Hi [[ session.user.profile.firstName ]]

Using Load Balancing to Bridge Hybrid IT Components

We are inundated with messaging about cloud only architectures, but the reality is that we need to learn to have networks that bridge private data centers, public clouds, and private clouds all working together. That means applications need to look and feel ubiquitous across the different environments. The end user should not know or care whether the application is in the public cloud or in a private software-defined data center (SDDC).

This hybrid cloud environment brings many design and operational challenges. One of the most important lessons we can learn is to use consistent technologies and work towards a common operational view to support the IT architecture. Load balancing is a key component of the application delivery architecture and the right solutions can provide the bridge across the hybrid IT components.
Recorded Sep 21 2021 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Frank Yue, Principal Application Experience Architect, Kemp
Presentation preview: Using Load Balancing to Bridge Hybrid IT Components

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Choosing a Load Balancer: A Buyer's Guide to Success Nov 11 2021 10:00 am UTC 57 mins
    Frank Yue, Principal Application Experience Architect at Kemp
    It can be challenging to navigate the feature functionality and support requirements one needs to meet when selecting the right load balancing solution for their network. This webinar provides a step by step guide to help navigate users through the process of understanding their application requirements, identifying their load balancing needs to meet these requirements, and selecting the right set of features to optimize application experience [AX].

    We will be reviewing the following requirements:

    - High availability
    - Security
    - User authentication
    - Network visibility

    This webinar discussion will help users determine what is important for their organization and make the right choice for their specific needs. Webinar attendees will receive a buyer's guide and worksheet to assist them in selecting the most optimal load balancing solution for their network.
  • Using Load Balancing to Bridge Hybrid IT Components Oct 28 2021 5:00 pm UTC 51 mins
    Frank Yue, Principal Application Experience Architect, Kemp
    We are inundated with messaging about cloud only architectures, but the reality is that we need to learn to have networks that bridge private data centers, public clouds, and private clouds all working together. That means applications need to look and feel ubiquitous across the different environments. The end user should not know or care whether the application is in the public cloud or in a private software-defined data center (SDDC).

    This hybrid cloud environment brings many design and operational challenges. One of the most important lessons we can learn is to use consistent technologies and work towards a common operational view to support the IT architecture. Load balancing is a key component of the application delivery architecture and the right solutions can provide the bridge across the hybrid IT components.
  • Securing Business Networks in the New Remote Reality Recorded: Oct 14 2021 47 mins
    Simon Ratcliffe | Stan Davidson | Steve Cobb | Kemp Technologies
    Companies have had to pivot to remote work policies as quickly as possible, with network security often taking a backseat to business continuity. Now, remote working increasingly looks to be a permanent corporate fixture, with Global Workplace Analytics predicting that up to 30% of the workforce will be partially working from home by the end of 2021. Half-baked security protocols can no longer cut it in this new remote reality.

    Securing your IT networks is not just a good business practice; it’s critical for any company looking to stay competitive. Proofpoint reports that 88% of global organizations experienced spear phishing attempts in 2019 — and cyber attackers are continually adapting to the new environment. A comprehensive security strategy is more necessary than ever.

    Join this panel of experts as they discuss the most critical vulnerabilities of a newly remote system and how to safeguard against cyber threats:

    • VPNs and how to choose the right one
    • Threat Hijacking Attacks: what are they and how to protect against them
    • Understanding Your Endpoints and building scalable endpoint management
    • Making Cloud Security work for your organization

    Simon Ratcliffe, Technology Evangelist, Ensono
    Stan Davidson, Principal Solutions Engineer, EMEA
    Steve Cobb, CISO, OnceSource
    Michael Jimenez, Senior Product Marketing Manager, Kemp Technologies
  • Why Network Detection and Response (NDR) is Critical to your Security Playbook Recorded: Oct 12 2021 34 mins
    Filip Černý, Product Marketing at Kemp
    It is hard to protect your organization and IT infrastructure if you cannot see the threats. Network Detection and Response (NDR) is a key technology that provides the insights an IT security organization needs not only to gain visibility into activity on the network, but also intelligence to differentiate the good players from the bad actors. While perimeter security like firewalls can protect the borders and endpoint security can protect individual devices, there is a need for a solution that can detect threats and within your network infrastructure. NDR provides the insights and intelligence to alert your security team to relevant threats and provide actionable details to enhance the other information sources.

