Product Overview
Designed for businesses that prioritize security without compromising on performance, Constellation uses cutting-edge confidential computing to transform public cloud resources into a fortified private cloud environment. It's an ideal choice for enterprises that require uncompromising data protection across all states - at rest, in transit, and during processing.
Constellation wraps your K8s cluster into a single confidential context that is shielded from the underlying cloud infrastructure. Everything inside is always encrypted, including at runtime in memory. For this, Constellation leverages confidential computing, see the whitepaper, and more specifically, Confidential VMs.
Key features
Unparalleled data securityWith Constellation, your data is always encrypted, no matter the state. This ensures that your sensitive information remains secure and inaccessible to unauthorized entities.
Assured cluster integrity
We employ the latest supply-chain security mechanisms and remote attestation to verify the integrity of your entire cluster, providing a secure foundation for your applications.
Optimized performance and scalability
Experience high availability, autoscaling, and near-native performance. Constellation is engineered for enterprises that need robust performance alongside their security.
Important! This marketplace listing is not meant for direct consumption by deploying a single virtual machine.
DO NOT create a Virtual Machine from this offering directly.
Please follow the instructions in the getting started guide.
Version
Categories
Operating System
Linux/Unix, Other Constellation Node Image
Delivery Methods