Guides

Best Claude Code Gateway for Enterprises in 2026

·
18 min read
ai-gateway 2026 claude-code
Editorial cover image for Best Claude Code Gateway for Enterprises in 2026
Table of Contents

The legal review for Claude Code at a Fortune 500 doesn’t start with throughput. It starts with a fifty-question security questionnaire, a SOC 2 Type II report dated within twelve months, a DPA naming every sub-processor, a Business Associate Agreement (or written reasoning why none is needed), and an architecture diagram showing where prompt and completion data lives. The platform team is excited about productivity. Procurement isn’t excited yet, and procurement decides whether the rollout happens.

This post is for procurement and IT directors. Sibling posts (linked at the end) cover the developer, SRE, and FinOps lenses.

“Claude Code gateway” means an AI gateway between Claude Code and api.anthropic.com, wired via ANTHROPIC_BASE_URL. Scoring is procurement-grade honest: where any vendor is in progress on a certification, it’s named.


TL;DR: pick by procurement constraint

Procurement constraintPickWhy
BYOC plus open-source data layer plus AWS Marketplace plus HIPAA-certified BAAFuture AGI Agent Command CenterOnly entry where the trace, eval, and optimization layers are Apache 2.0 and the data plane runs in your account
Polished hosted gateway with mature SOC 2 / ISO catalog, accepting a PANW acquisitionPortkeyDeepest pre-built compliance catalog of the hosted picks
Self-hosted control plane with FedRAMP-aligned reference architectureKong AI GatewayIf FedRAMP Moderate / High is on the checklist and Kong already sits inside the agency boundary
VPC-default deployment under a single MSA across gateway, inference, MLOpsTrueFoundryIf procurement wants to consolidate vendors under one DPA
Existing Cloudflare enterprise MSA covering DDoS, WAF, WorkersCloudflare AI GatewayIf Cloudflare is already the trusted edge and the data plane has cleared review

Why Claude Code at a Fortune 500 is a procurement problem

Procurement picks on whether the vendor satisfies seven artifacts: SOC 2 Type II, ISO 27001, the DPA, the BAA (if any unit might touch PHI), a sub-processor list with right-to-object language, an audit-log retention policy aligned to the customer’s records-retention schedule, and an architecture diagram showing where prompt and completion data lives.

Three properties of Claude Code sharpen this beyond a stateless API gateway review. First, the data is source code, and some of it’s regulated. A health-tech subsidiary’s repo carries PHI in test fixtures; a bank’s repo carries material non-public information inside SOX scope; a government contractor’s repo carries CUI. The BAA has to be available if any unit is HIPAA-covered, even when today’s pilot isn’t. Second, sessions are long and the audit log is chain of custody, thirty to fifty turns, each carrying tens of kilobytes of source code. SOX-scope inherits seven years; HIPAA-scope inherits six years from creation or last in effect; default thirty-day retention is wrong by orders of magnitude. Third, the vendor list consolidated in 2026: Helicone went to Mintlify in March 2026; Mintlify went to Stripe in late 2025; Portkey announced PANW acquisition on April 30, 2026 (close expected PANW fiscal Q4). Three names on a typical 2025 shortlist now have a different parent and possibly a different sub-processor list than IT security reviewed last quarter.


The 7 procurement axes we score on

AxisWhat procurement is asking
1. SOC 2 Type II / ISO 27001 / SOX-relevant retentionIs the Type II report dated within twelve months? Is retention SOX-compliant per repository class?
2. GDPR / DPA depth and FedRAMP / BAA availabilityIs the DPA aligned to current EU SCCs? Is FedRAMP on the roadmap or attested? Is a BAA available on request?
3. RBAC depth plus SSO + SCIM coverageSAML SSO and SCIM out of the box? RBAC nesting at three or four levels? Delegated administration native?
4. Data residency controlCan prompt and completion data be pinned to a region? Can the customer control sub-processor regions?
5. SLA + private-link / VPC peeringContracted SLA percentage with service credits? PrivateLink, Azure Private Link, or VPC peering offered?
6. Air-gap and BYOC deploymentCan the gateway run inside the customer’s account or air-gapped enclave with no telemetry leaving the perimeter?
7. Vendor financial stability and audit retention policyIs the vendor stable through the contract term? What is the published retention policy and cold-tier economics?

