Constellation leverages confidential computing to isolate entire Kubernetes clusters from the infrastructure. Finally, the public cloud turns into your private cloud. All data in the cluster remains encrypted in all states - at rest, in transit, and during processing. The integrity of the entire cluster is verified based on cryptographic certificates and latest supply-chain security mechanisms. The source code of Constellation is accessible for anyone to review on GitHub. This enables meaningful remote attestation. When users leave Constellation reviews, G2 also collects common questions about the day-to-day use of Constellation. These questions are then answered by our community of 850k professionals. Submit your question below and join in on the G2 Discussion.

All Constellation Discussions

Sorry...
There are no questions about Constellation yet.

Answer a few questions to help the Constellation community
Have you used Constellation before?
Yes