Skip to main content

Help us improve the Digital Marketplace - send your feedback

Loadbalancer.org Ltd

Load Balancer Enterprise ADC

Loadbalancer.org provide a fully featured Application Delivery Controller (ADC) / Load Balancer. Perfect for high-performance hybrid and multi-cloud environments where a single technology and interface across all environments is desired. Rock-solid performance and availability, simple and intuitive management, and unlimited 24/7 access to technical support are all offered as standard.

Features

  • Advanced Application Delivery Controller
  • Load Balancing, Content Rules and Health Monitoring
  • WAF
  • GSLB
  • Easy to use web interface
  • API

Benefits

  • Security
  • Maintainability
  • Performance
  • Zero Downtime
  • Disaster Recovery

Pricing

£1,700 to £8,100 a licence

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@loadbalancer.org. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 1 0 5 7 5 2 2 0 5 8 4 7 5 8

Contact

Loadbalancer.org Ltd Malcolm Turnbull
Telephone: 0330 3801064
Email: sales@loadbalancer.org

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
The software is available for multiple platforms including: Amazon, Microsoft and Google Clouds - And any other virtual platform such as VMWare, Xen, Virtual Box, Nutanix etc.
System requirements
  • 1 Virtual CPU
  • 1GB RAM
  • 20GB DISK

User support

Email or online ticketing support
Email or online ticketing
Support response times
Average response time 20 mins. 24/7 support.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Unknown
Onsite support
Onsite support
Support levels
Standard 24/7 Support (approx 25% of product cost)
Basic Business hours support in your timezone. (approx 17% of product cost)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Download the 30 day free trial, and comprehensive manual. Contact suport if you have any questions.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
No data is usually stored on the appliance, you would just delete the software.
End-of-contract process
The software can be licenced as a subscription or perpetual , at the end of the contract the software is still useable but support and software updates are not available.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
Easy to use web interface for all the standard features of the load balancing appliance.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Unknown
API
Yes
What users can and can't do using the API
All standard functions and setup can be automated through the use of the API.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Yes, resources are wholly controlled by the end user.

Analytics

Service usage metrics
Yes
Metrics types
Standard throughput and utilization graphs.
Reporting types
  • API access
  • Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
The software does not store data at rest.
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
No important user data is stored, but logs can be downloaded.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our software is designed to increase a users resilience. Our support has a 1 hour SLA.
Approach to resilience
The software (a load balancer) is an inherent part of any highly available system. The software is usually run in the customers datacenter.
Outage reporting
Outages are clearly visible in the web interface, and email alerts can be configured.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
User accounts are restricted by authority level and passwords.
Strict logging is performed of all actions.
Support data is also protected by login credentials.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
ISO 9001 Review and compliance.
Information security policies and processes
Follow ISO 9001 standards for reporting and compliance.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All proposed changes are considered and planned in advance Proposed changes are tested by the development team Further testing carried out by support and maintenance team Limited in house deployment to ensure bug fixes, eliminating risks
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We receive vulnerability data from Microsoft and our security vendors. We operate intelligent automated security and anti-fraud systems that alert us to actual or attempted security incidences.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We receive vulnerability data from the open source community, Microsoft and our security vendors. We operate intelligent automated security and anti-fraud systems that alert us to actual or attempted security incidences.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We receive reports from users and suppliers. These reports are normally via telephone. Any affected parties will be updated by email or phone depending on the level of urgency or importance.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Using optimised software to reduce electricity consumption and carbon footprint.

Pricing

Price
£1,700 to £8,100 a licence
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day trial with our high end virtual Load balancer - no obligation to buy - access to 24/7 support during the 30 days.
Link to free trial
https://www.loadbalancer.org/get-started/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@loadbalancer.org. Tell them what format you need. It will help if you say what assistive technology you use.