Agent Infra

Production infrastructure for AI agents — inside your perimeter.

Pokee Agent Infra is the runtime layer behind every Pokee deployment. Air-gapped, isolated, fully integrated. Deploy on-prem, in your own cloud, or hosted by Pokee.

Built on four principles.

Every Pokee deployment is shaped by the same four commitments. They define what the platform does and, just as importantly, what it refuses to do.

01

Air-gapped

Your data, your models, your network. Nothing leaves your environment.

02

Secure by design

Every agent runs in its own virtual sandbox. Isolated from the host, isolated from other users.

03

Tools, ready on day one

A full library of enterprise integrations comes pre-wired. No plumbing to build.

04

Built for scale

A smart agent harness, production-ready and built to scale. Efficient end to end.

What that means in practice.

Each principle, expanded.

Air-gapped

  • Data stays on your storage, end to end.
  • Runs on Pokee's own model, fully inside your environment — no dependency on any public AI provider.
  • No outbound traffic required to run.
No public egressYour perimeterAgentStorageModel

Secure by design

  • Agents run in a virtual environment, not on the host — no impact on the user's machine.
  • Per-user isolation — each user's workspace and state are private, never visible to others.
  • Persistent when you want it — your workspace and setup carry over between sessions, ready to pick up where you left off.
  • Anything an agent installs, downloads, or runs is contained inside its own sandbox.
  • Protected against malicious open-source packages — known threats are blocked before they reach the sandbox.
Host machinestays clean — agent activity never touches itUser AsandboxagentworkspacepackagesprocessesUser BsandboxagentworkspacepackagesprocessesUser CsandboxagentworkspacepackagesprocessesPer-user sandboxes — isolated from host and from each other, yours across sessions

Tools, ready on day one

  • A broad catalog of enterprise tools and integrations available the moment an agent starts.
  • From documents and spreadsheets to search, communications, and internal APIs — the surface area enterprises actually use.
  • No glue code, no per-tool auth setup — agents are productive from the first session.
  • Tools are first-class citizens — same isolation, auditability, and operational discipline as the rest of the platform.
  • Extensible — add your own tools without forking the platform.
DocumentsSpreadsheetsSearchCommunicationsCodeInternal APIs…and more, pre-integrated on day one

Built for scale

  • Production-ready out of the box — built to run real workloads, not just demos.
  • A smart agent harness — every layer tuned for fast, focused work.
  • Scales with your organization, from a handful of users to many.
  • Efficient end to end — designed to do more with less.
InputSmart agent harnessproduction-ready · efficient · scalableContextToolsMemoryCoord.tuned end to endAgent

Architecture.

A single boundary diagram of a Pokee deployment. Customer-controlled components are highlighted; agent activity is contained inside the sandbox boundary.

Your perimeterUserbrowser / IDEPokee Controllerauth · lifecycle · routingAgent Sandboxvirtual, ephemeral, isolatedPre-integrated toolsPer-user workspaceModelPokee · flexibleYour storagedata & workspacesYour identitySSO / tokens
Purple = customer-controlled; dashed = sandbox boundary.

Three footprints. Same product.

Pokee Agent Infra runs where you need it — in your datacenter, in your cloud, or fully managed by Pokee. Pick the footprint that fits your environment.

On-premYour cloudPokee hosted
Where it runsYour datacenterYour cloud accountPokee-managed cloud
DataStays on your storageStays in your accountHeld in Pokee's environment
ModelsPokee model, includedPokee model, includedPokee model, included
NetworkFully air-gappedNetwork-isolatedCloud-isolated, managed by Pokee

Pokee ships with its own model out of the box, with flexible support for additional model options.

What you control.

Pokee Agent Infra is built to slot into the boundaries you already defend. The platform doesn't ask you to relax them.

  • Your data, your network, your identity

    Nothing crosses a boundary you didn't approve.

  • A flexible model layer

    Pokee's own model is included, with support for additional options.

  • Auditable, inspectable, no black boxes

    You can read every line of what we deploy.

Ready to evaluate?