Tetrate Enterprise Gateway for Envoy—the cloud-native service gateway—has reached 1.0!

Learn more › close
Tetrate Enterprise ready service mesh

Get Access to Tetrate Enterprise Gateway for Envoy

Istio service mesh

Why Choose Tetrate Enterprise Gateway for Envoy

Tetrate Enterprise Gateway (TEG) for Envoy is the only enterprise-ready, fully upstream Gateway API implementation based on open-source Envoy Gateway.

TEG for Envoy maximizes the capabilities of open-source Envoy and Envoy Gateway as quickly as possible, so you can:

  • Manage application delivery. Configure application rollout from GitOps pipelines and other automation tooling, using the scalable Kubernetes Gateway API.
  • Authenticate user traffic. Integrate with OpenID Connect providers to enable Single Sign On, reduce developer burden and ensure a consistent identity framework.
  • Protect critical applications. Deploy global rate limiting and WAF-based security, to ensure your best day doesn’t become your worst nightmare.
  • Scale across clusters and clouds. Grow to global scale with tiered gateway and multi-cluster load balancing from edge to application.

Enterprise-Ready

With TEG in addition to open source Envoy Gateway, you get:

  • Expert support and best practices. TEG combines always-on expert support and best practices, ensuring that your Envoy Gateway deployment is not just functional but optimized for success.
  • CVE protection. Tetrate understands the importance of security. With TEG, you get continuous and extended protection from Common Vulnerabilities and Exposures (CVEs) of open-source components. This means you can rest easy knowing your environment is safeguarded against potential threats. 
  • FIPS and FedRAMP compliance. TEG is the only FIPS-verified, 100% upstream distribution that meets FedRAMP authorization requirements. If you’re part of a government agency or highly regulated industry, you’ll appreciate TEG’s fast-track to a verifiably compliant Federal Risk and Authorization Management Program (FedRAMP) environment.

Let’s Talk

Contact us to get access to the most advanced Gateway API implementation for Kubernetes.

Additional Resources

mTLS Traffic Encryption

How Istio’s mTLS Traffic Encryption Works as Part of a Zero Trust Security Posture

The Istio service mesh offers cloud native deployments a standard way to implement automatic mutual transport layer security (mTLS). This reduces the attack surface of network communication by using strong…

Read More
Accelerate Zero Trust Adoption

Accelerate Zero Trust Adoption with CISA’s Zero Trust Maturity Model 2.0

In today’s landscape of increasingly frequent and sophisticated cybersecurity threats, federal agencies require a new security model that can effectively adapt to the complexity of the modern environment, embrace the…

Read More
Zero Trust Architecture White Paper

Zero Trust Architecture White Paper

Zero trust security is getting a lot of attention—and for good reason. Read Tetrate’s white paper on implementing Zero Trust for microservices for applications.

Read More