Kong / Destination: Zero-Trust

Add meeting Rate page Subscribe

Kong / Destination: Zero-Trust

These are all the meetings we have in "Destination: Zero-Trust" (part of the organization "Kong"). Click into individual meeting pages to watch the recording and search or read the transcript.

6 Apr 2021

As organizations adopt an API-first approach, there are many connectivity patterns to consider, and the developer experience needs to be excellent to promote adoption. It can be challenging to enforce API governance while enabling developers to build applications. This session recording covers how an organization can empower developers to use Kong securely, enable access control to the Kong API and Manager, enforce authentication/authorization in applications, and implement a zero-trust security model.
Manny Khadilkar will demonstrate the following topics:

• Automate configuration of Kong and deployment of an API.
• Enforce Access Control to Kong API Management.
• Enforce Authentication and Authorization to your application.
• Adopt a zero-trust security model.

For more information, view the blog post: https://bit.ly/3ujZDCY
  • 1 participant
  • 22 minutes
governance
decentralization
decentralized
microservices
infrastructures
api
developer
proxy
trust
automation
youtube image

16 Mar 2021

CEO of Syra Tim Hinrichs demonstrates how OPA and Kuma can be used for microservices API authorization. For more information, view the blog post: https://bit.ly/38GZUaI
  • 2 participants
  • 23 minutes
microservices
microservice
security
devops
protocols
concerns
authentication
deploying
software
proxy
youtube image

24 Feb 2021

With Kong OpenID Connect, you don't have to rewrite or maintain the code over and over for API gateway security. And that makes it faster for the developers of the upstream services to get their work done. For more information, view the blog post: https://bit.ly/3pSE2Pv

Check out all the recordings from this event: https://konghq.com/resources/?video-category=destination-zero-trust
  • 1 participant
  • 14 minutes
authentication
trust
authenticated
trustworthy
connect
openid
access
authorization
interface
apis
youtube image

8 Feb 2021

Join Kong CTO and Co-Founder Marco Palladino as he explores what zero-trust security is and why we need it and shows it in action with Kong Mesh, which is built on top of CNCF’s Kuma and Envoy.

Read the blog post here: https://bit.ly/3qWAUmV

Check out all the recordings from this event: https://konghq.com/resources/?video-category=destination-zero-trust
  • 1 participant
  • 28 minutes
microservices
microservice
security
trust
secure
services
encryption
importance
increasingly
deployments
youtube image