Learning Center
API Gateway (1)
What Is an API Gateway?
Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…
Read more arrow_forwardEnvoy Gateway (3)
What Is an API Gateway?
Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…
Read more arrow_forwardWhat Is Envoy Gateway?
Overview Envoy Gateway is an open source project that aims to make it simple to use Envoy Proxy as an API gateway by delivering a simplified deployment model and API…
Read more arrow_forwardWhat Is The Kubernetes Gateway API?
Overview The Kubernetes Gateway API, aka “Gateway API,” is a Kubernetes API specification defining a standard way to configure and manage application traffic routing in Kubernetes clusters. It is managed…
Read more arrow_forwardEnvoy Proxy (1)
Envoy Proxy
Overview Envoy is a high-performance, open-source proxy server designed for cloud-native applications. It is often used in conjunction with service mesh platforms like Istio to provide advanced traffic management, load…
Read more arrow_forwardFIPS (3)
FIPS FedRAMP
FIPS (Federal Information Processing Standards) and FedRAMP (Federal Risk and Authorization Management Program) are two distinct but related sets of standards and regulations established by the U.S. government to ensure…
Read more arrow_forwardIstio FIPS
Istio FIPS refers to the support for Federal Information Processing Standards (FIPS) compliance within the Istio service mesh. Istio is an open source service mesh platform used for managing and…
Read more arrow_forwardWhat Is FIPS?
The Federal Information Processing Standard (FIPS) is a set of standards for information processing systems that all U.S. federal agencies, contractors, and vendors must adhere to. FIPS standards cover a…
Read more arrow_forwardIstio Service Mesh (1)
Istio FIPS
Istio FIPS refers to the support for Federal Information Processing Standards (FIPS) compliance within the Istio service mesh. Istio is an open source service mesh platform used for managing and…
Read more arrow_forwardKubernetes Gateway API (3)
What Is an API Gateway?
Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…
Read more arrow_forwardWhat Is Envoy Gateway?
Overview Envoy Gateway is an open source project that aims to make it simple to use Envoy Proxy as an API gateway by delivering a simplified deployment model and API…
Read more arrow_forwardWhat Is The Kubernetes Gateway API?
Overview The Kubernetes Gateway API, aka “Gateway API,” is a Kubernetes API specification defining a standard way to configure and manage application traffic routing in Kubernetes clusters. It is managed…
Read more arrow_forwardMutual TLS (mTLS) (1)
What Is mTLS?
Mutual TLS (mTLS) is a variation on transport layer security (TLS). Traditional TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for secure…
Read more arrow_forwardObservability (1)
What Is Observability?
Overview Observability refers to the ability to gain insight into the internal state of a system by observing its external behavior. In other words, it’s the ability to understand what’s…
Read more arrow_forwardPlatform Team (1)
What Is a Platform Team?
Overview A platform team is responsible for creating and maintaining the underlying platform that supports the development, deployment and operations of software applications. The platform team provides critical infrastructure, tools…
Read more arrow_forwardWasm (1)
What Is Wasm?
WebAssembly (abbreviated as Wasm) is a low-level bytecode format designed as a portable target for the compilation of high-level languages like C, C++, and Rust, enabling deployment on the web…
Read more arrow_forwardZero Trust (4)
NIST Zero Trust Architecture
NIST Zero Trust Architecture refers to cybersecurity policies and best practices developed by the National Institute of Standards and Technology (NIST). In the Special Publication 800-207 and 800-207A series, NIST…
Read more arrow_forwardWhat Is mTLS?
Mutual TLS (mTLS) is a variation on transport layer security (TLS). Traditional TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for secure…
Read more arrow_forwardWhat Is Zero Trust Security?
Overview Zero Trust Security—sometimes called Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA)—is an information security model that requires strict identity verification for all users, devices, and applications…
Read more arrow_forwardZero Trust Architecture
Don’t trust. Verify. That’s the philosophy behind Zero Trust Architecture (ZTA). Legacy network security architecture is no longer sufficient when it comes to ensuring the highest levels of cybersecurity and…
Read more arrow_forward