Load Balancer Enterprise ADC
Loadbalancer.org provide a fully featured Application Delivery Controller (ADC) / Load Balancer. Perfect for high-performance hybrid and multi-cloud environments where a single technology and interface across all environments is desired. Rock-solid performance and availability, simple and intuitive management, and unlimited 24/7 access to technical support are all offered as standard.
Features
- Advanced Application Delivery Controller
- Load Balancing, Content Rules and Health Monitoring
- WAF
- GSLB
- Easy to use web interface
- API
Benefits
- Security
- Maintainability
- Performance
- Zero Downtime
- Disaster Recovery
Pricing
£1,700 to £8,100 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 1 0 5 7 5 2 2 0 5 8 4 7 5 8
Contact
Loadbalancer.org Ltd
Malcolm Turnbull
Telephone: 0330 3801064
Email: sales@loadbalancer.org
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- The software is available for multiple platforms including: Amazon, Microsoft and Google Clouds - And any other virtual platform such as VMWare, Xen, Virtual Box, Nutanix etc.
- System requirements
-
- 1 Virtual CPU
- 1GB RAM
- 20GB DISK
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Average response time 20 mins. 24/7 support.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Unknown
- Onsite support
- Onsite support
- Support levels
-
Standard 24/7 Support (approx 25% of product cost)
Basic Business hours support in your timezone. (approx 17% of product cost) - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Download the 30 day free trial, and comprehensive manual. Contact suport if you have any questions.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- No data is usually stored on the appliance, you would just delete the software.
- End-of-contract process
- The software can be licenced as a subscription or perpetual , at the end of the contract the software is still useable but support and software updates are not available.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Easy to use web interface for all the standard features of the load balancing appliance.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Unknown
- API
- Yes
- What users can and can't do using the API
- All standard functions and setup can be automated through the use of the API.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Yes, resources are wholly controlled by the end user.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Standard throughput and utilization graphs.
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- The software does not store data at rest.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- No important user data is stored, but logs can be downloaded.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Our software is designed to increase a users resilience. Our support has a 1 hour SLA.
- Approach to resilience
- The software (a load balancer) is an inherent part of any highly available system. The software is usually run in the customers datacenter.
- Outage reporting
- Outages are clearly visible in the web interface, and email alerts can be configured.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
User accounts are restricted by authority level and passwords.
Strict logging is performed of all actions.
Support data is also protected by login credentials. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- ISO 9001 Review and compliance.
- Information security policies and processes
- Follow ISO 9001 standards for reporting and compliance.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All proposed changes are considered and planned in advance Proposed changes are tested by the development team Further testing carried out by support and maintenance team Limited in house deployment to ensure bug fixes, eliminating risks
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We receive vulnerability data from Microsoft and our security vendors. We operate intelligent automated security and anti-fraud systems that alert us to actual or attempted security incidences.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We receive vulnerability data from the open source community, Microsoft and our security vendors. We operate intelligent automated security and anti-fraud systems that alert us to actual or attempted security incidences.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We receive reports from users and suppliers. These reports are normally via telephone. Any affected parties will be updated by email or phone depending on the level of urgency or importance.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Using optimised software to reduce electricity consumption and carbon footprint.
Pricing
- Price
- £1,700 to £8,100 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day trial with our high end virtual Load balancer - no obligation to buy - access to 24/7 support during the 30 days.
- Link to free trial
- https://www.loadbalancer.org/get-started/