Skip to content

Industry Standard – CaaS Services for Public Administration

CaaS (Container as a Service) provides the Public Administration with a Kubernetes-based platform for container delivery.

The Kubernetes open-source system handles large workloads and simplifies the transformation of applications according to cloud-native logic. 

CaaS optimises the work of IT departments by making application deployments almost instantaneous. 

Polo Strategico Nazionale has implemented 2 CaaS services

  • CaaS Licensed based on VMware Tanzu 
  • CaaS Open Source based on Red Hat Openshift Container Platform


Let us take a look at their technical and operational characteristics. 


CaaS Licensed

CaaS Licensed Tanzu is a cloud service based on the VMware IaaS technology stack with the native integration of two further components:

  • Tanzu Kubernetes Grid (TKG)
  • Cloud Director Container Service Extension (CSE) 

VMware Tanzu Kubernetes Grid (TKG) is the VMware CaaS solution for Enterprise environments that facilitates the creation and subsequent management of the entire life cycle (LCM) of “upstream” and “fully-conformant” Kubernetes clusters (as per CNCF specifications). TKG simplifies large-scale operations and manages multi-cloud applications in a fast, efficient and integrated manner.

CaaS Open Source

CaaS Open Source is a cloud service based on the Red Hat Openshift Container Platform. This solution allows Administrations to develop and manage cloud-native applications in an environment created to deploy and manage containerized applications in a secure and scalable way. Kubernetes-based container orchestration provides a multi-cloud environment designed to function on multiple infrastructures, including on-premises and public cloud environments.

The integration between Kubernetes and Red Hat makes the experience even more reliable while OpenShift simplifies the process of deploying and scaling containerized applications. The platform is made secure by features such as container image scanning, role-based access control (RBAC) and encryption of sensitive data to ensure application integrity.