# Enterprise-grade service mesh for
development and governance
Connect, manage, and secure workloads across any environment and platform. Reduce developer time to value by managing boilerplate work for retries, service-to-service encryption, chaos engineering and service discovery.

## Modern environments get complicated.
Kong simplifies things.
### Secure
Apply consistent security standards and governance across all services and locations from a single control plane.
### Resilient
Achieve uptime goals with intelligent failover and deep observability.
### Flexible
Deploy confidently and efficiently with a single solution anywhere you want to run.
## Why Kong Mesh?
**Kong Mesh simplifies cross-zone connectivity, security, observability, and compliance for Platform Operators, and reduces time to value for your developers.**
## 01/ Simplicity
## More time developing, less worrying about infrastructure
- - Use Mesh features to handle retry logic, observability and chaos engineering at the platform layer.
- - Seamlessly integrate with CI/CD pipelines and eliminate drift with declarative configuration
- - Speed up time to value with a mesh built to operate everywhere from day one.

## 02/ Flexibility
## Deploy microservices confidently
- - Consistently apply authentication, API security, and traffic control policies across all services in one-click.
- - Deploy Kong Mesh anywhere: on Kubernetes, in the cloud, on-premises, with containers or on virtual machines.

## 03/ Resiliency
## Reduce complexity
- - Gain one-click control across service mesh environments with out-of-the-box policies for connectivity, observability, and security.
- - Easily install and manage through Kong Konnect — the industry’s first unified SaaS control plane.

## 04/ Resilient
## Ensure continuity
- - Speed up reliability testing with a Circuit Breaker policy to test failures in a controlled manner.
- - Reduce risk when you enable locality aware routing to route traffic effortlessly across multiple Kubernetes clusters or environments and roll out upgrades without disruption.

## 05/ Security
## Zero-trust security across all Mesh deployments
- - Achieve Zero Trust by default with authentication, authorization, and encryption technologies with a couple of clicks or a single command line entry.
- - Get time back and reduce errors with automated security deployments and updates. Eliminate tedious, error-prone manual tasks by leveraging built-in configuration management.

## 06/ Observability
## Gain real-time visibility into all services
- - Gain deep insights into application usability with metrics such as error rate and latency for each service.
- - Improve your security posture with a centralized management plane that aids in the secure deployment, timely audit, and application of security updates.

## Customers on Kong Mesh
## Moderna
## MS3
## Grupo Globo
## Resources
_Docs_
[___ebook_
[__API Gateways vs. Service Mesh
__](/resources/e-book/api-gateways-vs-service-mesh)__API Gateways vs. Service Mesh
__[](/resources/e-book/api-gateways-vs-service-mesh)_Webinar_
[__