Verify. Secure. Enforce.
Agent and model security from supply chain to runtime
Jozu secures and governs AI for organizations deploying models, agents, and MCP servers. From supply chain verification to runtime policy enforcement and agent isolation — deploy with tamper-proof security, full audit trails, and policy compliance.
Secure AI from supply chain
through runtime
Jozu Hub secures your model supply chain with scanning, signing, and tamper-proof packaging. Jozu Agent Guard governs your agents and MCP servers at runtime with tool-level policy enforcement. Together, they close the gap between development and production.
10x
Faster Model Deployments
41%
Faster AI Delivery
87%
Less Audit Prep Time
245K+
KitOps Downloads
WHY JOZU
The On-Prem
Advantage
Jozu installs behind your firewall — no data leaves your environment and nothing is visible to Jozu. Both Hub and Agent Guard enforce locally with no connectivity dependency, working in air-gapped and DDIL environments while remaining vendor neutral.
Supply Chain Verification
Before Runtime
Every competitor in agent governance starts at runtime. Jozu verifies artifact integrity, scan results, and provenance before anything executes. A compromised model or MCP server is caught at the registry — not after it's running in production.
Built for Air-Gapped
Environments
Policies are distributed through standard OCI registries using the same cryptographic signing as the artifacts they govern. Policy integrity is verifiable locally without a network call.
Central Governance,
Local Enforcement
Agent Guard enforces policy locally on servers, laptops, edge devices, and air-gapped networks. No phone-home to a central control plane. No choosing between failing open and failing closed when connectivity drops.
Fail Closed by Design
Agent Guard denies on missing data or evaluation errors. Guardrail tools that delegate failure behavior to the developer default to fail-open. Jozu doesn't.
KEY CAPABILITIES
Built for Enterprises.
From model supply chain to agent runtime, Jozu gives enterprises everything they need to secure, govern, and deploy AI. Immutable artifacts, automated security scans, tool-level policy enforcement, and cryptographic audit trails ensure your models and agents are fully compliant and accountable — on-prem, in the cloud, or at the edge.
Immutable AI
Packaging
Package models, agents, MCP servers, datasets, and policies as signed OCI artifacts. Store in your enterprise container registry. Deploy locally or to any serving platform.
Five-Layer Security
Scanning
Scan for serialization attacks, data poisoning, backdoored weights, adversarial susceptibility, and prompt injection. Results attached as signed attestations.
10x Faster
Deployments
In-cluster deployment caching eliminates redundant builds. Tested with Llama 3.2 8B: 42.8 seconds vs. standard 425.4 seconds.
AI Bill of Materials
SPDX 3 SBOMs with dependency tracking, training lineage, and license compliance for every artifact. Full provenance from source to production.
Two-Phase Policy
Enforcement
ArtifactPolicy gates deployment. ToolPolicy governs every tool invocation at runtime. Same policy engine, same language, both phases.
Tool-Level Access
Control
Per-tool, per-agent, per-user granularity. Controls which agents call which tools, with what parameters, under what conditions. Fail closed.
Human-in-the-Loop
High-risk actions trigger human confirmation. Destructive operations, financial transactions, and sensitive data access require user approval before execution.
Tamper-Evident
Audit Trails
Every policy decision logged with full context and cryptographically chained. Works disconnected; syncs to Hub when reconnected.
Integrates with the tools your
team already love.
Jozu integrates with the tools your DevOps team already knows and trusts.
-
Kubernetes Distributions
Jozu works with all distributions:- Amazon EKS
- Azure AKS
- Google GKE
- Red Hat OpenShift
- VMware Tanzu
- Rancher RKE
- And many more...
-
Container Registries
Jozu works with all OCI registries:- JFrog Artifactory
- Sonatype Nexus
- Harbor
- Amazon ECR
- GitLab Registry
- Docker Hub
- Any OCI 1.1 registry
-
CI/CD & MLOps Tools
Jozu works with all major pipelines:- Jenkins
- GitLab CI
- GitHub Actions
- MLflow
- Kubeflow
- Databricks
- And 50+ more...
Trusted by Government and
Global Enterprises
Jozu's technology is used by the US government, European government, and global enterprises in every vertical.
We're building a vendor-agnostic MLOps platform and KitOps ModelKits align perfectly with that vision. They work wherever our containers do - on-prem or in the cloud - giving us the freedom to store and deploy ML artifacts without being tied to a specific infrastructure.
Request your free Jozu trial
Interested in testing Jozu in your private environment? Download the Helm Chart, and start your 2-week trial.
-
STEP 1
Install
Jozu Hub can be installed in your environment in just 1-hour, with no disruptions to existing workflows. We suggest taking a baseline measurement of current deployment times and security gaps, to benchmark against.