Partial credit on any axis isn’t disqualifying, most enterprise procurements close around partial credit with mitigations. The point is to surface the trade-offs before the committee discovers them eighteen months in.


How we picked

We started with AI gateways advertising an Anthropic-compatible endpoint and at least one publicly referenced 1,000+ Claude Code seat deployment. We removed vendors with no Type II report or in-progress observation period. We removed two names on 2026 trust events without clean remediation paths: Helicone (acquired by Mintlify, documentation-platform-first roadmap; Mintlify acquired by Stripe) and LiteLLM (March 24, 2026 PyPI supply-chain compromise affecting versions 1.82.7 and 1.82.8, exfiltrating SSH keys and cloud credentials per Datadog Security Labs).


1. Future AGI Agent Command Center: Best for BYOC plus open-source data layer

Verdict. Future AGI is the only entry where the entire data-collection layer (traces, evaluations, optimizer state) is Apache 2.0 code running inside the customer’s VPC under BYOC, with an AWS Marketplace listing that runs the contract against an existing AWS EDP commitment. Future AGI ships SOC 2 Type II + HIPAA + GDPR + CCPA certified per futureagi.com/trust; ISO/IEC 27001 is in active audit.

Attestation. SOC 2 Type II + HIPAA + GDPR + CCPA certified per futureagi.com/trust; ISO/IEC 27001 in active audit. Retention is tiered (hot thirty days, warm one year on Parquet, cold seven years on Glacier), configurable per repo class so SOX-scope repos inherit the seven-year cold tier.

** DPA aligned to 2021 EU SCCs with 2023 amendments. Sub-processor list is short. Anthropic, AWS, customer’s logging destination. HIPAA certified, BAA available via FAGI sales.

RBAC + SSO + SCIM. Four-level native hierarchy: org > business-unit > sub-business-unit > cost-center, with repo and developer scoping below. Delegated administration is native. SAML SSO across Okta, Azure AD, Google Workspace, Auth0. SCIM for Okta and Azure AD. The identity broker accepts signed JWTs from multiple IdPs and normalizes the user.id schema.

Data residency. Under BYOC the customer pins residency by AWS or Azure region (EU-West, EU-Central, US-East, US-West, Singapore, Tokyo, Mumbai, anywhere your cluster runs). Hosted plane runs in US and EU; non-US/EU residency uses BYOC, the same Apache 2.0 binary in the customer’s account.

SLA / private-link. Enterprise contracts to 99.9% monthly uptime with credits; 99.95% on multi-region BYOC active-active. AWS PrivateLink, Azure Private Link, and VPC peering all available.

Air-gap / BYOC. BYOC is the flagship deployment. Air-gapped enclaves run the same stack with egress either disabled (against an on-prem model) or routed through the customer’s controlled-egress proxy. Telemetry to Future AGI’s hosted plane can be fully disabled.

Vendor stability + retention. ~$1.9M raised as of May 2026 (Powerhouse, Snow Leopard, Arka, Wellfound Quant Fund), earlier-stage than Portkey or TrueFoundry. Mitigations: Apache 2.0 license on the entire data-collection layer (the customer can self-host indefinitely) and the AWS Marketplace listing (converts the contract path into an AWS contract path). Cold-tier storage runs roughly 10x cheaper per TB-year than single-tier hot.

The loop, briefly. Traces are scored by fi.evals; low-scoring sessions are clustered; fi.opt.optimizers rewrite prompts or routing rules; Protect ships ~65 ms text latency per arXiv 2510.13351. The loop produces an immutable, versioned audit trail of every policy change alongside the chargeback data, the SOC 2 control evidence the auditor asks for.

