Skip to main contentTrustGate is designed to be provider-agnostic. It sits in front of the AI surfaces you already use, and feeds the security tooling you already run.
LLM providers
Use TrustGate with any major provider — through native APIs or transparent proxy mode.
- OpenAI (including Azure OpenAI), Anthropic, Google (Gemini / Vertex), Mistral, Cohere, AWS Bedrock.
- Open-source and self-hosted models behind gateways that expose an OpenAI-compatible API.
- Internal or fine-tuned models exposed via HTTP or gRPC.
- Agent frameworks that call LLMs and tools — LangChain, LlamaIndex, Semantic Kernel, AutoGen, CrewAI.
- Retrieval stacks with vector stores, knowledge bases, and RAG pipelines.
- Internal AI platforms that expose their own chat or completion APIs.
APIs & gateways
- Put TrustGate behind an existing API gateway (for example Kong, Apigee, AWS API Gateway) to add AI-aware controls.
- Or put TrustGate in front, for new AI-only routes where you want TrustGate to own routing, auth, and enforcement.
TrustGate understands MCP natively, but at the Runtime Security layer — not via the AI Gateway. The AI Gateway carries the LLM request/response (which contains the tools[] definitions and tool_calls the model produces); the Runtime Security plugins inspect those payloads to:
- Restrict which tools each route or identity may call.
- Validate tool arguments against a schema.
- Apply rate and budget limits per tool and per conversation.
MCP servers themselves are not routed through the AI Gateway; agents continue to talk to their MCP servers directly. See Agent & MCP security for the controls.
Observability & SIEM
- Logs and events stream out as JSON over HTTP, file, or message bus.
- OpenTelemetry traces and metrics are supported end-to-end.
- Native SIEM connectors for Splunk, Elastic (ELK), IBM QRadar, Microsoft Sentinel, and Datadog — so AI detections can be correlated with identity, network, and application telemetry. See SIEM Integration.
Identity
- SSO and SCIM for admin access.
- Request-level identity is carried through as metadata on every event — so policies and logs can reason about users, apps, and tenants.