-
STEP 2
Evaluate
Once installed, you can run real-world tests with your models and infrastructure for up to 2-weeks. This will allow you to measure Jozu's performance against your existing tools and processes.
-
STEP 3
Review
At the end of your 2-week trial our team will work with you to review your results, and help you quantify improvements and ROI. This includes an implementation and roadmap discussion.
An open initiative to unite AI/ML and DevOps teams
The AI/ML space is evolving daily, requiring ongoing innovation from the tools that support its development. At Jozu, we believe that the best solutions come from gathering diverse perspectives to engage in open collaboration. An outcome that open source is uniquely designed to foster.
To support this effort, we are contributing to open source KitOps, which includes Kit CLI and ModelKit files, so ML and DevOps teams can work in a more collaborative way. We’re committed to working alongside the community to make continued investments into KitOps and building a roadmap that meets the needs of individual and enterprise development teams.
KitOps simplifies AI project complexity by packaging your projects dependencies in a single versioned and tamperproof, ModelKit.
How does Jozu Hub integrate with our existing CI/CD pipelines (Jenkins, GitLab CI, GitHub Actions)?
Jozu works with the pipeline tools you already use. The platform integrates with Jenkins, GitLab CI, GitHub Actions, Dagger, and OpenShift pipelines. Models are packaged via the Kit CLI or Python SDK, stored in your existing registry using OCI standards, scanned for security issues, then deployed through your normal ML pipeline automation workflows. Jozu fits into your stack rather than replacing it - you keep your existing tools and authentication while adding security scanning, signed packaging, and attestation-based deployment gates. ModelKit CI/CD operations use standard commands that work in any pipeline environment.
Can we automate model scanning and evaluation in our CI/CD workflows using Jozu Hub?
Yes. Model scanning happens automatically when ModelKits are pushed to Jozu Hub. The platform performs checks for code injection, backdoors, data poisoning, prompt handling, and adversarial attacks. Security scan results are tracked per version, and you can download audit logs for compliance checks. Jozu can block deployments or pulls if SHA digests don't match signatures, ensuring only validated models reach production. This automated validation replaces manual security reviews that slow down deployment cycles.
How do we deploy ModelKits from Jozu Hub through our CI/CD pipeline to Kubernetes?
ModelKit Kubernetes deployment follows a straightforward process: Jozu auto-generates deployment artifacts including inference containers and Kubernetes manifests from your ModelKits. Your CI/CD ML deployment pipeline pulls the signed ModelKit, Jozu validates the SHA digest against the signature, and if validated, deploys to your Kubernetes clusters. Automated model deployment supports any cloud or on-premises Kubernetes distribution.
How does Jozu Hub use OCI artifacts to package ML models and datasets?
Jozu Hub packages models, datasets, codebases, and documentation as OCI Artifacts. Each component becomes a layer in the OCI artifact, enabling efficient storage and transfer since unchanged layers are deduplicated and don't need re-uploading or storage. Jozu’s OCI compliance means ModelKits work with any registry that supports OCI standards. The platform can even add SPDX 3 software bill-of-materials and signed provenance attestations to each package, creating an OCI model registry that maintains full lineage and audit trails while remaining compatible with your existing container infrastructure.
What are the benefits of using OCI standards for ML model management vs traditional approaches?
OCI ML benefits come from leveraging proven container infrastructure rather than building new systems. Unlike Git LFS, OCI provides efficient layer-based storage (unchanged components aren't re-uploaded), built-in versioning through tags and digests, cryptographic verification of content, and native support in Kubernetes. Container standards means your DevOps teams already know the tooling and workflows. Previous approaches scattered models across Git, S3, and experiment trackers - creating audit nightmares and unclear rollback processes. OCI-based ModelKits provide a single artifact with complete provenance that moves through your existing registry and deployment infrastructure.
How does Jozu Agent Guard govern MCP servers?
Agent Guard packages MCP servers as OCI artifacts with cryptographic signatures and attestations. Policies control which agents can call which tools, with what parameters, under what conditions. Your IDE (VS Code, Cursor, Claude Desktop) points to Jozu Hub as its MCP registry for centrally curated, security-scanned servers.
What happens when an agent encounters a policy that blocks it?
The agent is denied. Agent Guard fails closed — missing data or evaluation errors result in denial, not pass-through. For high-risk actions, ToolPolicy triggers human-in-the-loop confirmation. Every decision is logged in the tamper-evident audit trail.
Can Agent Guard work in disconnected or air-gapped environments?
Yes. Policies travel as OCI artifacts alongside the agents they govern and enforce locally with no connectivity to a central controller. Audit logs sync to Hub when connectivity is restored. This is a primary differentiator for defense, edge, and DDIL deployments.