# Chainguard - Marketing Research Report

Generated on: April 7, 2026
**Industry:** Cybersecurity
**Website:** https://www.chainguard.dev

## The Takeaway

Chainguard's moat is regulatory lock-in disguised as technical purity—zero-CVE distroless images become non-negotiable for compliance-obsessed enterprises at scale.

---

# Company Research

## Company Summary

Chainguard is a cybersecurity company that provides hardened, minimal container images and secure software supply chain solutions to eliminate known vulnerabilities [1]

**Founded:** Founded in 2021 [5]

**Founders:** Founded by a team of world-class engineers [5]

**Employees:** Over 150 employees as of 2024 [3]

**Headquarters:** United States [5]

**Funding:** Raised $612M total funding with current valuation of $3.5B, up from $1.1B a year ago [1][3]

**Mission:** Chainguard is on a mission to be the safe source for open source software [5]

**Strengths:** The company's strengths rely on the combination of SLSA L3-compliant secure infrastructure, comprehensive zero-CVE container images, and proven enterprise adoption by Fortune 500 companies. [7][17]

• **Minimal Attack Surface**: Delivers distroless container images based on Wolfi Linux undistro specifically built for supply chain security [9]
• **Comprehensive Security Coverage**: Provides SLSA L3-compliant infrastructure that prevents malicious code from entering codebases [7]
• **Enterprise Trust**: Serves over 500 enterprises including Fortune 500 companies like Snowflake, Canva, and Hewlett Packard Enterprise [13][17]
• **Zero-CVE Promise**: Offers best-in-class SLA for CVE remediation with continuous rebuilding from secure environments [4][7]

## Business Model Analysis

### 🚨 Problem

****Software supply chain attacks and container vulnerabilities pose critical security risks to modern cloud applications** [4]**

• Open source software contains known vulnerabilities that can be exploited by attackers [4]
• Traditional container images have large attack surfaces with unnecessary components [9]
• Malicious code can enter enterprise codebases through compromised dependencies [7]
• Container security lifecycle management is complex and fragmented across multiple tools [10]
• Companies lack end-to-end integrity assurance for their software supply chains [4]

### 💡 Solution

****Chainguard provides hardened, minimal container images and comprehensive supply chain security tools built on Wolfi Linux** [4][9]**

• Chainguard Containers offer distroless, zero-CVE container images continuously rebuilt from secure environments [4][7]
• Chainguard Libraries provide malware-resistant language libraries to protect against supply chain attacks [7]
• SLSA L3-compliant infrastructure ensures minimal attack surface and prevents malicious code injection [7]
• Wolfi-based undistro specifically designed to address software supply chain security issues [9]
• Comprehensive catalog includes CUDA images for AI/ML development and FIPS-compliant options [15][19]

### ⭐ Unique Value Proposition

****Only provider offering zero-CVE container images with SLSA L3 compliance and best-in-class CVE remediation SLA** [7][4]**

• Built Wolfi Linux undistro specifically for container security, unlike traditional Linux distributions [9]
• Provides end-to-end software supply chain integrity with continuous secure rebuilding [4]
• Offers customizable minimal images that eliminate unnecessary attack surface components [6]
• Delivers comprehensive security coverage from development to production with integrated toolchain [7]

### 👥 Customer Segments

****Serves Fortune 500 enterprises and global industry leaders requiring secure cloud-native applications** [17]**

• Large enterprises with complex cloud infrastructure including Snowflake, Canva, and Hewlett Packard Enterprise [13][17]
• Financial institutions like ANZ Bank requiring FIPS compliance and regulatory security standards [3][19]
• Technology companies including GitLab, Fortinet, and OpenAI building secure software products [13][14]
• Defense and security contractors like Anduril requiring highest security standards [13][17]
• AI/ML companies needing secure CUDA-enabled container environments [15]

