Search company, investor... company logo

Founded Year



Series C | Alive

Total Raised




Last Raised

$135M | 1 yr ago

About develops open source and enterprise software that helps enterprises adopt and operate cloud-native technologies like microservices, serverless, and service mesh. The company was founded in 2017 and is based in Cambridge, Massachusetts.

Headquarters Location

222 Third St Suite 3130

Cambridge, Massachusetts, 02142,

United States


ESPs containing

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

Emerging Tech / Development

API management is the process of building and documenting APIs, supervising and distributing access, and analyzing performance. named as Challenger among 11 other companies, including TIBCO Software, Boomi, and SnapLogic.

Compete with

Ensure that your company and products are accurately represented on our platform.'s Products & Differentiators

    Gloo Edge

    Cloud-native API Gateway based on Envoy Proxy

Expert Collections containing

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces. is included in 1 Expert Collection, including Unicorns- Billion Dollar Startups.


Unicorns- Billion Dollar Startups

1,201 items

Latest News Makes Integrated Application Networking Push

Nov 4, 2022 Makes Integrated Application Networking Push has launched a Gloo Platform that combines an application programming interface (API) gateway, service mesh and other networking technologies into a unified application networking platform. Brian Gracely, vice president of product management for, says Gloo Platform promises to reduce operational costs as organizations embrace application networking in cloud-native application environments based on microservices. Based on open source Istio service mesh, Envoy proxy software and Cilium networking software, Gloo Platform bundles Gloo Gateway, Gloo Mesh and Gloo Network in a single platform. The goal is to make it easier to achieve zero-trust application networking via a unified control plane that can be centrally managed, Gracely noted. Application networking is emerging as a distinct discipline as more applications as the dependencies between microservices continue to increase. Less clear is whether application networking will remain limited to microservices-based applications running in Kubernetes environments or if it will extend to also include monolithic applications running on legacy platforms. is betting, one way or another, that the Istio service mesh now being advanced under the auspices of the Cloud Native Computing Foundation (CNCF) will be at the core of any cloud-native approach to application networking. The implications of application networking are profound in that it presents an opportunity to programmatically integrate network and security operations into DevOps workflows. Rather than requiring developers to master lower-level networking APIs, the Gloo Platform, for example, provides a higher level of abstraction for invoking those services without having to rely on a network specialist to make them accessible. It’s not quite clear where in the cloud-native maturity model the need for application networking becomes apparent, but as more organizations find themselves trying to integrate thousands of APIs, it’s clear that cobbling together a wide range of enabling technologies on their own is a challenge. As such, demand for platforms that aggregate service mesh, proxy software and network overlays should increase. In the meantime, IT organizations may soon need to revisit how they are structured. There may always be a need for dedicated networking specialists to manage the physical network underlay, but the networking services themselves will inevitably become more integrated with other approaches to managing infrastructure-as-code (IaC). In fact, any upgrade to the networking underlay should be a lot less disruptive than they have been historically. There are, of course, a lot of approaches to application networking that are now emerging. Regardless of how application networking evolves, however, the rigidity that has characterized the delivery of network services for decades should finally start to fade away. Today, outside of a cloud computing environment, it’s still common for IT teams to provision virtual machines or Kubernetes pods in hours only to wait days or even weeks for network connectivity to be provisioned. As IT environments become more hybrid and more workloads are pushed to the edge, the need for a more agile approach to networking is becoming critical. Mike Vizard Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld. Techstrong TV – Live 15 November 2022 In this webinar, we initiate a conversation between a former CTO that’s now a CEO, a VP of engineering operations and a current CTO about the disagreements you should be having about Kubernetes. In this lively, fun session, we’ll debate what really matters and who is responsible. The post 5 Disagreements you Should be Having About Kubernetes (And How to Solve Them) appeared first on [...] 15 November 2022 Building and deploying artificial intelligence (AI) models at the network edge is a cumbersome process today. AI models must first be trained before they are released to power thousands (if not millions) of low-cost, low-power edge device hardware. And these models are often trained in the cloud or on other large-scale data center environments with […] The post AI at the Edge appeared first on [...] 14 November 2022 IT organizations are making use of more platforms than ever. In fact, the only way to keep pace with the level of demand for applications is to enable developers to provision and update infrastructure as code. The next big challenge is to achieve a level of automation that goes well beyond the scripts that developers […] The post Infrastructure as Code appeared first on [...] 10 November 2022 In this moderated discussion, Kendall Miller, Robert Brennan and Ivan Fetch of Fairwinds discuss the challenges DevOps teams will face in securing Kubernetes in 2023 and steps to secure containers. They’ll dig into some common security misconfigurations and outline steps DevOps teams need to take. Attendees will also learn why Kubernetes security requires a full […] The post Kubernetes Security Strategies for 2023 appeared first on [...] 10 November 2022 In this webinar we will be sharing common enterprise gateway patterns that Kong’s customers have built to implement an end-to-end API life cycle. We will also explore the many different ways Kong customers deploy their API platforms to maximize the ROI of API management. You will learn about different API gateway patterns, how to architect […] The post Automate Your API Life Cycle Management With Kong and AWS appeared first on [...] 12 December 2022 Making speed a priority in software development and delivery is essential in today’s digital economy. Both consumers and internal employees now expect their applications to not just be fast, but to also provide continuously updated application experiences. Best DevOps practices are, of course, at the core of achieving that goal. The challenge now is implementing.. The post Digital Transformation appeared first on Security Boulevard. [...] 5 December 2022 Recent high-profile software supply chain breaches have sharpened the focus on application security. However, as cybersecurity professionals know all too well, concern doesn’t always equate to action. In theory, the rise of DevSecOps best practices that shift responsibility for application security further left should reduce, or outright eliminate, the vulnerabilities that now routinely make it.. The post Application Security appeared first on Security Boulevard. [...] 28 November 2022 In this editorial webinar, we’ll examine the current state of application security, the challenges associated with ensuring code is free of vulnerabilities and explore some of the best practices organizations can take to shift security further left in the software development life cycle. The post Securing Open Source Software appeared first on Security Boulevard. [...] 16 November 2022 This webinar provides an overview of the executive order including what constitutes an SBOM, and their intended purpose, usage and shortcomings in software supply chain security. We will then explore how a pipeline bill of materials (PBOM) can be used to expand upon the foundation provided by SBOMs to give you more visibility and control.. The post Understanding SBOMs: A Practical Guide to Implementing NIST/CISA’s Software Bill of Materials (SBOM) Requirements appeared first on Security Boulevard. [...] 15 November 2022 In this webinar, Mike Rothman, GM of Techstrong Research, will share findings from a newly released PulseMeter on creating a strategy to capture all of your log data. In addition, Arfan Sharif, technical marketing engineer at Crowdstrike, will discuss the business and technical challenges around capturing and analyzing data from across the enterprise and how.. The post Unleashing the Value of All Log Data appeared first on Security Boulevard. [...] Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo Rank Frequently Asked Questions (FAQ)

