Isolate your entire cluster for maximum security
Constellation is the most secure way to run Kubernetes. It leverages Confidential VMs available in all major clouds to isolate and encrypt all of your workloads end-to-end. From the inside, a Constellation cluster feels 100% like Kubernetes as you know it. But for everyone else, from the outside, it’s runtime-encrypted VMs talking over encrypted channels and writing encrypted data. Sounds like magic?
Until now: infrastructure-based threats
With Constellation: fully isolated Kubernetes...
...that runs any container securely and at scale.
Security experts and cloud architects love Constellation
Kubernetes meets Confidential Computing
Constellation solves the "trust problem" of the cloud
Why do we need a confidential public cloud?
Set up Constellation in minutes
With an easy-to-use Command Line Interface (CLI), a new Confidential Kubernetes cluster is up and running in minutes.
Constellation vs. existing confidential VM Solutions
GKE/AKS with confidential VMs | Constellation | |
---|---|---|
Runtime encryption | ||
Full cluster attestation | ||
Confidential networking | ||
Confidential storage | ||
Confidential key management | ||
Cloud agnostic / multi-cloud |
Embark into the future of cloud security
Get in touch to schedule a personal demo and see Constellation in action.