### 🏢 Existing Alternatives

****Competes with established container security providers and vulnerability management platforms** [10]**

• Snyk: Developer-focused security platform ranked #5 with 8.1 average rating and 4.3% mindshare [12]
• Aqua Security: Provides comprehensive container security lifecycle coverage [10]
• Traditional Linux distributions that lack purpose-built supply chain security features [9]
• Docker Hub and other public container registries with standard vulnerability scanning [10]
• Internal security teams building custom container hardening solutions [10]

### 📊 Key Metrics

****Over 500 enterprise customers with $3.5B valuation and 7.0 average customer satisfaction rating** [13][1][12]**

• Customer base: Over 500 enterprises including multiple Fortune 500 companies [13]
• Valuation: $3.5B current valuation, up from $1.1B one year ago representing 218% growth [1][3]
• Total funding: $612M raised across multiple funding rounds [1]
• Market position: Ranked #33 in container security with 1.2% mindshare [12]
• Employee growth: Over 150 employees as of 2024 [3]

### 🎯 High-Level Product Concepts

****Comprehensive security platform spanning containers, libraries, VMs, and CI/CD workflows** [7][8]**

• Chainguard Containers: Zero-CVE distroless container images with customization options [7][8]
• Chainguard Libraries: Malware-resistant language libraries for secure dependencies [7]
• Chainguard VMs: Secure virtual machine images for cloud deployments [8]
• Chainguard Actions: Trusted CI/CD workflows for developers and AI coding agents [8][14]
• Chainguard OS Packages: Secure operating system packages built on Wolfi [8]

### 📢 Channels

****Direct enterprise sales supported by educational content and developer community engagement** [6][20]**

• Direct sales to Fortune 500 enterprises and global industry leaders [17]
• Chainguard Academy providing educational resources and technical documentation [6]
• Customer success stories and case studies featuring major clients like Snowflake [20]
• Developer-focused content marketing through technical blogs and security research [5]
• Integration partnerships with major cloud providers and security platforms [15]

### 🚀 Early Adopters

****Security-conscious technology companies and cloud-native enterprises prioritizing supply chain security** [17]**

• Fortune 500 enterprises with complex cloud infrastructure and strict security requirements [17]
• Technology companies building secure software products like GitLab and Wiz [3][17]
• Financial institutions requiring regulatory compliance and FIPS-certified solutions [3][19]
• AI/ML companies needing secure container environments for sensitive workloads [15]

### 💰 Fees

****Enterprise pricing model with customizable packages based on usage and security requirements** [19]**

• FIPS-compliant images available for regulated industries requiring certification [19]
• Custom image packages allowing addition of specific components to base images [19]
• Enterprise SLA agreements with guaranteed CVE remediation timelines [7]
• Volume pricing available for large-scale container deployments across multiple environments [19]
• Professional services for migration and implementation support [19]

### 💵 Revenue

****Subscription-based revenue from enterprise container image licensing and security services** [7]**

• Container image subscriptions providing access to continuously updated zero-CVE images [7]
• Professional services revenue from migration and implementation consulting [19]
• Enterprise support contracts with guaranteed SLA for security updates [7]
• Custom image development services for specialized enterprise requirements [19]
• Training and certification programs through Chainguard Academy [6]

### 📅 History

****Founded in 2021 by world-class engineers, achieved rapid growth to $3.5B valuation** [5][1]**

• 2021: Company founded by team of world-class engineers with mission to secure open source [5]
• 2022-2023: Early product development and initial enterprise customer acquisition [5]
• 2024: Reached over 150 customers and 150+ employees [3]
• 2024: Introduced Chainguard Actions for CI/CD security and AI coding agents [14]
• 2025: Secured $356M Series C funding at $3.5B valuation, up from $1.1B [3]
• 2025: Added CUDA images for AI/ML workloads and expanded Fortune 500 customer base [15]

