Digital sovereignty has moved from being a slogan to an operational requirement. Regulation, business continuity, and geopolitical pressure are pushing many organizations—especially governments, regulated sectors, and companies with critical data—to reconsider where their workloads are run and who truly controls the “command layer” of their infrastructure. In this context, Nutanix has announced new capabilities in its Nutanix Cloud Platform (NCP) aimed at facilitating the deployment and governance of distributed environments (on-premises, sovereign cloud services, or a combination of both), without losing unified management.
The concept of a “distributed sovereign cloud” proposed by Nutanix is based on a fundamental premise: modern infrastructure no longer resides in a single data center or with one provider. Organizations expand across regions, work with multiple clouds, and at the same time, need to impose clear boundaries on data residency, access control, compliance, and third-party reliance. Nutanix acknowledges that this expansion often brings a practical challenge: more components, increased complexity, and a higher risk of fragmented governance.
Real control in disconnected environments and centralized management “without mandatory SaaS”
One of the most notable points of the announcement is its focus on completely disconnected environments (dark sites / air-gapped), common in defense, industry, energy, or critical infrastructure. Nutanix states that NCP now incorporates orchestrated lifecycle management for multiple dark-site environments and on-premises deployment options for governance and control planes.
In this same vein, the company highlights that Nutanix Central (the management component for distributed cloud) can run in the customer-controlled environments on their own premises. Additionally, Nutanix Data Lens—focused on security, governance of unstructured data, and resilience against ransomware—will also be able to run on-prem, although Nutanix describes this as “coming soon” rather than immediately available.
From a market perspective, the message is clear: if sovereignty demands minimizing external dependencies, the “brain” of the platform shouldn’t necessarily operate as a SaaS outside the customer’s perimeter.
Sovereignty also in hyperscalers: GC2 on AWS and NC2 on Google Cloud (and OVHcloud in Europe)
Nutanix is also emphasizing its partner ecosystem. On one hand, it announces that Governement Cloud Clusters (GC2) on AWS is now available, targeting U.S. federal agencies with a key feature: orchestration remains within the agency’s environment, without external SaaS or shared credentials, so Nutanix clusters can operate entirely within the Amazon VPC.
On the other hand, Nutanix states that Cloud Clusters (NC2) on Google Cloud is now generally available in 17 regions. It also mentions new regions on Microsoft Azure and AWS in the United States to expand options aligned with sovereignty and regional compliance. In Europe, it highlights that NC2 is available on OVHcloud as part of its “secure and trusted cloud” offering, which directly supports European strategies seeking providers with jurisdictional controls within the EU.
Compliance and certifications: SOC 2, ISO family, and CSA STAR
In an era where many infrastructure decisions rely on audit validations, Nutanix accompanies the announcement with a list of certifications. The company states that NC2 on Azure and AWS has completed its annual SOC 2 Type 2 audit and renewed certifications including ISO 27001, 27017, 27018, 27701, and 22301. Furthermore, it indicates that in 2025, NC2 on Azure will obtain its first CSA STAR Level 2 certification.
Beyond the “checklist,” these kinds of seals often serve as common currency for complex purchasing decisions: helping clients compare platforms and justify controls during audits, especially when managing multiple environments and jurisdictions.
Kubernetes and AI: “Governance-ready” hardening, microsegmentation, and LLM metrics
The announcement extends beyond classical infrastructure. Nutanix also strengthens its sovereignty-oriented approach to modern workloads, especially Kubernetes and AI:
- In Nutanix Kubernetes Platform (NKP), the company states that it will include an option for a Ubuntu Pro image validated for FIPS 140-3 and compatible with STIG, noting that it is “in development.”
- It expands VPC-like isolation capabilities, load balancing, and microsegmentation towards containerized workloads, aiming for consistency between VMs and containers.
- In Nutanix Enterprise AI (NAI), Nutanix leverages “government-ready” branches of NVIDIA AI Enterprise to run models with NVIDIA NIM microservices in hardened (STIG) containers with FIPS enabled. It introduces identity enhancements, finer access controls for models, comprehensive logging/monitoring, and new qualified NIM microservices for object detection and data parsing.
For teams operating AI in production, this part of the announcement is significant because it shifts the conversation from “having GPUs and a cluster” to the critical questions: who can access which model, how is usage audited, and how is data governed once AI moves beyond R&D into operational use.
Resilience: Tiered disaster recovery and continued operation through multiple failures
Practically speaking, sovereignty also means ensuring continuity amid failures and dependencies. Nutanix introduces capabilities for tiered disaster recovery (DR), adjusting protection levels per workload, and claims it can maintain operations even in the face of up to three site or region failures. It also integrates multicloud snapshots within this layered approach to bolster cyber-resilience goals.
Additionally, it mentions that Nutanix Data Services for Kubernetes extends synchronous and asynchronous data protection (by tier) to containers, for both block and file data, which is especially relevant for cloud-native and AI-native applications that don’t fit traditional VM-centric DR schemes.
Unified global management: Nutanix Infrastructure Manager and common networking plane
On the operational side, Nutanix introduces Nutanix Infrastructure Manager, an automation tool based on validated design patterns (according to the company) to facilitate deployment and maintenance of data centers. It also adds a unified network control plane offering centralized visibility of VLANs, virtual networks, and microsegmentation policies across on-premises and cloud environments.
Furthermore, Nutanix aims to streamline the management of modern platforms: NKP clusters will automatically register in Prism Central for immediate infrastructure visibility, and NAI will feature a metrics dashboard for LLM activity, including request and token data—helpful for teams managing AI as a service with cost and capacity monitoring.
A broad ecosystem announcement: Customer, partner insights, and the “why now”
Nutanix accompanies the release with voices from clients and partners. Bio-pharmaceutical company LFB highlights using NC2 on OVHcloud for sovereignty and compliance; Inetum presents it as a “sovereign and cost-effective” approach for hybrid projects. IDC describes “distributed sovereign cloud” as an increasing priority; NVIDIA, Intel, and Cisco align their narratives around security, governance, and consistent operation in highly distributed architectures.
Overall, the announcement reflects a growing trend: sovereignty is not achieved through a “full on-premises” approach nor solely via hyperscalers, but through hybrid models where the key factors are who controls the management plane, how audits are conducted, and how continuity is maintained when rules (technical or political) change.
Frequently Asked Questions
What does “distributed sovereign cloud” mean, and how does it differ from traditional hybrid cloud?
A distributed sovereign cloud aims to maintain control and sovereignty boundaries (data, identity, auditing, operations) across multiple environments and regions, including on-premises and sovereign cloud providers, avoiding dependency on a single provider and fragmentation of governance.
Can Nutanix operate in air-gapped (offline) environments with centralized management?
According to Nutanix, NCP includes orchestrated lifecycle management for multiple “dark sites” and options to run control and governance layers in customer-controlled facilities, designed for fully disconnected environments.
What are the differences between NC2 and GC2 within Nutanix’s ecosystem?
Nutanix positions GC2 on AWS as targeting U.S. federal agencies, with orchestration staying within the agency’s environment; NC2 is aimed at deploying Nutanix clusters on public clouds like Google Cloud and European providers like OVHcloud, broadening regional and compliance options.
What benefits do support for STIG/FIPS options in NKP and NAI, and NIM microservices bring to platform teams?
They provide a more “governable” environment for sensitive workloads: hardened standards, finer access controls, auditability, and policy consistency across VMs and containers—especially crucial as AI moves into production, where audit and access controls are paramount.
via: nutanix.com

