Discover our Blog

10 Importance of Information Security Audit

We have recently witnessed a growing number of cyber-crimes prevailing in industries worldwide. While most regulatory and governing bodies are stepping up to prevent such incidents, it is yet evident that no business or industry can be 100% immune to the evolving threat landscape. That said, it is imperative for a business to be proactive…

SKUDONET Multi-Layered Security Overview in the Edge

SKUDONET is a smart company focused on the Application Delivery Controller market and really obsessed with the security in the delivery, for that reason we really know that today the security is a real concern for the business and what a better way to solve it is by adding this task to the controlling application…

WhatsApp’s latest crash

On last Friday 19th March, Facebook acknowledged some technical issues which caused a worldwide outage for WhatsApp, Instagram and other Facebook services. These kinds of crashes prevent people from accessing their accounts or communicating, leading to major trouble, like this one affecting 45 countries and leaving millions of people without service. In 2020 alone, four…

Importance of Cybersecurity for Businesses

The world of the internet is full of people waiting to breach into your system. They want to get a grasp of your personal information and exploit it. This might not be a concern for an individual, but for a business, privacy is all that matters. According to a survey in 2018, 43% of fall…

Mitigation for Exchange Servers Hafnium Zero-day vulnerabilities

Even though it has been only a few months since the already famous attack on the SolarWinds supply chain, again we have to write about another hacking issue, this time related to Microsoft Exchange Server. In this case, the Zero-day vulnerabilities found in Microsoft Exchange Server 2013, 2016, and 2019 permit an attacker to exploit…

Understanding VPN IPSec Modes

Find out what IPsec and IPsec tunnel mode is? When do you need it? How does it work? Do VPNs use IPsec? And protect your data today! There is an increasing focus on protecting data transfer as the lockdown continues in most countries across the globe. Virtual Private Networks (VPNs) have become a tool of…

5 Ways to protect your online privacy on public Wi-Fi

When you connect to public Wi-Fi, you actually put your online privacy and device security at great risk. That’s because these are weak, open networks and can be penetrated by an intruder for sensitive data packets. While we can’t avoid using this service, here is how we can achieve a protective shield against cyberthreats while…

SKUDONET continuously defeating vulnerabilities!

Networking is always facing new challenges and threats and it becomes more and more vital to manage the safest and most accurate tools to provide all the security needed. As a part of our extensive services, SKUDONET has developed a system to achieve these goals. Let us introduce you to: VULS applied to SKUDONET Vuls…

SKUDONET Roadmap 2021

The SKUDONET Team invites you to discover the amazing challenging plan in regards to new features, research & developments, as well as the design of new products line. This roadmap follows the forecast that was released the last year for the following 3 years to provide high-tech solutions for networking such as SD-WAN (Software-Defined WAN),…

Download Skudonet ADC Load Balancer
Community Edition

Source Code

A versatile and installable ADC system designed for diverse vendor hardware.

DOWNLOAD SOURCE

Installable ISO 

Load Balancing as a Service alongside an ADC orchestration toolkit.

DOWNLOAD ISO
Download Community Edition

Download Community Edition

“We manage the information you provide with the sole aim of assisting with your requests or queries in regards to our products or services; applying the computer and security procedures to ensure its protection. Your data can be rectified or removed upon request but won’t be offered to any third parties, unless we are legally required to do so.” Responsible: SKUDONET SL - info@skudonet.com