### 🤝 Recent Big Deals

****Secured $356M Series C funding and expanded partnerships with major technology leaders** [3]**

• Raised $356M Series C at $3.5B valuation from investors including IVP, Lightspeed, and Redpoint [1][3]
• Added major customers including OpenAI, demonstrating traction in AI/ML market [14]
• Expanded product portfolio with Chainguard Actions for trusted CI/CD workflows [14]
• Introduced NVIDIA CUDA images supporting AI/ML development requirements [15]

### ℹ️ Other Important Factors

****Built proprietary Wolfi Linux undistro and maintains SLSA L3 compliance for enterprise security** [9][7]**

• Developed Wolfi Linux undistro specifically for addressing container supply chain security [9]
• Maintains SLSA (Supply Chain Levels for Software Artifacts) Level 3 compliance [7]
• Focuses on zero-trust security model with continuous vulnerability monitoring and patching [4]
• Positioned to benefit from increasing enterprise focus on software supply chain security [15]

---

# ICP Analysis

## Ideal Customer Profile

**Fortune 500 enterprises** with complex cloud-native infrastructure and dedicated DevSecOps teams prioritizing supply chain security over cost considerations [13] [17]. These organizations have **regulatory compliance requirements** such as FIPS certification and operate distributed systems requiring zero-CVE guarantees [19] [7].

**AI/ML companies** and technology leaders with sophisticated engineering teams capable of implementing advanced container security measures represent high-value segments [14] [15]. They value **SLSA L3-compliant infrastructure** and continuous security updates over traditional cost-focused procurement decisions [7].

## ICP Identification Framework

| No. | Question | Answer | References |
|-----|----------|--------|------------|
| 1 | Which of our current customers makes the most out of our products and services? Who uses it the most? Who are your best users? | Best customers are **Fortune 500 enterprises** with complex cloud infrastructure including **Snowflake, Canva, and Hewlett Packard Enterprise** [13] [17]. These companies have **distributed development teams** requiring secure container images and **strict regulatory compliance** needs [3] [19]. **AI/ML companies** like OpenAI also heavily utilize CUDA-enabled secure containers for sensitive workloads [14] [15]. | [13], [17], [3], [19], [14], [15] |
| 2 | What traits do those great customers have in common? | Common traits include **security-first culture** with dedicated DevSecOps teams and **cloud-native infrastructure** [17] [20]. They typically have **regulatory compliance requirements** such as FIPS certification needs [19] and operate **high-scale distributed systems** requiring zero-CVE guarantees [7]. These customers prioritize **software supply chain security** over cost and have **technical teams capable of implementing advanced security measures** [15] [20]. | [17], [20], [19], [7], [15] |
| 3 | Why do some people decide not to buy or stop using our product? | Primary barriers include **missing specialized images** that complicate service migration processes [19] and **enterprise pricing concerns** for smaller organizations. Some teams prefer **traditional container workflows** and lack dedicated security expertise to implement supply chain hardening [10]. **Limited market awareness** also affects adoption, as Chainguard holds only 1.2% mindshare compared to established competitors like Snyk at 4.3% [12]. | [19], [10], [12] |
| 4 | Who is easiest to sell more to, and why? | Easiest expansion comes from **existing enterprise customers** adding more container types and **growing tech companies** scaling their cloud infrastructure [13] [17]. **AI/ML companies** represent high-value expansion opportunities with CUDA image adoption [15]. Current customers already understand the **zero-CVE value proposition** and have **established security budgets** for supply chain protection [7] [20]. | [13], [17], [15], [7], [20] |
| 5 | What do our competitors' best customers have in common? | Competitor customers often prefer **developer-integrated workflows** (Snyk) focusing on code-level security [10] or **comprehensive lifecycle coverage** (Aqua Security) spanning multiple security phases [10]. However, **customer satisfaction data** shows Chainguard meets business needs better than Snyk despite lower market ranking [11]. Opportunity exists with **enterprises frustrated by fragmented security tools** seeking unified supply chain protection [10] [12]. | [10], [11], [12] |

