13 Must-have features to adopting a zero-trust model

The best way to approach service mesh security is to adopt a zero-trust model, which means that every connection, no matter its origin, must be validated and secured. To help you evaluate service mesh technologies and implement zero-trust security, we present our 13 must-have features.

Nikki Rouda | September 8, 2021
Read More

Gloo Mesh and open source feature comparisons

Nikki Rouda | August 23, 2021
Read More


Answers to common questions about Envoy Proxy and Istio FAQs, including Gloo Edge, Gloo Mesh, enterprise and open source editions.

Nikki Rouda | July 13, 2021
Read More

Gloo Edge and open source feature comparisons

Nikki Rouda | June 16, 2021
Read More

Production support for Istio

We provide many advantages for supporting open source Istio and Envoy Proxy in enterprise production environments, including N-4 version support, SLAs, private Slack, best practices, fixes, and back-porting.

Nikki Rouda | June 15, 2021
Read More

[Tutorial] Canary Releases

As application architecture evolves from monolithic to microservices, the strategies at every stage of the application lifecycle must also evolve to take advantage of the new architecture and to ensure optimal performance, uptime, security, and user experience of the application.  What is a Canary Release? Canary release is an approach for safer application delivery, specifically […]

Solo.io | July 8, 2020
Read More

Glossary of Terms

Solo.io | February 12, 2020
Read More