Where it falls short.

  • ISO/IEC 27001 in active audit per futureagi.com/trust; SOC 2 Type II + HIPAA + GDPR + CCPA are certified today.
  • ISO 27001 not on the certificate list. Gap with a documented timeline.
  • Earlier-stage vendor than Portkey or TrueFoundry. Apache 2.0 data layer mitigates the exit path.
  • BYOC active-active requires SRE time: two to three weeks during cutover plus cross-region transfer and hot-tier replica cost.
  • Non-US/EU residency runs through BYOC (the same Apache 2.0 binary in the customer’s account, anywhere your cluster runs).

Pricing. Free tier with 100K traces per month. Scale starts at $99/month. Enterprise is custom with SOC 2 Type II, HIPAA, GDPR, and CCPA certified, BAA available via FAGI sales, BYOC, AWS Marketplace.

Score: 6.5 / 7 axes. Partial credit on attestation.


2. Portkey: Best for hosted gateway with mature compliance catalog

Verdict. Portkey is the most polished hosted Claude Code gateway in 2026, with the deepest pre-built compliance catalog among hosted-only products. Type II attested, ISO 27001 on the list, mature DPA. The 2026 variable is the Palo Alto Networks acquisition announced April 30, 2026, expected to close in PANW fiscal Q4. Inside the PANW stack the acquisition is upside; outside it, vendor-coupling is the question to answer before signing multi-year.

Attestation. SOC 2 Type II attested with report under NDA. ISO 27001 on the list. Retention configurable up to seven years on Enterprise with S3, Snowflake, Splunk export. SOX-aligned retention per workspace.

** DPA aligned to current EU SCCs. Sub-processor list published. BAA on request.For a federal civilian agency today, plan against the PANW federal channel.

RBAC + SSO + SCIM. Native four-tier hierarchy: org > workspace > project > virtual-key. Delegated administration via SAML role claims. SAML SSO across Okta, Azure AD, Google Workspace, Auth0, OneLogin. SCIM supported. Trade-off: five-plus-level org charts flatten one level into metadata.

Data residency. Hosted multi-region across US-East, US-West, EU-West, APAC (Singapore), pinned per workspace. BYOC runs data plane in the customer account; control plane stays in Portkey cloud unless private deployment is negotiated.

SLA / private-link. Enterprise contracts to 99.9% monthly uptime; 99.95% on multi-region. AWS PrivateLink on Enterprise. Azure Private Link on the roadmap.

Air-gap / BYOC. BYOC available; air-gap is custom, not default.

Vendor stability + retention. Series A, disclosed funding above $10M, post-close PANW backing ($100B+ market cap public parent). Upside on stability with a vendor-coupling consideration. Retention tier economics aren’t as transparently published, negotiate the storage line item explicitly.

Where it falls short.

  • PANW acquisition is a procurement variable. Add assignment-and-novation with a termination-without-penalty trigger if post-close terms degrade.
  • Four-tier RBAC is the deepest native; deeper org charts flatten into metadata.
  • Air-gap is custom, not default.

Pricing. Free tier with 10K requests/day. Pro starts at $99/month. Enterprise is custom with SOC 2 Type II, ISO 27001, BAA, BYOC.

**Score: 6 / 7 axes.


3. Kong AI Gateway: Best for FedRAMP-aligned federal procurement

**Verdict.Weakness: the AI Proxy plugin is newer than rate-limiting and the AI-native compliance catalog is plugin-driven.

Attestation. SOC 2 Type II attested for Kong Konnect. ISO 27001 on the list. Self-hosted plane is the customer’s audit scope, mitigated by Kong’s reference architecture.

** Mature DPA. Konnect sub-processor list published. BAA on request.The procurement path is “extend the existing Kong ATO to include the AI Proxy plugin.”

