San Francisco, CA, USA
2017
  |  By Kong
A guide to learning how MCP registries help govern AI agent-to-tool connectivity AI agents are only as capable as the tools they can reach. When an agent needs to query a database, file a support ticket, or pull data from a CRM, it has to find the right tool, authenticate, and invoke it — all at runtime. The Model Context Protocol (MCP) standardizes how agents communicate with these tools. But MCP alone does not answer a fundamental question: how does the agent know which tools exist?
  |  By Dan Temkin
The ‘AI Credit’ Economy: GitHub’s Pricing Shift Is the Beginning, Not the Exception *GitHub just sent waves of budget panic across its developer base. Seat-based Copilot pricing is out. Consumption-based credits are in. And if you're building an AI-driven product today on flat-rate pricing? You're building a problem into your roadmap.* Seats aren't going away, but they now fund a shared pool of AI credits (one credit = one cent) instead of unlocking uncapped use.
  |  By Kong
Architecture, Use Cases, and How to Get Started.
  |  By Heather Halenbeck
Three-quarters of enterprises are now piloting or deploying AI agents. But here’s the problem: actually integrating those agents with enterprise applications is proving to be one of the hardest parts of the whole endeavor. The research doesn’t mince words about the challenge. And it maps directly to the infrastructure gap Kong was built to address..
  |  By Claudio Acquaviva
As organizations transition from experimental AI to production-grade systems, they often face a fragmented landscape of unmanaged LLM providers, complex tool integrations, and escalating security risks. This infrastructure gap leaves AI applications vulnerable to sophisticated threats like prompt injection and data exfiltration, necessitating a unified stack that secures the edge while streamlining the data plane..
  |  By Hugo Guerrero
Most engineering teams adopt Apache Kafka for one simple reason: it works. It scales effortlessly, it is incredibly reliable, and it powers real-time systems across almost every industry. But as your Kafka usage expands across different teams, regions, and external consumers, success creates a brand new problem. Kafka is a massive data firehose, and without the right nozzle, it quickly becomes unmanageable.
  |  By Hugo Guerrero
Modern Kafka deployments struggle with a familiar tension. You want fine-grained access control per client, per team, and even per request. However, traditional ACLs force you into static, cluster-level configurations that are brittle, hard to scale, and painful to maintain. Administrators are often forced to manage massive, hardcoded lists of topics and users. But what if you could dynamically craft these ACLs using identity context?
  |  By Amit Shah
Scaling LLM and agentic AI adoption from pilot programs to enterprise-wide deployments is a massive logistical rollout. As AI and agentic usage grow, so does a nagging question for leadership: **Are agents using the right tools to get the job done?** While raw infrastructure metrics might tell you if a server is "up," they fail to tell you if your AI investment is being leveraged.
  |  By Juhi Singh
Insomnia natively understands Postman's export format and can bring over your collections, environments, folder structures, and even pre-request scripts with most of the conversion handled automatically..
  |  By Claudio Acquaviva
Digital agreements are at the heart of many critical business processes. As companies modernize their technology stacks and adopt API-driven architectures, integrating agreement workflows directly into applications has become increasingly important. Traditional agreement processes were slow and heavily manual. Documents were often created in office tools, shared through email, printed, signed physically, and stored across multiple systems.
  |  By Kong
Want to bill customers for the AI tokens they actually use? This video shows you how to set up a LangChain app that meters LLM token usage and streams it to Kong Konnect Metering & Billing as CloudEvents — turning every prompt and response into invoiced usage, automatically.
  |  By Kong
Learn how to securely manage API keys and sensitive data in Insomnia using three layers: Shared Environment (safe for Git) Private Environment (local-only secrets) External Vaults with HashiCorp Vault This demo shows how to avoid committing secrets, collaborate safely, and dynamically fetch credentials without exposing them.
  |  By Kong
Learn how Kong and Traceable combine to deliver a unified API lifecycle management and security platform that protects your APIs from design time through production — closing the gap between what APIs are designed to do and how they're actually used. Key Takeaways.
  |  By Kong
Learn how Verifone streamlined API management using Kong's decK CLI, spec-first configuration, and an AI-powered MCP chatbot to fully automate Kong Gateway deployments. Key Takeaways.
  |  By Kong
You used an API this morning. Probably before you even got out of bed. That weather app? It's your phone communicating with a server in the cloud — sending a request, getting data back, and displaying it on your screen in seconds. Location. Request format. Expected response. That's the anatomy of an API call. And it's happening constantly across nearly every app on your phone. Hugo Guerrero and Amanda Alcamo break it all down in Episode 2 of The API & AI Breakdown. No jargon. No fluff. Just clarity.
  |  By Kong
APIs power everything, but the concepts behind them don't have to be confusing. We're launching a brand new series where Amanda Alcamo and Hugo Guerrero break down API and AI topics in plain language. Technical depth, business context, no fluff.#agenticai.
  |  By Kong
Join us for a clear, actionable blueprint for AI infrastructure, where AI strategy becomes production reality.
  |  By Kong
Learn how to expose an API orchestration workflow as an MCP server using Kong AI Gateway, configure semantic guardrails, and build an agent with the Volcano SDK. We onboard GPT-4 behind /llm, orchestrate with DataKit, and debug MCP tools in Insomnia—end-to-end without adding server code.
  |  By Kong
In this demo, We show how to migrate your API setup from Postman to Insomnia, including collections, environments, and scripts. We cover: By the end, your Postman projects are fully up and running in Insomnia. (edited)
  |  By Kong
In this eBook, Kong Co-Founder and CTO Marco Palladino illustrates the differences between API gateways and service mesh - and when to use one or the other in a pragmatic and objective way.
  |  By Kong
In this eBook, Kong Co-Founder and CTO Marco Palladino breaks down how Kuma now supports every cloud vendor, every architecture and every platform together in a multi-mesh control plane. When deployed in a multi-zone deployment, Kuma abstracts away both the synchronization of the service mesh policies across multiple zones and the service connectivity (and service discovery) across those zones.
  |  By Kong
We live in an exciting time for software; we are witnessing a monumental shift in how applications are built. We have the opportunity to participate in the large-scale movement from centralized applications to decentralized, highly performant software architectures.
  |  By Kong
To better prepare for the future, it's important to get a solid understanding of this rising technology trend. In this e-book, we examine cloud native architecture, look back at the rise of cloud native app development, and explore the future of cloud native on the entire software ecosystem.
  |  By Kong
This eBook explains how microservices can facilitate the adoption of a multi-cloud strategy. Included are a holistic overview of the multi-cloud pattern including the benefits and drawbacks, strategies for adoption, and challenges to overcome if adopting the strategy without microservices.
  |  By Kong
Performance is a critical factor when choosing an API management solution. For businesses, the need to deliver low latency and high throughput is critical to ensuring that API transaction rates keep up with the speed of business. This white paper compares the performance of Kong and Apigee to understand performance in production environments.
  |  By Kong
This ebook explains the process for transitioning from a monolithic to a microservices-based architecture. Included are technical aspects and common mistakes to avoid.
  |  By Kong
This ebook explains how Kubernetes is modernizing the microservices architecture. Included are a deep dive into the history of Kubernetes and containers, the technical and organizational benefits of using Kubernetes for container orchestration, as well as considerations for adopting it.
  |  By Kong
This eBook compares a monolithic vs microservices architectural approach to application development. It dives into the benefits and challenges of microservices and helps you determine whether a transition to microservices would be right for your organization.
  |  By Kong
This ebook explains the role that the service mesh pattern plays in the leap towards de-centralized architectures. A novel re-packaging of the functionalities of traditional API gateways, service mesh represents the next stage in the natural evolution of microservices.

