We build security that disappears into the work.
Sekyr is a small Norwegian company building container security as infrastructure. We started from a pattern we kept running into in regulated industries: the platform team, the security team, and the compliance team each had their own tool, and production incidents tended to live in the spaces between them. Sekyr is our attempt to close that gap with one change to a registry URL.
One frustration, one design choice.
The teams we came from shipped container platforms for regulated industries: banks, hospitals, public-sector systems. The workflow went something like this. A platform team shipped images, a security team wrote policies in a separate tool, and a compliance team wrote reports off a third. Most of the production incidents we watched traced back to the handoffs between those three.
The rule we set for Sekyr was straightforward: no one should have to remember to turn security on. It should sit in the path between the registry and the cluster, which is the narrowest interface a container ever crosses, and it should speak the OCI that everything else already speaks.
That's why the install is a URL prefix, why there's no daemon running in your cluster, and why compliance is a view over the event stream instead of a separate product. We're still early. We'd rather tell you that than inflate the numbers.
- 01

Sondre
FounderFounded Sekyr. Spends his time on the business side, with one foot still in the IDE.
- 02

Jostein
EngineeringHead of engineering. Owns the technical roadmap and how the product gets built.
- 03
Andreas
Low-level engineeringLives close to the metal. Kernels, syscalls, and the parts of the runtime most people would rather not think about.
- 04

Anders
FinanceHandles the money and makes sure the lights stay on.
- 05

Cato
OperationsRuns the day to day. Customers, contracts, everything in between.