RBAC + SSO + SCIM. Consumer-and-workspace-shaped RBAC with tag-based scoping. Three-plus levels configurable but heavier than Portkey’s native four-tier. SAML SSO via OIDC and JWT plugins. SCIM via Konnect.

Data residency. Self-hosted Kong runs anywhere; region pinning is the customer’s choice. Konnect supports multi-region.

SLA / private-link. Konnect Enterprise contracts to 99.95% monthly uptime. Self-hosted inherits the customer’s infrastructure. PrivateLink, Azure Private Link, VPC peering all standard.

Air-gap / BYOC. Self-hosted Kong is the reference air-gap deployment in this cohort, deployed inside federal enclaves for years.

Vendor stability + retention. Series E, funding above $200M, with a public-market path. Retention runs through request-logging plugins to the customer’s SIEM (Splunk, ELK, Datadog) or S3, the customer’s existing records-retention schedule applies directly.

Where it falls short.

  • AI observability is plugin-driven; default dashboard is REST-shaped, and the chargeback view finance wants takes two to four weeks of platform-team time.
  • AI Spend plugin is newer than rate-limiting and still maturing.
  • Plugin stacking is operationally heavy; small platform teams will feel it.
  • No optimizer.

Pricing. Kong open source is free. Kong Konnect starts free. Enterprise plans with SLA and AI Proxy support start around $1.5K/month; at 5,000-engineer scale expect a six-figure annual contract.

Score: 5.5 / 7 axes. Partial credit on AI-native compliance catalog depth.


4. TrueFoundry: Best for single-vendor MSA across the AI stack

Verdict. TrueFoundry is the pick when procurement wants to consolidate inference, gateway, workspace, and MLOps under one MSA, DPA, and BAA, with VPC-default deployment. Advantage: simplification. Disadvantage: vendor coupling, if any component falls short the whole stack is coupled.

Attestation. SOC 2 Type II attested. ISO 27001 on the list. Retention bundled across gateway, model serving, workspace under one platform-wide policy.

** Mature DPA aligned to current EU SCCs. Sub-processor list published. BAA on request.

RBAC + SSO + SCIM. Workspace + project + role: three levels native, fourth via metadata. SAML SSO across major IdPs. SCIM supported. The MLOps-shaped hierarchy maps to model deployments and experiment tracking, an advantage if the same team will stand up internal models alongside Anthropic.

Data residency. VPC-default across AWS, Azure, GCP. Region pinning is the customer’s choice.

SLA / private-link. Enterprise contracts to 99.9% monthly uptime. VPC peering and PrivateLink standard. Multi-region active-active is the customer’s SRE responsibility.

Air-gap / BYOC. VPC-default. Air-gap supported via the same VPC pattern with customer-controlled egress.

Vendor stability + retention. Series A, disclosed funding above $20M, growing enterprise customer base. Retention configurable up to seven years with S3 export.

Where it falls short.

  • Claude Code integration is general-purpose, not tuned. Per-session dense views require custom work.
  • Vendor coupling: if inference or MLOps falls short, the consolidation advantage becomes a coupling disadvantage.
  • No optimizer.
  • Smaller community footprint than Kong’s or Portkey’s.

Pricing. Free trial. Production tier starts in the low four figures per month. Enterprise pricing is bundled; expect a six-figure annual contract at 5,000-engineer scale.

**Score: 5.5 / 7 axes.


5. Cloudflare AI Gateway: Best for existing Cloudflare enterprise customers

Verdict. Cloudflare AI Gateway is the pick when the enterprise already has a Cloudflare MSA covering DDoS, WAF, Workers, and edge security, and procurement wants to extend it rather than onboard a new vendor. Strength: the existing MSA, DPA, and posture review. Weakness: Cloudflare AI Gateway is a Cloudflare-hosted data plane, wrong pick for VPC-only or air-gapped requirements.

Attestation. Cloudflare maintains SOC 2 Type II, ISO 27001, ISO 27018, and a long additional certification list. AI Gateway inherits the enterprise catalog. Retention via Logpush to R2, S3, or a SIEM applies the customer’s records-retention schedule.