Next-Generation API Platform for Modern Architectures. Connect all your microservices and APIs with the industry's most performant, scalable and flexible API platform. Empower your developers to build and optimize APIs. Leverage the latest microservice and container design patterns.

The Service Control Platform transcends API management to intelligently broker information across all your services. With Kong’s fast, flexible, and lightweight core, you control your entire service architecture – centralized or decentralized, microservices or monolith. Kong Service Control Platform transforms your static endpoints into a dynamic network of intelligent services.

Built for Modern Architectures:

  • Connect Everything: Use plugins to extend and connect services across hybrid and multi-cloud environments, regardless of vendor.
  • Accelerate Innovation: Use Kong's robust library of plugins to reduce redundant coding tasks across teams, technologies and geographies.
  • Improve Governance: Analyze real-time data to ensure adherence to policies across teams, partners and individual endpoints.
  • Automate End-to-end: Connect Kong with automation tools. Generate custom workflows to improve efficiency and reduce errors.
  • Unlock New Ecosystems: Instantly leverage new ecosystems. Deploy Kong with Kubernetes, containers, and more out of the box.
  • Increase Compliance: Limit access with role-based access control (RBAC). Encrypt end-to-end to comply with industry regulations.

Go Beyond the Gateway. Ready for the next-generation of API platforms?