DEV Community

JessYT
JessYT

Posted on • Originally published at jessinvestment.com

Claude's Managed Agents Now Run Inside Your Corporate Network

Claude's Managed Agents now run inside your corporate network — sandboxes + MCP tunnels

Claude's Managed Agents now run inside your corporate network — sandboxes + MCP tunnels

At 'Code with Claude' in London, Anthropic shipped two security features for Managed Agents. You can now run Claude agents without your code and internal systems ever leaving your network. It looks like the unlock for enterprise adoption.

  • Self-hosted Sandboxes — public beta
  • MCP Tunnels — research preview
  • Announced 2026.05.19

Why another security feature, now?

Claude Managed Agents have been around since last year. But one thing kept holding them back: "you had to put your code and your DB on Anthropic's infrastructure." That's exactly where compliance teams in finance, public sector, and healthcare couldn't sign off.

Before May 19 (100% external) After May 19 (customer control)
Tool execution Anthropic infra Customer infra / in-network
Files & repos All external Never leave
Private MCP No access Reachable via tunnel
Inbound firewall Exception needed No change

Self-hosted sandboxes — you pick where the tools run

Self-hosted sandboxes are an option that puts the tool execution environment on your own infrastructure. Anthropic still owns orchestration, context management, and recovery logic, but the actual code execution and file reads happen only inside your VMs. It's out in public beta.

Sandbox providers (public beta) — Anthropic → 4 providers:

  • Cloudflare — microVM + zero-trust secrets
  • Daytona — long-running, stateful workloads
  • Modal — sub-second cold start
  • Vercel — VPC peering + ms startup

Self-hosting is also possible.

In other words, "let Anthropic run the agent smartly, but the hands move inside our network" is now possible. Teams that need a compliance sign-off just pick one of four options.

Sandbox & MCP impact — in numbers

  • Run location: Customer (VPC / on-prem)
  • Provider options: 4+ (self-hosting included)
  • MCP Tunnel stage: RP (research preview)
  • Inbound ports: 0 (outbound only)

MCP tunnels are still a research preview, so you have to request access separately. Stage aside, both share the same design: "don't open any inbound ports, use an encrypted outbound channel only." It's a structure security teams can accept easily.

Now you can reach private MCP servers

Until now, MCP could practically only connect to servers sitting on the public internet. Internal wikis, in-house Jira, internal DBs — all blocked. MCP tunnels flip that.

How it works:

  • Stand up one lightweight gateway inside your network — single outbound encrypted connection only
  • Anthropic's infra reaches in only through that gateway — no inbound firewall rule needed
  • Managed per workspace from the Claude Console — org admin toggles it
  • Not GA yet — access request required (research preview state)

How regulated teams will read this

This looks like the first announcement that lets finance, gaming, and enterprise teams blocked by a "no code leaves the building" policy actually put a Managed Agents pilot up for internal approval.

  1. Rule 1 — Sensitive data stays in the sandbox, only external APIs go to Anthropic. The data boundary is enforced in code.
  2. Rule 2 — MCP tunnels are waiting on GA. In the meantime, even running a sandbox-only PoC is worthwhile.

"Orchestration on Anthropic, the hands inside our network. A design enterprises can accept easily."
— Eddy · announcement notes

The real takeaway is "now there's a picture compliance teams can actually sign off on." How fast it reaches GA is the next thing to watch.

Sources & References

Official announcement

Coverage

Disclaimer: A summary of an external announcement. Not a hands-on review. No ads, no affiliates.


Original with full infographics and visual structure: https://jessinvestment.com/claudes-managed-agents-now-run-inside-your-corporate-network/

Top comments (0)