San Francisco, CA, USA
2017
  |  By Amit Shah
Scaling LLM and agentic AI adoption from pilot programs to enterprise-wide deployments is a massive logistical rollout. As AI and agentic usage grow, so does a nagging question for leadership: **Are agents using the right tools to get the job done?** While raw infrastructure metrics might tell you if a server is "up," they fail to tell you if your AI investment is being leveraged.
  |  By Juhi Singh
Insomnia natively understands Postman's export format and can bring over your collections, environments, folder structures, and even pre-request scripts with most of the conversion handled automatically..
  |  By Claudio Acquaviva
Digital agreements are at the heart of many critical business processes. As companies modernize their technology stacks and adopt API-driven architectures, integrating agreement workflows directly into applications has become increasingly important. Traditional agreement processes were slow and heavily manual. Documents were often created in office tools, shared through email, printed, signed physically, and stored across multiple systems.
  |  By Veena Rajarathna
How OAuth 2.0 Token Exchange Reshapes Trust Between Services — and Why the API Gateway Is Exactly the Right Place to Enforce It OAuth 2.0 Token Exchange fundamentally alters how services establish trust. And the API gateway is the ideal location to enforce this new model. Modern applications don’t run as a single monolithic.
  |  By Veena Rajarathna
How Kong Gateway 3.14 closes the consistency gap in IAM-based authentication across AWS, Azure and GCP — and what it means for your production deployments Enterprise security teams have clear requirements: no static credentials, no exceptions. Every service-to-service connection, whether it's Kong talking to databases, caches, or vaults, should authenticate using the same IAM-based identity model that governs the rest of their cloud infrastructure.
  |  By Hugo Guerrero
Modern API architectures are no longer linear. A single request can traverse multiple layers of authentication, transformation, enrichment, and observability. As these flows grow more dynamic, the need for fine-grained control over when plugins execute becomes critical. For years, the standard approach to API Gateway configuration followed a strict hierarchical model: you applied a plugin to a Service, a Route, or a Consumer.
  |  By Alex Drag
Kong Agent Gateway Is Here — And It Completes the AI Data Path You had a request going to a model, a response coming back, and a gateway in between to enforce policy. With the right solutions, this becomes manageable pretty quickly.. That world is over. Today's agentic architectures look nothing like that. Agents are delegating tasks to other agents via A2A. These other agents are producing and consuming event streams.
  |  By Greg Peranich
The shift from single-model AI features to multi-agent pipelines is no longer a future concern — it's running in production today. MCP has become the de facto protocol for tool-calling, agent-to-agent (A2A) communication patterns are proliferating, and enterprise teams are wiring together complex AI workflows that span multiple providers, services, and agents. Every hop in that data path is an opportunity for something to go wrong. The challenge is governance.
  |  By Kong
You whipped up a simple MCP server prototype over the weekend. It routed a single AI agent to a few internal tools, your demo impressed leadership, and the team asked the dreaded question: "When can we ship?" You smiled and said, "Give me two weeks." Fast-forward three months**.** You’re firefighting expired tokens at 2 AM. The compliance team is camped in your inbox. Your once-elegant codebase is now a distributed systems nightmare. Sound familiar?
  |  By Michael Field
CLIs, MCP, and the Real Governance Tradeoffs Shaping Enterprise AI Agents.
  |  By Kong
Learn how to securely manage API keys and sensitive data in Insomnia using three layers: Shared Environment (safe for Git) Private Environment (local-only secrets) External Vaults with HashiCorp Vault This demo shows how to avoid committing secrets, collaborate safely, and dynamically fetch credentials without exposing them.
  |  By Kong
Learn how Kong and Traceable combine to deliver a unified API lifecycle management and security platform that protects your APIs from design time through production — closing the gap between what APIs are designed to do and how they're actually used. Key Takeaways.
  |  By Kong
Learn how Verifone streamlined API management using Kong's decK CLI, spec-first configuration, and an AI-powered MCP chatbot to fully automate Kong Gateway deployments. Key Takeaways.
  |  By Kong
You used an API this morning. Probably before you even got out of bed. That weather app? It's your phone communicating with a server in the cloud — sending a request, getting data back, and displaying it on your screen in seconds. Location. Request format. Expected response. That's the anatomy of an API call. And it's happening constantly across nearly every app on your phone. Hugo Guerrero and Amanda Alcamo break it all down in Episode 2 of The API & AI Breakdown. No jargon. No fluff. Just clarity.
  |  By Kong
APIs power everything, but the concepts behind them don't have to be confusing. We're launching a brand new series where Amanda Alcamo and Hugo Guerrero break down API and AI topics in plain language. Technical depth, business context, no fluff.#agenticai.
  |  By Kong
Join us for a clear, actionable blueprint for AI infrastructure, where AI strategy becomes production reality.
  |  By Kong
Learn how to expose an API orchestration workflow as an MCP server using Kong AI Gateway, configure semantic guardrails, and build an agent with the Volcano SDK. We onboard GPT-4 behind /llm, orchestrate with DataKit, and debug MCP tools in Insomnia—end-to-end without adding server code.
  |  By Kong
In this demo, We show how to migrate your API setup from Postman to Insomnia, including collections, environments, and scripts. We cover: By the end, your Postman projects are fully up and running in Insomnia. (edited)
  |  By Kong
Join our 201-level session, "Beyond the Gateway: Governing Secure and Observable AI Agents," to move from managing simple AI calls to governing autonomous systems. Building on 101's foundation, this workshop provides the advanced blueprint to secure agent connections with granular, identity-aware policies and robust tool-use governance, ensuring you control what agents can access and which actions they can perform. We'll also dive into how to observe these autonomous interactions, using real-time behavior tracing and cost analysis to maintain performance and compliance.
  |  By Kong
This major release is faster, smarter, and packed with powerful AI and collaboration features, all designed to help developers build, test, and work together more efficiently. In this video, we’ll walk you through the biggest updates.
  |  By Kong
In this eBook, Kong Co-Founder and CTO Marco Palladino illustrates the differences between API gateways and service mesh - and when to use one or the other in a pragmatic and objective way.
  |  By Kong
In this eBook, Kong Co-Founder and CTO Marco Palladino breaks down how Kuma now supports every cloud vendor, every architecture and every platform together in a multi-mesh control plane. When deployed in a multi-zone deployment, Kuma abstracts away both the synchronization of the service mesh policies across multiple zones and the service connectivity (and service discovery) across those zones.
  |  By Kong
We live in an exciting time for software; we are witnessing a monumental shift in how applications are built. We have the opportunity to participate in the large-scale movement from centralized applications to decentralized, highly performant software architectures.
  |  By Kong
To better prepare for the future, it's important to get a solid understanding of this rising technology trend. In this e-book, we examine cloud native architecture, look back at the rise of cloud native app development, and explore the future of cloud native on the entire software ecosystem.
  |  By Kong
This eBook explains how microservices can facilitate the adoption of a multi-cloud strategy. Included are a holistic overview of the multi-cloud pattern including the benefits and drawbacks, strategies for adoption, and challenges to overcome if adopting the strategy without microservices.
  |  By Kong
Performance is a critical factor when choosing an API management solution. For businesses, the need to deliver low latency and high throughput is critical to ensuring that API transaction rates keep up with the speed of business. This white paper compares the performance of Kong and Apigee to understand performance in production environments.
  |  By Kong
This ebook explains the process for transitioning from a monolithic to a microservices-based architecture. Included are technical aspects and common mistakes to avoid.
  |  By Kong
This ebook explains how Kubernetes is modernizing the microservices architecture. Included are a deep dive into the history of Kubernetes and containers, the technical and organizational benefits of using Kubernetes for container orchestration, as well as considerations for adopting it.
  |  By Kong
This eBook compares a monolithic vs microservices architectural approach to application development. It dives into the benefits and challenges of microservices and helps you determine whether a transition to microservices would be right for your organization.
  |  By Kong
This ebook explains the role that the service mesh pattern plays in the leap towards de-centralized architectures. A novel re-packaging of the functionalities of traditional API gateways, service mesh represents the next stage in the natural evolution of microservices.