    Watch and listen to learn:
    · How NDR can easily be enabled within your network.
    · Why NDR compliments other security solutions including SIEM and NGFW.
    · The benefits of NDR to your IT security operations team.
  • Choosing a Load Balancer: A Buyer's Guide to Success Recorded: Sep 27 2021 57 mins
    Frank Yue, Principal Application Experience Architect at Kemp
    It can be challenging to navigate the feature functionality and support requirements one needs to meet when selecting the right load balancing solution for their network. This webinar provides a step by step guide to help navigate users through the process of understanding their application requirements, identifying their load balancing needs to meet these requirements, and selecting the right set of features to optimize application experience [AX].

    We will be reviewing the following requirements:

    - High availability
    - Security
    - User authentication
    - Network visibility

    This webinar discussion will help users determine what is important for their organization and make the right choice for their specific needs. Webinar attendees will receive a buyer's guide and worksheet to assist them in selecting the most optimal load balancing solution for their network.
  • Cloud Market Overview Q&A with ESG & Kemp Recorded: Sep 20 2021 50 mins
    Mark Bowker, Senior Analyst - Cloud, Mobility & Security, ESG & Jason Dover, VP Product Strategy, Kemp
    The usage of public cloud services is pervasive as 78% of organizations currently use public cloud services. This dynamic is creating urgency for IT adapt as 45% of organizations take a cloud-first approach to new application deployments. Businesses also aspire to embrace cloud services but are also aware of current data center reality.

    As the gap continues to widen between rapid cloud innovation and enterprise reality, ESG will share how organizations continue to try to strike the balance between cloud native and legacy infrastructure. Learn how IT operations remains challenged on how to build, maintain, and operate a developer-ready infrastructure without impacting developer velocity while planning the future of monolithic applications by attempting to embrace new cloud native architectures.

    ESG will highlight how future applications will be architected to include cloud services interconnected to existing IT infrastructure investments, and how distributed cloud is designed to provide a connected ecosystem of cloud services, developer-ready infrastructure, and legacy IT that provides consistent operations for both cloud native and legacy applications
  • 5 Reasons Kemp Flowmon is Better for Security than Cisco Stealthwatch Recorded: Aug 19 2021 60 mins
    Filip Černý, Product Marketing at Kemp & Frank Yue, Principal Application Experience Architect at Kemp
    Cisco Stealthwatch, now called Cisco Secure Network Analytics, is a popular network detection and response (NDR) solution, but it may not be the best choice for your network. Learn how Cisco Stealthwatch works and understand why solutions like Kemp Flowmon use different technologies to deliver a better solution with an attractive ROI.

    In this webinar, you will:

    - Better understand the available NDR technologies
    - Learn how Kemp NDR compares to Cisco NDR
    - See the benefits of the Kemp Flowmon technology
  • Optimizar la supervisión y el diagnóstico del rendimiento de su red y servicios Recorded: Aug 17 2021 57 mins
    Dave Rendon, Solutions Architect, Kemp & Microsoft Azure MVP
    La detección exitosa de amenazas implica un enfoque de múltiples capas que requiere las herramientas, los métodos y los enfoques adecuados.

    Con los componentes básicos adecuado, incluyendo una solución "Network Detection and Response"(NDR) escalable, las organizaciones pueden tener éxito en la detección y prevención de vulnerabilidades extrayendo la información de la red.

    En esta sesión aprenderá:

    - Ayudar a su equipo de TI a detectar rápidamente problemas antes de que afecten su organización.
    - Obtener análisis avanzados del estado de su red y servicios
    - Detectar vulnerabilidades rápidamente y optimizar su investigación y respuesta.
  • Manage security threats with MITRE ATT&CK Framework Recorded: Aug 12 2021 28 mins
    Frank Yue, Principal Application Experience Architect at Kemp & Filip Černý, Product Marketing at Kemp
    Cybersecurity threats are affecting us every day. Unfortunately, many businesses do not have all the necessary tools and knowledge to easily see and identify them in their network. When an IT security problem occurs, it is often a firefight with people scrambling to determine what is going on, the impact, and ultimately, the root cause of the problem.

    Learn about the tools you can use to gain visibility within your network to help streamline how you manage and protect your assets. Give your NetOps and SecOps teams the right knowledge to effectively work together to identify and mitigate IT threats.

