The Full Coverage Insurance
for Your Software Stack

With a Software Delivery Platform from ayedo, running software-as-a-service solutions on Kubernetes becomes a no-brainer: faster deployments, less downtime, shorter cycle times. Release features that delight your end users with less cost and more predictability.

Learn more

Leading companies trust our technology ↘

And how does it work?

Our Software Delivery Platform is a managed service solution for companies that want their software operations in expert hands and value personal support. You develop, we operate. Unlike other managed service providers, you receive not only pure cluster and app operations, but a service package fully tailored to highly available software delivery and personal support from our platform team.

And how does it work?

Consulting

Objective consulting on designing your hosting infrastructure.
Support Consulting Infrastructure

Infrastructure

Sovereign infrastructure: Public, Private, or On-Premise.
Kubernetes Public Private

Onboarding

We make your applications container-ready.
Container Migration Support

Monitoring

24/7 monitoring and alerting for infrastructure, platform, and apps.
24/7 Monitoring Alerting

No software is like another

ayedo’s Software Delivery Platform is available in 3 editions: Public, Private, and Enterprise. ayedo offers some components as Public Cloud services on ayedo-owned infrastructure. Private Cloud customers receive dedicated virtual infrastructure in our data centers (or with a supported cloud provider). Enterprise Cloud customers receive dedicated physical infrastructure in our data centers (or on supported customer infrastructure).

Public Cloud
🏳️‍🌈

Public Cloud

Shared Infrastructure

Private Cloud
🇪🇺

Private Cloud

Virtually Isolated Infrastructure

  • Certified Kubernetes
  • Metrics, Logs & Traces
  • Code Repo & CI/CD
  • Container Registry
  • App Deployments
  • Identity Provider
  • Object Storage
  • Block Storage
  • Load Balancer
  • Databases
Enterprise Cloud
🏴‍☠️

Enterprise Cloud

Physically Isolated Infrastructure

  • On-Premise Support
  • Air-Gapped Support
  • Infrastructure-as-a-Service
  • OCI Registry Proxy

You build it. We run it.

Excellent performance and maximum uptime - that’s what we wake up for. And sometimes even in the middle of the night.

270 Million End Users

per month

More than 9 million end users use software we deploy every day, on the internet or on-premise.
User Endanwender Software

99.99% Uptime

annual average

Our managed services are unavailable for less than 1 hour per year on average.
Uptime Verfügbarkeit SLA

MTTD < 5 Minutes

on average

Our granular alerting system detects errors and outages faster than you can say ‘Service Level Agreement’.
MTTD Monitoring Detection

15 Billion Logs

per month

More than 2000 logs per second are collected by our collectors and stored GDPR-compliant.
Logs Observability Ingestion

46 Million Active Timeseries

per month

1.7 million datapoints are measured per second by our monitoring systems.
Monitoring Metrics Datapoints

50 TB Backups

per month

More than 2000 backups are stored daily on our encrypted long-term storage.
Backup Storage Sicherheit

Compliance & Regulatory Requirements

The ayedo Software Delivery Platform meets the requirements of current EU regulations. From GDPR to NIS-2 to DORA – our platform is designed for regulated industries and critical infrastructures.

GDPR-Compliant Data Processing

Privacy by Design & Default.

EU data residency (Germany), Customer-Managed Keys (BYOK/BYOHSM), encryption at rest/in transit. ISO 27001-certified data protection management. Support for data subject rights, DPA, incident response. More about GDPR.

NIS-2-Compliant Operations

Resilience for critical infrastructures.

24/7 monitoring, incident response, BCP/DR processes, supply chain transparency (SBOM). EU-based operations, MFA/PAM, vulnerability management, patch processes. Ideal for essential/important entities. More about NIS-2.

DORA-Ready for Financial Institutions

ICT resilience tailored.

ICT risk management framework, documented exit strategies, third-party risk management, TLPT readiness. Structured incident reporting chains, continuous resilience testing, ISO 27001-certified. More about DORA.

CRA-Compliant Software Supply Chain

Security by Design across the entire lifecycle.

SBOM generation, CVE scanning, vulnerability disclosure processes, update management. Signed container images, GitOps-based audit trails, transparent supply chain. More about CRA.

Cloud Sovereignty Framework

Digital sovereignty made measurable.

EU-based operations, open standards, exit capability without lock-in. Designed for SEAL-4 (Full Digital Sovereignty) across all eight sovereignty objectives. No dependencies on non-EU control. More about the Framework.

Data Act-Compliant Portability

Switching without barriers.

Open APIs (OpenAPI), standardized formats (YAML/JSON/OCI), complete exit runbooks, Infrastructure-as-Code portability. Multi-cloud capable, no egress fees, functional equivalence. More about Data Act.

Integrated Compliance Roadmap

Holistic approach.

How ayedo systematically addresses GDPR, NIS-2, DORA, CRA, Data Act, Cloud Sovereignty Framework, ISO 27001/9001. Certifications, processes, technical measures, audit readiness. To overview.

Private Cloud

At ayedo, Private Cloud means a virtually isolated infrastructure consisting of one or more Kubernetes clusters including the platform components running within. From a certain size or complexity of the software you want to run at ayedo, it makes sense to use dedicated instances of services like Identity Management, Artifact Management, or Storage Management instead of our publicly available solutions.