Next-Generation API Platform for Modern Architectures. Connect all your microservices and APIs with the industry's most performant, scalable and flexible API platform. Empower your developers to build and optimize APIs. Leverage the latest microservice and container design patterns.

The Service Control Platform transcends API management to intelligently broker information across all your services. With Kong’s fast, flexible, and lightweight core, you control your entire service architecture – centralized or decentralized, microservices or monolith. Kong Service Control Platform transforms your static endpoints into a dynamic network of intelligent services.

Built for Modern Architectures:

  • Connect Everything: Use plugins to extend and connect services across hybrid and multi-cloud environments, regardless of vendor.
  • Accelerate Innovation: Use Kong's robust library of plugins to reduce redundant coding tasks across teams, technologies and geographies.
  • Improve Governance: Analyze real-time data to ensure adherence to policies across teams, partners and individual endpoints.
  • Automate End-to-end: Connect Kong with automation tools. Generate custom workflows to improve efficiency and reduce errors.
  • Unlock New Ecosystems: Instantly leverage new ecosystems. Deploy Kong with Kubernetes, containers, and more out of the box.
  • Increase Compliance: Limit access with role-based access control (RBAC). Encrypt end-to-end to comply with industry regulations.

Go Beyond the Gateway. Ready for the next-generation of API platforms?