    4 benefits for attendees:

    1. Learn about the right approach to gain visibility for a secure network environment

    2. Understand the values of the Security Visibility Triad and MITRE ATT&CK framework

    3. Discover how you can use Network Detection and Response to your benefit

    4. Hear some real use case scenarios utilizing this approach
  • Integrating Kemp Load Balancing with Kubernetes Recorded: Jul 14 2021 52 mins
    Frank Yue, Principal Application Experience Architect at Kemp & Barry Gleeson, Product Manager at Kemp
    Join us for a technical dive into how Kemp LoadMaster load balancers can easily be integrated into your Kubernetes environment. Learn about the Kemp Ingress Controller and its ability to work in Service Mode and Ingress Mode. We will show how the load balancer can bring the hybrid environment together with container and monolithic instances of the application components. Discover how advanced capabilities like edge authentication and web application firewall can be brought into your Kubernetes environment.

    Highlights include:

    - Demonstration of easy installation and configuration
    - Kemp Ingress Controller Service Mode and Ingress Mode explained
    - Managing Hybrid Applications
    - Advanced features
    - Auto-Scaling of Service
  • 6 Reasons You Need to Replace your F5 Load Balancer Recorded: Jun 23 2021 62 mins
    Frank Yue, Principal Application Experience Architect at Kemp
    You may be using F5’s BIG-IP load balancer, but did you know that it is probably not the best fit for your situation? Your project requirements are different from what the F5 product can do. There are features you are paying for but do not use, and there are things you wish your F5 product could do. High price tags and complex feature lists do not translate to a superior solution.

    Attend this webinar to learn the truth about F5 and why other solutions are often better suited for your application delivery and visibility needs. Get an updated perspective on the competitive load balancing landscape and gain visibility into your load balancing choices.
  • How to Simplify Kubernetes with Load Balancers Recorded: May 26 2021 58 mins
    Frank Yue, Principal Application Experience Architect, Barry Gleeson, Product Manager & Roy Dunican, Platform Ops at Kemp
    Kubernetes manages the microservices in a container environment, but how do you manage the overall application delivery? Load balancers are still needed for application availability, scalability, and security. The integration of load balancers into your Kubernetes environment can simplify the management of your application while maintaining the optimal application experience that you are looking for.

    In this panel discussion, you will learn:
    • How does publishing an application differ when using Kubernetes versus traditional applications?
    • How does Network Operations change with Microservices?
    • What are the benefits of integrating load balancers into the microservices ecosystem?
  • How to Detect Ransomware in your Network Recorded: May 11 2021 61 mins
    Frank Yue, Principal Application Experience Architect & Michael Merta, Business Development Manager, Kemp Flowmon
    Do you know that your network is under attack every 39 seconds? Do you know that it takes an average of 300 days to detect a ransomware attack or data exfiltration? The ever-changing nature of ransomware oftentimes allows it to slip under the radar of the perimeter, bypass end-point security, and get lost in a bunch of false positives or hide in blind spots in network visibility. That is why it is crucial to detect ransomware at an early stage and act before it harms your organization.

    Join this webinar to learn:

    - How NDR and NPMD solutions address these security issues and enable organizations to proactively protect themselves
    - Discover what a common ransomware scenario looks like from the attacker's perspective
    - Learn how Kemp's Flowmon solutions are able to detect the ransomware attack several times during its deployment, using a combination of AI, Machine Learning and behavior patterns
  • How to Identify and Fix Application Problems with Kemp's Network Telemetry Recorded: Apr 22 2021 58 mins
    Frank Yue, Principal Application Experience Architect at Kemp
    Applications are the core purpose of our IT architectures. All businesses want to deliver an optimal application experience [AX]. Kemp’s Network Telemetry provides valuable insight to discover and correct the problems that your applications are experiencing.

    Kemp has taken application experience [AX] to the next level by incorporating the network performance monitoring and diagnostic (NPMD) capabilities of its Flowmon Network Telemetry solution with the LoadMaster load balancer/application delivery controller (ADC).

    The addition of Network Telemetry provides in-depth application performance insights and proactive IT infrastructure monitoring across the entire application delivery chain. This provides a single pane of glass with which you can quickly and proactively ensure your business-critical applications are being delivered in the most optimized way that your infrastructure allows, whether it resides on-premises or in the cloud.  

