Resources
  • eBooks
  • Reports
  • Demos
  • Videos
|
  • Value Calculator
  1. Home
  2. Resources
  3. Videos
  4. Running Secure IoT Services at the Edge
Video

Running Secure IoT Services at the Edge

Nočnica Fee, Mirantis

Edge computing provides perhaps the most fertile ground we have had for truly realizing the power of the Internet of Things (IoT), but even as “edge” becomes the hot new buzzword, IoT has become (almost) commonplace — and so have security threats. In this session, we’ll look at how to get the advantages of IoT at the edge without falling into security black holes. You’ll learn:
– How edge changes Kubernetes services
– Where service mesh fits into the picture
– How to secure your devices
– Network security concerns
– Application security concerns
– How to plan for mitigation (just in case)

Topics
API Security
Share on Social
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026