The story

One frustration, one design choice.

The teams we came from shipped container platforms for regulated industries: banks, hospitals, public-sector systems. The workflow went something like this. A platform team shipped images, a security team wrote policies in a separate tool, and a compliance team wrote reports off a third. Most of the production incidents we watched traced back to the handoffs between those three.

The rule we set for Sekyr was straightforward: no one should have to remember to turn security on. It should sit in the path between the registry and the cluster, which is the narrowest interface a container ever crosses, and it should speak the OCI that everything else already speaks.

That's why the install is a URL prefix, why there's no daemon running in your cluster, and why compliance is a view over the event stream instead of a separate product. We're still early. We'd rather tell you that than inflate the numbers.

  1. 01
    Sondre

    Sondre

    Founder

    Founded Sekyr. Spends his time on the business side, with one foot still in the IDE.

  2. 02
    Jostein

    Jostein

    Engineering

    Head of engineering. Owns the technical roadmap and how the product gets built.

  3. 03
    Andreas

    Andreas

    Low-level engineering

    Lives close to the metal. Kernels, syscalls, and the parts of the runtime most people would rather not think about.

  4. 04
    Anders

    Anders

    Finance

    Handles the money and makes sure the lights stay on.

  5. 05
    Cato

    Cato

    Operations

    Runs the day to day. Customers, contracts, everything in between.