15, 2015 | Load Balancing/Routing, Non classifié(e)
ECC and RSA certificates and HTTPS To keep this practical, we will not go into theory of ECC or RSA certificates. Let’s just mention that ECC certificates can provide as much security as RSA with much lower key size, meaning much lower computation requirements...