** Cloudflare’s DPA is among the most mature in the industry. Sub-processor list published. BAA available.

RBAC + SSO + SCIM. RBAC via Cloudflare Access plus Worker logic, the hierarchy is what the customer writes in TypeScript inside a Worker. SAML SSO via Access. SCIM supported.

Data residency. Data localization suite pins processing to specific regions. Prompt traffic touches Cloudflare’s infrastructure, acceptable for most enterprise requirements, not for VPC-only.

SLA / private-link. Enterprise contracts to a 100% uptime SLA on the edge layer with service credits on missed minutes. AI Gateway inherits at Enterprise. Cloudflare’s data plane is Cloudflare’s infrastructure, so PrivateLink isn’t the deployment model; Magic Transit and the broader networking stack provide private connectivity.

Air-gap / BYOC. Not the deployment model.

Vendor stability + retention. Publicly traded (NYSE: NET) with a $25B+ market cap as of May 2026, strongest in the cohort. Retention is Logpush-driven, applied at the customer’s SIEM.

Where it falls short.

  • Wrong deployment model for VPC-only or air-gap.
  • AI-native dashboards are shallow.
  • No optimizer.
  • Worker model is TypeScript-first; deep RBAC and per-developer chargeback are platform-team work.

Pricing. AI Gateway free at low volume. Workers Paid is $5/month plus per-invocation fees. Enterprise rolls AI Gateway into the broader Cloudflare bundle.

Score: 5 / 7 axes. Partial credit on AI-native depth; full miss on BYOC / air-gap.


Procurement axis matrix

AxisFuture AGIPortkeyKongTrueFoundryCloudflare
SOC 2 Type II / ISO / SOX retentionType II + HIPAA + GDPR + CCPA certified; tiered SOX retentionType II attested + ISO 27001Type II (Konnect) + ISO 27001Type II attested + ISO 27001Type II + ISO 27001 + ISO 27018
GDPR DPA / FedRAMP / BAADPA + BAA; FedRAMP roadmapDPA + BAA; FedRAMP via PANW post-closeDPA + BAA; FedRAMP-aligned reference architectureDPA + BAA; no standalone FedRAMPDPA + BAA; FedRAMP Moderate via CF for Gov
RBAC + SSO + SCIM4-level + delegated; SSO + SCIM4-tier; SSO + SCIMConsumer + workspace + tag; SSO + SCIMWorkspace + project + role; SSO + SCIMWorker-based; Access + SCIM
Data residencyBYOC region of choiceMulti-region + BYOC data planeSelf-hosted region of choiceVPC-defaultData localization suite
SLA / private-link99.9-99.95%; PrivateLink + peering99.9-99.95%; PrivateLink99.95% Konnect99.9%; PrivateLink + peering100% edge SLA
Air-gap / BYOCBYOC default; air-gap referenceBYOC; air-gap customSelf-hosted air-gap standardVPC-default; air-gap supportedNot the model
Vendor stability + retention~$1.9M raised; Apache 2.0 mitigation; tiered retentionSeries A; PANW post-closeSeries E; SIEM-exported retentionSeries A; bundled retentionPublic NYSE:NET; Logpush retention

Decision framework: Choose X if

Choose Future AGI if the priority is BYOC with an Apache 2.0 data layer, AWS Marketplace contract path, SOC 2 Type II + HIPAA + GDPR + CCPA all certified with BAA available, and a feedback loop that produces audit-grade evidence of every policy change. Best for enterprises with an AWS EDP commitment.

Choose Portkey if the priority is a hosted gateway with the mature compliance catalog and you can accept the PANW acquisition as a vendor variable. Negotiate assignment-and-novation carefully.

Best when the platform team is sized to wire the AI Proxy and AI Spend plugins.

Choose TrueFoundry if procurement wants to consolidate the AI stack under one MSA and DPA with VPC-default deployment. Best when the customer is also standing up internal models alongside Anthropic.

