13 Must-have features to adopting a zero-trust model
The best way to approach service mesh security is to adopt a zero-trust model, which means that every connection, no matter its origin, must be validated and secured. To help you evaluate service mesh technologies and implement zero-trust security, we present our 13 must-have features.
Answers to common questions about Envoy Proxy and Istio FAQs, including Gloo Edge, Gloo Mesh, enterprise and open source editions.
Production support for Istio
We provide many advantages for supporting open source Istio and Envoy Proxy in enterprise production environments, including N-4 version support, SLAs, private Slack, best practices, fixes, and back-porting.