Resources
  • eBooks
  • Reports
  • Case Studies
  • Demos
  • Videos
  • Value Calculator
  • Home
  • Resources
  • Videos
  • Running Secure IoT Services at the Edge
Video

Running Secure IoT Services at the Edge

Nočnica Fee, Mirantis

Edge computing provides perhaps the most fertile ground we have had for truly realizing the power of the Internet of Things (IoT), but even as “edge” becomes the hot new buzzword, IoT has become (almost) commonplace — and so have security threats. In this session, we’ll look at how to get the advantages of IoT at the edge without falling into security black holes. You’ll learn:
– How edge changes Kubernetes services
– Where service mesh fits into the picture
– How to secure your devices
– Network security concerns
– Application security concerns
– How to plan for mitigation (just in case)

Topics:API Security
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance
  • © Kong Inc. 2025