Identity Management

Identity Management

The integrated Identity Management based on Keycloak or Authentik provides ayedo Private Cloud with a central, secure, and GDPR-compliant user management – ideal for use in regulated industries and critical IT/OT environments. Companies retain full control over identities, roles, and access rights, creating the foundation for zero-trust architectures and audit compliance in complex software landscapes.
Keycloak Authentik GDPR Zero-Trust
Monitoring & Alerting

Monitoring & Alerting

With the Monitoring & Alerting feature, ayedo Private Cloud provides powerful tools like Grafana, VictoriaMetrics, and VictoriaLogs to monitor systems, applications, and data streams in real-time. Companies can detect anomalies early in IT or OT environments, respond to issues in a targeted manner, and increase operational security – even in highly available or regulated infrastructures.
Grafana VictoriaMetrics Real-Time Alerting
Object Storage

Object Storage

With ayedo Private Cloud’s Object Storage, companies get a highly available, scalable, and S3-compatible storage solution based on CEPH or MinIO – ideal for large data volumes and data-driven applications. Whether manufacturing data, log files, AI models, or media content: data can be securely stored, versioned, and provided in real-time for analysis, backup, or further processing.
CEPH MinIO S3-compatible Scalable
Secrets Management

Secrets Management

Secrets Management in ayedo Private Cloud enables companies to securely manage passwords, API keys, TLS certificates, and other sensitive information – centrally, automated, and fully controllable with tools like HashiCorp Vault or Infisical. Through integration with Kubernetes and CI/CD pipelines, development, build, and operations processes can be secured according to zero-trust principles.
HashiCorp Vault Infisical API-Keys Zero-Trust
Artifact Management

Artifact Management

Artifact Management in ayedo Private Cloud provides a central, secure, and team-wide platform for managing Docker images, Helm charts, and Polycrate blocks – powered by Harbor. Development and DevOps teams can version, sign, and release build artifacts in a controlled manner, enabling consistent deployments across different environments.
Harbor Docker Images Helm Charts Versioning
Code Management

Code Management

Code Management in ayedo Private Cloud is based on GitLab and enables companies to have complete control over their entire software development process – from source code management to CI/CD, security scans, and issue tracking. By operating in dedicated, sovereign infrastructure, companies retain sovereignty over their source code and sensitive development data.
GitLab CI/CD Security Scans Issue Tracking
Backup & Restore

Backup & Restore

The Backup & Restore feature provides ayedo Private Cloud with a robust and automated solution for backing up and restoring applications, databases, and infrastructure – based on technologies like Velero, S3-compatible Object Storage, and Postgres PITR (Point-In-Time Recovery). Companies can perform not only complete cluster backups but also granular database-level restorations.
Velero PITR Cluster Backup Automated
Deployment

Deployment

The Deployment and Continuous Delivery feature of ayedo Private Cloud combines GitOps with security and transparency – through ArgoCD for automated rollouts, Harbor for artifact management, CVE scans for vulnerability checking, and SBOMs (Software Bill of Materials) for traceability of all components. Companies benefit from a consistent, audit-proof delivery process.
ArgoCD GitOps CVE Scans SBOM
Continuous Integration

Continuous Integration

The Continuous Integration feature of ayedo Private Cloud enables companies to build automated and secure pipelines based on GitLab CI and Harbor – fully operated in controlled, sovereign infrastructure. Source code changes are tested and built in real-time, with artifacts stored in Harbor, including versioning, signing, and optional security scans.
GitLab CI Build Pipeline Automated Security Scans

Enterprise Cloud

The Enterprise Cloud includes all features of the Private Cloud plus more, running on virtual or physical resources on your own infrastructure. Sometimes Kubernetes workers need to run on IoT devices or the Identity Provider needs to be integrated with a local Active Directory.

Active Directory Integration

Active Directory Integration

Active Directory Integration in ayedo Enterprise Cloud enables companies to seamlessly connect their existing user directories to modern, cloud-native applications – realized with proven open-source components like Keycloak or Authentik. User identities, groups, and roles from AD can be centrally managed and used for single sign-on, access control, and permission management in Kubernetes-native workloads.
Active Directory Keycloak SSO Integration
VMware Support

VMware Support

With Infrastructure-as-Code (IaC) support for VMware vSphere, ayedo Enterprise Cloud connects proven virtualization infrastructure with modern GitOps and automation approaches. Companies can declaratively manage, reproducibly provision, and version their virtual infrastructure – fully integrated into CI/CD and DevOps processes.
VMware vSphere IaC GitOps
On-Premise Support

On-Premise Support

The On-Premise Support feature of ayedo Enterprise Cloud enables complete platform operation in customer-owned infrastructure – whether in your own data center or as part of an existing enterprise IT landscape. Companies retain full control over data, processes, and integrations without having to forgo the benefits of cloud-native technologies.
On-Premise Enterprise IT Control Sovereignty
OCI Registry Proxy

OCI Registry Proxy

The OCI Registry Proxy feature of ayedo Enterprise Cloud provides companies with secure and performant access to container images and Helm charts – even in restricted or air-gapped Kubernetes environments. Via Harbor as a proxy cache, external OCI registries like Docker Hub or GitHub Container Registry can be locally mirrored and cached.
Harbor OCI Registry Proxy Cache Air-Gapped