Overview

Calico Cloud is a next-generation security and observability SaaS platform for containers, Kubernetes, and cloud. It enables organizations of all sizes to protect their cloud workloads and containers, detect threats, achieve continuous compliance, and troubleshoot service issues in real time across multi-cluster, multi-cloud, and hybrid deployments. Calico Cloud is built on Calico Open Source, the most widely adopted container networking and security solution.

Instead of managing a platform for container and Kubernetes security and observability, teams consume it as a managed service for faster analysis, relevant actions, and end results. They get an understanding of the microservices dependencies, the way to manage, analyze, and troubleshoot performance hotspots, connectivity, and detect anomalies without going through an extensive setup and deployment process. With Calico Cloud, users only pay for services consumed and are billed monthly, getting immediate value without upfront investment.

Benefits

Kubernetes-native security and observability

Any container, any Kubernetes distribution, any workload, any cloud

Flexible pricing with usage based billing

Get up and running in minutes

Architecture

Capabilities

 

North-South Controls

Control north-south traffic, limit access to external endpoints on a per-pod basis, and protect your Kubernetes cluster.

The Calico Cloud Egress Gateway enables you to securely integrate with firewalls, monitoring systems like SIEMs, and other systems that don’t understand the dynamic nature of container orchestration.

You can author DNS Policies that implement fine-grained access controls between a workload and the external services it needs to connect to, like Amazon RDS, ElasticCache, and more.

KEY FEATURES INCLUDE

  • Egress Access Controls
  • Firewall Integrations
 

East-West Controls

East-West controls enable you to limit the blast radius when a security breach results in an APT (advanced persistent threat). You can perform micro-segmentation for both container and VM workloads. Calico Cloud’s “defense-in-depth” approach provides protection on three levels: host, container/VM and application. Using a single policy framework, you can set controls at all of these levels using a declarative model.

KEY FEATURES INCLUDE

  • Microsegmentation
 

Enterprise Security and Compliance

If you’re working with sensitive data that falls under regulatory compliance mandates like PCI, HIPAA, SOC 2, or GDPR, Calico Cloud provides data-in-transit encryption with industry-leading performance, as well as compliance reporting for security policies and controls.

Calico Cloud has an incredibly rich Intrusion Detection feature set that includes threat feeds to identify known bad actors like bots, custom alerts for known attacks, anomaly detection, and honeypods. It includes an automated approach to malware detection and response to target and remediate threats like DGA (Domain Generation Algorithm) and the unpatched Kubernetes CVE-2020-8554 vulnerability.

KEY FEATURES INCLUDE

  • Intrusion Detection and Prevention
  • Encryption
  • Compliance and Audit
 

Observability

Distributed applications on agile infrastructure are difficult to troubleshoot. Calico Cloud provides dynamically generated service graph that enables anyone to easily understand how microservices are behaving and interacting with each other at run-time, thus simplifying the troubleshooting process and anomaly detection.

Dynamic Service Graph provides a rich set of information with Kubernetes context including across which namespaces, microservices and pods are communicating, detailed DNS information, detailed logs for every single flow in your cluster, and how security policies are being evaluated. You can quickly identify the source of a problem at the application, process, and socket levels as well as through an automated packet capture function.

KEY FEATURES INCLUDE

  • Dynamic Service Graph
  • Application-Level Observability
  • Dynamic Packet Capture
  • DNS Dashboard
 

Unified Controls

Unified controls are required for consistent security and observability across multi-cluster, multi-cloud and hybrid cloud environments. Calico Cloud provides a single pane of glass to ensure consistent application of security controls across both containers and VMs in heterogeneous environments. Unified controls reduce the complexity for DevOps teams running the clusters by supporting self-service security and CI/CD integration. Using “Security as code”, Calico Cloud fully automates the cluster-wide, end-to-end policy deployment process including any necessary security changes.

Built on Calico Open Source, the most widely adopted networking and security solution for containers and Kubernetes, Calico Cloud also supports third-party CNIs including EKS VPC, Azure CNI, and GKE to expand your choice of public cloud providers.

KEY FEATURES INCLUDE

  • Unified Controls for Security & Observability across Multi-cloud & Hybrid environments
 

Shift Left Security

Developers, DevOps teams, and SREs want to follow a simple workflow and generate security policies with minimal effort in their code. Calico Cloud allows them to create their own security policies within their tiers and customize permissions based on organizational structure.

Calico ensures the policies in the left-most tiers are given precedence over the right. Tiers are a Kubernetes object, so you can control who can view/modify policies in specific tiers. Every change of record to tiers and policies is captured, enabling you or auditors to go back in time for review or troubleshooting purposes.

KEY FEATURES INCLUDE

  • Policy Automation

Key Features

How It Works

 

Get container and Kubernetes networking, security, and observability with Calico Cloud in minutes for any distribution across public cloud providers.

Resources

Solution Brief

Learn More

Free eBook

Download

Calico Cloud Datasheet

Learn More

Latest Content

Why securing internet-facing applications is challenging in a Kubernetes environment

Why securing internet-facing applications is challenging in a Kubernetes environment

By Ratan Tipirneni on Sep 22, 2021

Internet-facing applications are some of the most targeted workloads by threat actors. Securing this type of application is a must in order to protect your network, but this task is

Read more >
Meeting SOC 2 compliance and audit requirements in SaaS and cloud environments

Meeting SOC 2 compliance and audit requirements in SaaS and cloud environments

By Neeraj Shahdadpuri on Aug 23, 2021

SOC 2 compliance is a component of the American Institute of CPAs (AICPA)’s Service Organization Control reporting platform, whose goal is to ensure that systems are enabled to support the...

Register here >
Hands-on workshop: Cyber Threat Protection Strategies & Tactics for Kubernetes

Hands-on workshop: Cyber Threat Protection Strategies & Tactics for Kubernetes

By Neeraj Shahdadpuri on Sep 14, 2021

Due to the ephemeral, dynamic and highly distributed nature of Kubernetes deployments, they are vulnerable to cyber attacks. In this interactive workshop a Kubernetes security expert will help you design...

Watch here >