13 Must-have features to adopting a zero-trust model
The best way to approach service mesh security is to adopt a zero-trust model, which means that every connection, no matter its origin, must be validated and secured. To help you evaluate service mesh technologies and implement zero-trust security, we present our 13 must-have features.
Answers to common questions about Envoy Proxy and Istio FAQs, including Gloo Edge, Gloo Mesh, enterprise and open source editions.
Production support for Istio
We provide many advantages for supporting open source Istio and Envoy Proxy in enterprise production environments, including N-4 version support, SLAs, private Slack, best practices, fixes, and back-porting.
[Tutorial] Canary Releases
As application architecture evolves from monolithic to microservices, the strategies at every stage of the application lifecycle must also evolve to take advantage of the new architecture and to ensure optimal performance, uptime, security, and user experience of the application. What is a Canary Release? Canary release is an approach for safer application delivery, specifically […]