Discover our Blog

How has cyber security changed in the last decade?

“Cyber Threats are many, varied, and always evolving” It’s 2021 and cybersecurity is big business. If we see the history of cybersecurity then it's very long and revolutionary but the last decade is quite important for cybersecurity. In the last decade, there has been lots of evolution and growth in cybersecurity. Cybersecurity evolves in both…

SKUDONET Enterprise Edition 6.2 Released!

After several months of hard work of development and QA, the SKUDONET Team is glad to announce the release of the Enterprise Edition 6.2. This release includes high evolution of the software. Please check below the most important changes to this release. New features: [system] VPN module [farms] let’s encrypt integration in the web GUI…

SKUDONET not affected by PwnKit (CVE-2021-4034)

The SKUDONET Team is glad to announce that Enterprise Appliances (in all their platforms Virtual, Baremetal, Hardware or Cloud) are not affected by the 12 year vulnerability found in Linux systems called PwnKit that permits a local privilege escalation discovered in polkit’s pkexec and registered as CVE-2021-4034. SKUDONET Community Edition is also not affected by…

How Remote Working With Cloud Help Small Businesses

In between the tragic situation of the current pandemic, an inspiring outcome was remote culture. The sudden disruption in industries forced organizations to start operating remotely almost overnight. As a result, many business stakeholders and key leaders experienced a world where even remote work can be efficient. Now that the damage of the initial turmoil…

Why Load Balancing is important to Cloud Computing Environments

We all know that the IT industry is one of the fastest-growing industries across the globe and cloud computing has made a tremendous impact on the IT industry's growth over the past few years. Almost all industries are shifting to cloud computing because of its prominent technology that allows thousands of applications and files to…

Top 5 Security Considerations for Cloud Migration

Introduction Growing cyber crimes in the industry have compelled businesses to focus on cybersecurity implementations in the organization. The evolving IT landscape strongly calls for dynamic business operations and systems that help embrace digital transformation. Considering these aspects and growing business requirements, organizations are adopting cloud technology. Cloud migration involves implementing highly advanced information security…

What to do before and after a Cybersecurity breach

“You have been hacked!” These are the words that no one wants to hear. But we all know these words are common in the world of digital transformation. Cybersecurity can happen any time, with anyone, and even large companies can become a victim of a cybersecurity breach. So, with the increase of cybersecurity threats throughout…

How 5G Is Changing the Cybersecurity Landscape

5G holds a lot of potential for businesses. The promise of speeds up to 20 Gbps and near-zero latency could help companies become faster and more connected than ever. Despite these benefits, 5G networks also present some new risks. Public fears about radiation or diseases traveling along 5G waves are largely unfounded, but these networks…

Which Is Best When Working Remotely: VDI or DaaS

Are you facing issues in working remotely? Do you need the right tool to manage your remote workforce? Over a decade has passed and business desktops have evolved ever since. Earlier, businesses were using bulky units consuming your entire desk. With time, office desktops have become more and more advanced and sleek. Now, we have…

Download Skudonet ADC Load Balancer
Community Edition

Source Code

A versatile and installable ADC system designed for diverse vendor hardware.

DOWNLOAD SOURCE

Installable ISO 

Load Balancing as a Service alongside an ADC orchestration toolkit.

DOWNLOAD ISO
Download Community Edition

Download Community Edition

“We manage the information you provide with the sole aim of assisting with your requests or queries in regards to our products or services; applying the computer and security procedures to ensure its protection. Your data can be rectified or removed upon request but won’t be offered to any third parties, unless we are legally required to do so.” Responsible: SKUDONET SL - info@skudonet.com