Glossary

1 MINUTES

What is a Load Balancer?

by Bethany Hill on Glossary • November 26, 2020
A load balancer is a network device or appliance that distributes client traffic across a pool of backend/application servers. Load balancing can be implemented to operate at either Layer 4 (transport layer) or Layer 7 (application layer) of the OSI networking model. Layer 4 load balancing entails distributing traffic for protocols that operate at the transport layer (TCP, UDP) and sometimes at the network layer (IP). Layer 7 load balancing operates at the application layer and makes balancing decisions based on data content and metadata available at that layer.
Read More →
1 MINUTES

What is a Web Application Firewall (WAF )?

by Bethany Hill on Glossary • November 26, 2020
What is a WAF and how does it work? A WAF (or Web Application Firewall) protects web applications from common vulnerabilities by filtering out bad HTTP traffic between the client and web application. WAFs can be considered reverse proxies, as they protect web applications from malicious endpoints whereas a proxy server protects from malicious applications.
Read More →
2 MINUTES

What is Web Application Acceleration?

by Bethany Hill on Glossary • November 26, 2020
What is Web Application Acceleration? Web application acceleration is the acceleration of content delivery between a web application server and client devices through the optimization of network traffic. Measures to achieve web application acceleration include SSL offloading, compression, minification, caching and concatenation of content served within network traffic between servers and clients. A hardware or software web accelerator appliance is typically used to provide this functionality.
Read More →
1 MINUTES

What is Application Load Balancing?

by Bethany Hill on Glossary • November 26, 2020
What is Application Load Balancing? Application load balancing refers to load balancing client traffic to backend web servers at the application layer (layer 7) of the OSI networking model. Typically this involves load balancing at web application - HTTP/HTTPS, FTP, SMTP, DNS, SSH, etc - protocol level, health checking, server monitoring, network traffic optimization, minification, and caching.
Read More →
1 MINUTES

SSL/TLS Termination

by Bethany Hill on Security • November 19, 2020
What is SSL/TLS Termination? SSL (Secure Socket Layer) or TLS (Transport Security Layer) is a security protocol used for encrypting traffic between two endpoints, typically a web service and a browser, or a mail server and a mail client, to ensure all data exchanged is secure and confidential.   SSL/TLS secures most of today’s internet traffic. For example: during online transactions or while exchanging sensitive information.
Read More →
1 MINUTES

What is DNS Flood: NXDOMAIN Flood?

by Bethany Hill on Glossary • October 2, 2020
What is DNS Flood? A DNS flood is a form Denial of Service (DoS) attack at the DNS resolution level. It entails flooding a DNS server, which clients consult for server name resolution, with DNS queries for nonexistent (NXDOMAIN) domains.
Read More →
1 MINUTES

DMZ (Demilitarized Zone)

by Bethany Hill on Glossary • October 2, 2020
What is a Demilitarized Zone? In computer networking, a DMZ (Demilitarized Zone) is a segment of the network that is protected from access of both external and internal sources with firewalls. 
Read More →
1 MINUTES

What is DDoS (Distributed Denial-of-Service)?

by Bethany Hill on Glossary • September 23, 2020
What is DDoS (Distributed Denial-of-Service)? DDoS is an advanced DoS attack intended to deny legitimate users access to web services by overwhelming the relevant web server(s) with requests at a scale far higher than legitimate web service use will warrant.
Read More →
1 MINUTES

Disaster Recovery / Business Continuity 

by Bethany Hill on Glossary • September 23, 2020
Disaster recovery is the restoration of computer systems including hardware, software and data to an operational state following a disruptive event.
Read More →