13 Must-have features to adopting a zero-trust model

The best way to approach service mesh security is to adopt a zero-trust model, which means that every connection, no matter its origin, must be validated and secured. To help you evaluate service mesh technologies and implement zero-trust security, we present our 13 must-have features.

Nikki Rouda | September 8, 2021
Read More

Gloo Mesh and open source feature comparisons

Nikki Rouda | August 23, 2021
Read More

FAQs

Answers to common questions about Envoy Proxy and Istio FAQs, including Gloo Edge, Gloo Mesh, enterprise and open source editions.

Nikki Rouda | July 13, 2021
Read More

Gloo Edge and open source feature comparisons

Nikki Rouda | June 16, 2021
Read More

Production support for Istio

We provide many advantages for supporting open source Istio and Envoy Proxy in enterprise production environments, including N-4 version support, SLAs, private Slack, best practices, fixes, and back-porting.

Nikki Rouda | June 15, 2021
Read More