  • When was founded? was founded in 2017.

  • Where is's headquarters?'s headquarters is located at 222 Third St, Cambridge.

  • What is's latest funding round?'s latest funding round is Series C.

  • How much did raise? raised a total of $171.85M.

  • Who are the investors of

    Investors of include True Ventures, Redpoint Ventures and Altimeter Capital.

  • Who are's competitors?

    Competitors of include VMware and 5 more.

  • What products does offer?'s products include Gloo Edge and 4 more.

  • Who are's customers?

    Customers of include T-Mobile.

Compare to Competitors

Giant Swarm Logo
Giant Swarm

Giant Swarm is a platform that gives developers the power and freedom to build the software that runs the world. Developers use Giant Swarm to easily deploy, run, and scale their applications as well as easily collaborate on and share their infrastructure stacks with the community.

Kubermatic Logo

Kubermatic provides training and consultancy services. It offers services and solutions such as accelerators, training, fundamentals, IT landscape modernization, hybrid and multi-cloud Kubernetes, and more. The company was formerly known as Loodse. The company was founded in 2016 and is based in Hamburg, Germany.

Maxta Logo

Maxta offers a virtualization-centric storage platform that eliminates the need for external storage arrays and dramatically simplifies IT, while delivering significant cost savings. Maxta's software platform enables the convergence of compute and storage on standard servers leveraging server-side flash and disk drives to optimize performance and capacity. Maxta's software supports all server virtualization capabilities that depend on shared storage and delivers enterprise-class data services, capacity optimization and scale-out of storage and performance.

CloudNatix Logo

CloudNatix helps companies use hybrid and multi-cloud environments for their legacy and cloud-native applications.

Buoyant Logo

Buoyant provides infrastructure for distributed applications such as Linkerd, project and creator of the "service mesh". linkerd is a transparent proxy that adds service discovery, routing, failure handling, and visibility to modern software applications.

D2iQ Logo

D2iQ, formerly Mesosphere, is a provider of enterprise-grade cloud platforms that enable organizations to embrace open source and cloud native innovations while delivering smarter Day 2 operations. D2iQ empowers organizations to better navigate and accelerate cloud-native journeys with enterprise-grade technologies, training, professional services, and support.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.