Modernized service mesh for
development and governance
Connect, manage, and secure digital experiences across any environment and platform.
![](https://prd-mktg-konghq-com.imgix.net/images/2023/12/656fab27-kong-mesh-2.png?auto=format&fit=max&w=2560)
Modern environments get complicated.
Kong simplifies things.
Apply consistent security standards and governance across all services and locations from a single control plane.
Achieve uptime goals with intelligent failover and deep observability.
Deploy confidently and efficiently with a single solution anywhere you want to run.
Why Kong Mesh?
Kong Mesh simplifies security for building and connecting modern applications.
Deploy microservices confidently
- Consistently apply authentication, API security, and traffic control policies across all services in one-click.
- Deploy Kong Mesh anywhere: on Kubernetes, in the cloud, on-premises, with containers or on virtual machines.
![](https://prd-mktg-konghq-com.imgix.net/images/2023/08/64e110d0-diagram-service-mesh-run-anywhere.png?auto=format&fit=max&w=2560)
Reduce complexity
- Gain one-click control across service mesh environments with out-of-the-box policies for connectivity, observability, and security.
- Easily install and manage through Kong Konnect — the industry’s first unified SaaS control plane.
![](https://prd-mktg-konghq-com.imgix.net/images/2023/10/6520962a-ui-mesh-manager-overview-20230927.png?auto=format&fit=max&w=2560)
Ensure continuity
- Speed up reliability testing with a built-in circuit breaker plugin to test failures in a controlled manner.
- Reduce risk when you enable load balancer features to route traffic effortlessly and roll upgrades without disruption.
![](https://prd-mktg-konghq-com.imgix.net/images/2023/10/65209644-ui-mesh-manager-meshes-policies-20230927.png?auto=format&fit=max&w=2560)
Zero-trust security across all Mesh deployments
- Achieve Zero Trust by default with authentication, authorization, and encryption technologies with a couple of clicks or a single command line entry.
- Get time back and reduce errors with automated security deployments and updates. Eliminate tedious, error-prone manual tasks by leveraging built-in configuration management.
![](https://prd-mktg-konghq-com.imgix.net/images/2023/10/652096a3-ui-mesh-manager-meshes-overview-20230927.png?auto=format&fit=max&w=2560)
Gain real-time visibility into all services
- Gain deep insights into application usability with metrics such as error rate and latency for each service.
- Improve your security posture with a centralized management plane that aids in the secure deployment, timely audit, and application of security updates.
![](https://prd-mktg-konghq-com.imgix.net/images/2023/09/64f549c1-ui-kuma-dataplane-dashboard.png?auto=format&fit=max&w=2560)
![](https://prd-mktg-konghq-com.imgix.net/images/2023/08/64e110d0-diagram-service-mesh-run-anywhere.png?auto=format&fit=max&w=2560)
![](https://prd-mktg-konghq-com.imgix.net/images/2023/10/6520962a-ui-mesh-manager-overview-20230927.png?auto=format&fit=max&w=2560)
![](https://prd-mktg-konghq-com.imgix.net/images/2023/10/65209644-ui-mesh-manager-meshes-policies-20230927.png?auto=format&fit=max&w=2560)
![](https://prd-mktg-konghq-com.imgix.net/images/2023/10/652096a3-ui-mesh-manager-meshes-overview-20230927.png?auto=format&fit=max&w=2560)
![](https://prd-mktg-konghq-com.imgix.net/images/2023/09/64f549c1-ui-kuma-dataplane-dashboard.png?auto=format&fit=max&w=2560)
More time
developing, less
worrying about
infrastructure
- Seamlessly integrate with CI/CD pipelines and eliminate configuration drift with declarative configuration.
- Speed time to value with a mesh built to operate everywhere from day one.
![](https://prd-mktg-konghq-com.imgix.net/images/2023/08/64e1119a-code-mesh-kuma-io-square.png?auto=format&fit=max&w=2560)
Customers on Kong Mesh
[With Kong] we created a scalable, highly reliable platform for our web applications that has a security-first mindset.
We chose Kong Mesh because we needed a solution that allows our customers to support Kubernetes and virtual machines, while providing an easier path to migrating between the two.
Transactions per second
...Kong Mesh is a critical aspect of our architecture, for both zero-trust security and observability and monitoring.
Resources
Get started with Kong Mesh
See how you can leverage Kong Mesh to connect, manage, and secure digital experiences — across any environment or platform.