The tool's feature that I find most beneficial is rate limiting. In our usage, especially in the financial sector, we prioritize limiting API usage. This is crucial because we provide APIs to other companies and must ensure they adhere to their allocated usage limits. Without rate limiting, there's a risk of excessive usage, which could result in significant costs.
There are a few features that I like about Kong when it comes to authentication and authorization. Specifically, being able to use Kong for role-based access control (RBAC), and then further being able to integrate the RBAC mechanism with our enterprise directory, was very useful.
Kong delivers a next generation API platform built for modern architectures. With a lightnight-fast, lightweight, and flexible core, Kong delivers sub-millisecond latency across all your services. Kong's is deployment-, vendor-, and pattern-agnostic, allowing you to run your services how you want, where you want, and with who you want - from baremetal to cloud, monolith to microservices, service mesh, and beyond.
The tool's feature that I find most beneficial is rate limiting. In our usage, especially in the financial sector, we prioritize limiting API usage. This is crucial because we provide APIs to other companies and must ensure they adhere to their allocated usage limits. Without rate limiting, there's a risk of excessive usage, which could result in significant costs.
The most valuable feature of Kong Enterprise is its capability to integrate with various security tools.
The tool's scalability is good...The solution's technical support is good.
It boasts remarkable speed and stability, and these qualities, particularly the gateway's resilience, are standout features for me.
The most valuable feature of the solution stems from the fact that it seamlessly supports a vast number of tools.
We use the solution for load-balancing, caching, and rate-limiting APIs.
The solution provides good performance.
There are a few features that I like about Kong when it comes to authentication and authorization. Specifically, being able to use Kong for role-based access control (RBAC), and then further being able to integrate the RBAC mechanism with our enterprise directory, was very useful.
The most valuable features of Kong Enterprise are the out-of-the-box open source easy functionality.
I like everything about it. It provides the security we need.
Kong Enterprise has excellent plugin support.
Good at intercepting traffic and modeling APIs around that.
In our buying companies' perspective, it was easier to use compared to other platforms. The markets were pretty familiar with the solutions.
This is a solid intrusion prevention system that combines a firewall and antivirus in a single solution.