Project Calico
Products
Calico Open Source
eBPF-based networking and security
Calico Cloud
Security for containers and Kubernetes
Calico Enterprise
Zero trust security for Kubernetes
Compare Products
Pricing
Why Calico
Solutions
Use Cases
Kubernetes Security
Egress Gateway
Universal Firewall Integration
Cluster Mesh
Workload Access Controls
Microsegmentation
Security Policy Management
Observability & Troubleshooting
Multi-Cloud Security
High-Availability Kubernetes
Container Security
Vulnerability Management
Configuration Security
Runtime Threat Defense
Workload Access Controls
Security Policy Management
Observability & Troubleshooting
Compliance
Environments
AWS EKS
Azure AKS
Google GKE
Red Hat OpenShift
SUSE Rancher
Fortinet
Mirantis
Learn
Developer Center
Documentation
Interactive Training
Product Tutorials
Certification
Resources
Blog
Interactive Training
NEW
Use case-driven video lessons, accompanied by a staged demo environment, to help you leverage Calico for container security and networking.
Learn More >
Guides
Security
Container Security
Kubernetes Security
LLM Security
CNAPP
Service Mesh
Microservices Security
Cloud-Native Security
Guides
Observability
Kubernetes Monitoring
Prometheus Monitoring
Networking
Kubernetes Networking
Cillium vs Calico
eBPF
Support
Customer Success
Support Portal
Tigera Help Center
Security Bulletins
Report Security Issue
Company
About
Customers
Partners
Events
CalicoCon 2024
Newsroom
Careers
Contact
Contact
Login
Try Now
Pay-as-you-go SaaS
Usage-based pricing and annual subscription available
Pricing
Marketplaces
Features
How It Works
Pricing
Pro
Pay as you go
$0.08 / Node Hour
Log data ingested/transferred per month ($.25 / GB / month)
200 GB
- Each node is up to 4 vCPU
BUY
Marketplaces
Tigera
Sign Up
AWS Marketplace
Sign Up
Azure Marketplace
Sign Up
Features
Image Assurance
Runtime Threat Defense
Configuration Security
Zero-Trust Workload Access Controls
Workload-based IDS/IPS, DDoS, DPI, and WAF
Identity-aware Microsegmentation
Encryption
Compliance and Audit
Dynamic Service and Threat Graph
DNS Dashboard
Dynamic Packet Capture
Application-Level Security and Observability
Unified Controls
Shift Left Security
Policy Lifecycle Management
How It Works
Get Started
Try Now
Talk to an Expert