Choose Cloudflare AI Gateway if the enterprise already runs Cloudflare as the trusted edge and the threat model accepts a Cloudflare-hosted data plane.


Common procurement mistakes when buying a Claude Code gateway

MistakeWhat goes wrongFix
Treating SOC 2 Type II as binaryA Type II in-progress vendor is disqualified even when mitigations beat a competitor’s attested reportScore on observation period, scope, exceptions, and bridge-letter availability
Missing the BAA on a non-HIPAA pilotRollout expands into a HIPAA subsidiary; the contract has no BAANegotiate BAA-on-request at MSA signature, not at HIPAA-team onboarding
Signing multi-year with no assignment-and-novationVendor is acquired (Helicone, Portkey in 2026); customer has no exitAdd assignment-and-novation with a termination-without-penalty trigger
Picking hosted, then finding the air-gap subsidiary needs a different vendorArchitecture forks; audit reconciliation problem doublesBuy the gateway whose BYOC fits the most-restrictive subsidiary; run hosted as default
Accepting default audit retentionDefault is 30-90 days; SOX requires 7 years; HIPAA requires 6 yearsMap each repo class to a records-retention schedule and negotiate tier economics
Not asking for the sub-processor listDPA lists Anthropic; the vendor also uses AWS, a CDN, log aggregation, analyticsDemand the full sub-processor list with right-to-object language
Treating vendor stability as binaryEarlier-stage vendor with Apache 2.0 data layer is more stable for the customer than a mid-stage proprietary vendorScore stability on the exit path, not on revenue thresholds

How Future AGI closes the loop on the procurement question

Procurement scores on artifacts: MSA, DPA, BAA, SOC 2 report, sub-processor list, architecture diagram. All five gateways above produce those. The artifact procurement doesn’t always ask for at signature but does ask for at audit is the immutable, versioned trail of every policy change, prompt rewrite, and routing-rule update made on the basis of evaluation data.

The other four gateways treat the gateway as the policy enforcement point. Policy is configured by humans; the dashboard tells humans what is happening; the audit log records human-driven changes. The audit artifact is “here are the policy changes the platform team made over the last twelve months.”

Future AGI treats the captured trace as the input to a closed loop. Every Claude Code turn is traced via traceAI (Apache 2.0); scored by fi.evals; low-scoring sessions are clustered; fi.opt.optimizers (six optimizers (RandomSearchOptimizer, BayesianSearchOptimizer Optuna-backed with teacher-inferred few-shot templates and resumable studies, MetaPromptOptimizer, ProTeGi, GEPAOptimizer, PromptWizardOptimizer), all sharing an EarlyStoppingConfig (patience + min_delta + threshold + max_evaluations) and the same unified Evaluator over 60+ FAGI rubrics) rewrite the prompt or routing on the basis of clustered failures; the gateway applies the updated policy; the trace store records the change, the evidence that drove it, and the version diff. The audit artifact is “here are the policy changes the system made on the basis of evaluation data, with the evidence chain that drove each change.” For a SOX auditor the trace store is a single query point; for GDPR lawful-basis review, trace tags carry consent metadata. The Protect guardrail ships with ~65 ms text latency per arXiv 2510.13351, inline policy enforcement doesn’t break Claude Code’s interactive experience.

Apache 2.0 building blocks: traceAI, ai-evaluation, agent-opt (github.com/future-agi). Hosted Agent Command Center adds the failure-cluster view, Protect guardrails, four-level RBAC, SOC 2 Type II + HIPAA + GDPR + CCPA all certified with BAA available, AWS Marketplace, and BYOC deployment.


What we did not include

Helicone. Acquired by Mintlify in March 2026; Mintlify acquired by Stripe in late 2025. The AI gateway product is on an uncertain roadmap inside a documentation-platform-first parent. Planned migration window, not continued procurement.

