Resources
  • eBooks
  • Reports
  • Case Studies
  • Demos
  • Videos
  • Value Calculator
  • Home
  • Resources
  • Videos
  • How to Achieve Zero-Trust Security With Service Mesh
Video

How to Achieve Zero-Trust Security With Service Mesh

Organizations are rapidly becoming more distributed and decoupled to deploy more often and improve reliability. As we accelerate our digitalization and move to microservices, it becomes vital to tighten up our security to prevent intrusions and attacks into our systems. The more moving parts we have, the bigger the attack surface becomes. Zero-trust security is a must-have.

Join Kong CTO and Co-Founder Marco Palladino as he explores what zero-trust security is and why we need it, and shows it in action with Kong Mesh, which is built on top of CNCF's Kuma and Envoy. In this session, you'll learn:

  • Best practices for service identity and how platform architects can specify specific rules and attributes to generate an identity on a per-service basis
  • How service mesh removes the burden of networking from developers, enabling them to focus more on their core logic
  • How to achieve zero-trust security in one click with Kong Mesh

Speakers

Marco Palladino

CTO and Co-Founder

Kong Inc.

Topics:Service Mesh
|
API Security
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance
  • © Kong Inc. 2025