    In this webinar we're covering:

    - What is wrong with today’s application experience [AX]?
    - An overview of Network Telemetry
    - Demo of Network Telemetry in action
    - How can we implement Network Telemetry?
  • Load Balancing 101 - What is a load balancer? Recorded: Apr 15 2021 61 mins
    Frank Yue, Principal Application Experience Architect at Kemp
    Load balancing is a key technology to deliver the application experience [AX]. Load balancing prevents application downtime and helps enable an optimal client experience. Join us to learn what load balancing is and how to benefit from the technology in your IT architecture. Learn from the load balancing basics to complex algorithms as we discuss the breadth and value of load balancing technology.
  • 4 Key Application Experience Monitoring Technologies that You Cannot Ignore Recorded: Mar 25 2021 50 mins
    Frank Yue, Principal Application Experience Architect & Filip Černý, Product Marketing Specialist at Kemp
    Application experience [AX] has a direct impact on revenue. Building the application delivery environment is not enough. In this webinar, learn how NPMD & NDR technologies can assist your application experience management.

    We will discuss the challenges of application experience management and look at some real-world use cases that use 4 key technologies to help optimize their users’ AX.
  • Improve Security & Decrease Deployment Risks with Global Server Load Balancing Recorded: Feb 25 2021 52 mins
    Benjamin Hodge - Principal Technical Advisor at Kemp
    Global Server Load Balancing (GSLB) provides multi-site business continuity and optimized geographic-based redirection of traffic for the best application experience. In the event of a service disruption or the need to scale capacity, mission-critical traffic is seamlessly redirected based on predefined policies to minimize impact and the need for manual intervention. IP Reputation and DNSSEC protect your applications from common threats like DDoS attacks and DNS cache poisoning.

    In this webinar you will learn about how to use GSLB to:

    - Increase Security Incident Response through DDoS Mitigation by setting up poisoned DNS responses (ie fake IPs) for specified regions.

    - Redirecting an Attacker to a Honeypot - when you detect an intruder in your network you don’t always want to kick them out! Why?

    - Reducing Deployment Risk and ensure no downtime to users and applications.
  • Streamline Network Detection and Response to Cyber Threats Recorded: Feb 2 2021 62 mins
    Frank Yue, Principal Application Experience Architect & Artur Kane, Head of Flowmon Product Marketing at Kemp
    Technology shifts towards mobile, cloud, and remote enablement have created a new attack surface and intensified pressure on security practitioners to properly defend critical assets. When 90% of the time needed for incident resolution is usually spent on trying to figure out if indeed there is a problem, it is challenging to keep pace with threats capable of bypassing perimeter and endpoint security.

    Security practitioners now more than ever before seek for fast and precise answers when facing more elusive, ever-changing threats.

    In this webinar we will:
    - Discuss how to seal the gap between endpoint and perimeter protection
    - Introduce a machine-learning engine that covers visibility gaps, reveals malicious behaviors, attacks against mission-critical applications and data breaches at any point of the threat lifecycle
    - Teach you to respond to breaches and attacks before business values are harmed
  • 5 Reasons to Replace Citrix ADC Load Balancing with Kemp Recorded: Jan 28 2021 56 mins
    Frank Yue, Principal Application Experience Architect at Kemp
    Sometimes, Citrix ADC, formerly Netscaler, the load balancing component within Citrix environments and as a standalone application delivery controller (ADC) is not the best solution for your business needs. Kemp shows how the Citrix ADC platform can be overly complicated, straining the resources of your IT organization while frustrating your cost-cutting CFO at the same time.

    Learn how Kemp load balancing solutions can integrate into Citrix VDI environments and how they are better suited for your general application load balancing needs.
  • Cloud Native vs. Kemp Load Balancers; how do they differ? Recorded: Nov 19 2020 61 mins
    Frank Yue, Principal Application Experience Architect at Kemp
    Have you found yourself wondering "What is the difference between cloud native and third party load balancers?" If so, then this webinar is for you as we will share the pros and cons of cloud native load balancers and how in the long term a third party load balancer like Kemp can be a better alternative for your needs.

    The webinar will cover these main talking points and will help you to understand why it is not always the best choice to use built-in offerings from public cloud providers:

    • Cloud load balancer feature sets
    • Pricing and associated costs
    • Comparison to third party solutions like Kemp
Powering the Always-On Application Experience
Kemp powers the secure, always-on application experience [AX] that enterprises and service providers demand. Kemp’s load balancing, network performance monitoring, and network detection and response solutions deliver maximum value through simplified deployments, flexible licensing, and top-rated technical support. Kemp is the world’s most-popular application experience solution with more than 100,000 deployments in 138 countries.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Using Load Balancing to Bridge Hybrid IT Components
  • Live at: Sep 21 2021 3:00 pm
  • Presented by: Frank Yue, Principal Application Experience Architect, Kemp
  • From:
Your email has been sent.
or close