LiteLLM. The March 24, 2026 PyPI supply-chain compromise (versions 1.82.7 and 1.82.8, exfiltrating SSH keys and cloud credentials per Datadog Security Labs) raises the operational bar beyond what most Fortune 500 committees will accept without a clean post-incident audit.

**OpenRouter.



Sources

  • Anthropic Claude Code documentation, claude.ai/docs/claude-code
  • Future AGI Agent Command Center, futureagi.com/platform/monitor/command-center
  • Future AGI Protect latency benchmarks, arxiv.org/abs/2510.13351 (65 ms text, 107 ms image)
  • Portkey AI gateway, portkey.ai
  • Palo Alto Networks press release on Portkey acquisition (April 30, 2026), paloaltonetworks.com/company/press/2026
  • Kong AI Gateway and AI Proxy plugin, konghq.com/products/kong-ai-gateway
  • TrueFoundry AI Gateway, truefoundry.com/ai-gateway
  • Cloudflare AI Gateway, developers.cloudflare.com/ai-gateway com/lp/government
  • Datadog Security Labs LiteLLM PyPI supply-chain writeup (March 24, 2026), securitylabs.datadoghq.com

Frequently asked questions

Which of these gateways has SOC 2 Type II attested today?
Future AGI, Portkey, Kong Konnect, TrueFoundry, and Cloudflare all ship SOC 2 Type II. Future AGI's [trust page](https://futureagi.com/trust) lists Type II + HIPAA + GDPR + CCPA certified; ISO/IEC 27001 is in active audit. Procurement requiring an ISO 27001 attestation letter today should request the audit timeline.
Which gateway gives me the cleanest air-gap or BYOC story?
Future AGI for BYOC; Kong for self-hosted air-gap. Future AGI's BYOC runs both planes in the customer's account with an Apache 2.0 data layer. Kong has been deployed inside air-gapped federal enclaves for years; the AI Proxy plugin inherits that shape.
Is a BAA available for a HIPAA-covered subsidiary?
All five — Future AGI, Portkey, Kong (Konnect), TrueFoundry, Cloudflare — make a BAA available on request. Negotiate it at MSA signature even on a non-HIPAA pilot; the rollout will eventually reach a covered unit.
What is the right answer for federal civilian or defense contractor procurement?
Federal procurement runs via air-gapped self-host (BYOC); FedRAMP is on the partner roadmap. Future AGI's Apache 2.0 OSS data plane plus BAA covers the regulated VPC; Kong is the established in-VPC air-gap option with deep federal-enclave history. Cloudflare for Government is the alternative for edge-deployed workloads.
How do I handle the 2026 vendor consolidation events at signature?
Add assignment-and-novation language with a termination-without-penalty trigger if the post-close DPA, sub-processor list, or contract entity degrades the customer's posture. The right risk control is contractual, not vendor avoidance.
What is the right audit log retention policy for a SOX-scope repository?
Seven years from creation, applied to the gateway audit log because it is part of the chain of custody. Map each repo to its records-retention schedule (SOX, HIPAA, GDPR records of processing, contractual obligations) and configure tiered storage so the seven-year requirement applies only to in-scope repos.
How is Future AGI different from Portkey for procurement?
Portkey is the polished hosted gateway with the mature catalog (Type II attested, ISO 27001, four-tier RBAC). Future AGI is the BYOC gateway with the Apache 2.0 data layer, AWS Marketplace contract path, HIPAA certified with BAA available, and a closed loop that produces audit-grade evidence of every policy change. Portkey when the priority is a hosted, attested-today catalog; Future AGI when the priority is BYOC, source-available data layer, and Type II aligned with production go-live.
Related Articles
View all
Top 5 Tools for Claude Code Cost Management in 2026
Guides

Five tools for Claude Code cost management in 2026 — four gateways plus the native Anthropic dashboard and a FinOps platform — scored on attribution, chargeback, caps, routing, cache observability, FinOps integration, and audit trail.

NVJK Kartik
NVJK Kartik ·
18 min