This Isn’t Just a Firewall, This… is a Web Application Firewall

by Greg, May 3rd, 2018

  Firewalls are, in technology terms, as old as the hills. There’s been more ‘next generation’ firewalls than musical genre’s in the 40 odd years they’ve been about. At their heart, they permit or deny packets entering or leaving a network and, useful as that is, little else. Each generation adds something new to the […]

Read More


Cisco ACE End of Life – Free Migration service

by Greg, April 30th, 2018

Cisco ACE End of Life – Free Migration service to jetNEXUS   edgeNEXUS, a leading provider of next generation load balancing, Web Application Firewalls (WAF) and  Multi cloud/ Hybrid cloud data center load balancing solutions announce today the launch of  a Free load balancer migration service to help provide a smooth transition for Cisco Ace […]

Read More

Cisco ACE End of Life

A Web Application firewall can be a pain in the A*** but maybe its essential for GDPR ?

by Greg, March 7th, 2018

Firewalls have been around for years, but Web Application Firewalls are much newer and despite the name very different!   So firstly what is a WAF? What does it do and why do I need one (or not)? Quite simply a normal firewall will open up ports to allow traffic from the outside world access to […]

Read More


Edge Computing – What is it, and why is it relevant for application delivery and IoT?

by Greg, February 5th, 2018

Edge Computing – What is it, and why is it relevant for application delivery and IoT? Edge Computing describes the provision of data processing further away from the centre of the network – literally at its edges. It’s a term often used to describe egress points to the network such as wireless access points and […]

Read More


WannaCry – What’s next…

by Vivek Singh, February 5th, 2018

Thoughts on the latest NHS “WannaCry” exploit – could it happen again, could it be worse and what lessons can be learned? NHS “WannaCry” exploit – It could happen again and it could be worse! This week we have witnessed the wide spread hacking of computer systems, this has had widespread implications to us all as […]

Read More


Load Balancing? What is it?

by Simon Shaw, September 7th, 2017

Picture this, you work in purchasing. You come into work to find a sign-off request on your desk for yet another IT solution. A load balancer – you are unsure of what it is or does, all you know is that the IT department need it. Sound familiar? Before you call your IT Manager and […]

Read More


Simplicity and Security with SSO and Pre-Authentication

by Greg, August 31st, 2017

Don’t just Authenticate users on your web or application servers. Find out who they are before hand. Why – Would you invite someone into your house (who you had no idea who they were) , sit them down on your sofa and then ask them for ID? Authenticate them as close to the edge as possible […]

Read More


6 Things to Consider When Deploying a Load Balancer

by Simon Shaw, July 19th, 2017

When you have made the sensible decision to implement a load balancer within your infrastructure, there are a few points you should consider to get the best from your solution. Load Balancing technology has evolved considerably and as a result, the terminology and architecture surrounding it can be confusing and overwhelming. This blog explores the […]

Read More


Simple Content Security Policies to Defend Against XSS Attacks

by Customer Experience team, July 8th, 2017

  We’ve covered quite a few security related HTTP headers on the blog in recent weeks but the boss of them all has to be Content-Security-Policy (CSP). The boss, both because of the level of protection it provides but unfortunately also because of the difficulty of implementing it correctly on the first go. As with […]

Read More


The True Cost of Complexity within the Modern Network

by Adel Nasseri, June 29th, 2017

“We have to cut costs!” This is a phrase uttered too often in meetings. It is perhaps the most common business challenge all enterprises face and will continue to be so, until increasing profitability is no longer a priority for businesses. Until that day, department heads must look at new and existing ways of becoming […]

Read More