## Target Segmentation

### 🥇 Primary Fortune 500 Enterprise Technology Leaders

**Industry:** Technology, Financial Services, Defense

**Company Size:** 10,000+ employees, $1B+ revenue

**Key Characteristics:** • **Security-first culture**: Dedicated DevSecOps teams with established security budgets and compliance requirements
• **Cloud-native infrastructure**: Complex distributed systems requiring zero-CVE guarantees and SLSA L3 compliance
• **Regulatory obligations**: FIPS certification needs and strict supply chain security mandates

**Rationale:** Why Primary: Highest revenue potential with proven adoption by customers like Snowflake and HPE.

### 🥈 Secondary High-Growth AI/ML Companies

**Industry:** Artificial Intelligence, Machine Learning, Data Science

**Company Size:** 100-5,000 employees, $10M-500M revenue

**Key Characteristics:** • **CUDA workload requirements**: Need secure container environments for sensitive AI/ML model training and deployment
• **Rapid scaling needs**: Fast-growing infrastructure requiring enterprise-grade security from early stages
• **Technical sophistication**: Engineering teams capable of implementing advanced container security measures

**Rationale:** Why Secondary: Strong expansion opportunity with specialized CUDA images driving premium value.

### 🥉 Tertiary Mid-Market Financial Institutions

**Industry:** Banking, Insurance, Fintech

**Company Size:** 500-10,000 employees, $50M-1B revenue

**Key Characteristics:** • **Regulatory compliance focus**: FIPS and SOC 2 requirements with audit trail needs for container security
• **Risk-averse culture**: Prefer proven security solutions over cost optimization for critical infrastructure
• **Legacy modernization**: Transitioning from traditional security models to cloud-native supply chain protection

**Rationale:** Why Tertiary: Future growth opportunity as regulations tighten around software supply chain security.

## Target Personas

### Persona 1: Marcus, The Enterprise Security Architect

*Segment: 🥇 Primary*

**Demographics:**

- Name: **Marcus, The Enterprise Security Architect**
- Age: **👤 Age**: 35-45
- Job Title: **💼 Job Title/Role**: VP Security Architecture, Principal Security Engineer, CISO
- Industry: **🏢 Industry**: Technology, Financial Services, Defense
- Company Size: **👥 Company Size**: 10,000+ employees
- Education: **🎓 Education Degree**: Master's in Computer Science or Cybersecurity
- Location: **📍 Location**: Major metropolitan areas (SF, NYC, Seattle)
- Years of Experience: **⏱️ Years of Experience**: 12-20 years

**💭 Motivation:**

Responsible for securing enterprise infrastructure against **supply chain attacks** while maintaining developer velocity. Frustrated by fragmented security tools requiring **multiple vendor relationships** and compliance overhead. Must demonstrate **measurable risk reduction** to executive stakeholders.

**🎯 Goals:**

- Achieve zero-CVE container deployment across all production environments
- Maintain SLSA L3 compliance for regulatory audit requirements
- Reduce security tool sprawl by 40% through consolidated platforms

**😤 Pain Points:**

- Managing multiple security vendors creates complexity and cost overhead
- Traditional container images have large attack surfaces with unknown vulnerabilities
- Proving ROI of security investments to cost-conscious executive leadership

### Persona 2: Priya, The AI Platform Engineering Lead

*Segment: 🥈 Secondary*

**Demographics:**

- Name: **Priya, The AI Platform Engineering Lead**
- Age: **👤 Age**: 28-38
- Job Title: **💼 Job Title/Role**: Staff ML Engineer, AI Platform Lead, Principal Engineer
- Industry: **🏢 Industry**: Artificial Intelligence, Machine Learning, Data Science
- Company Size: **👥 Company Size**: 100-5,000 employees
- Education: **🎓 Education Degree**: PhD in Computer Science or Machine Learning
- Location: **📍 Location**: Tech hubs (Silicon Valley, Boston, Austin)
- Years of Experience: **⏱️ Years of Experience**: 8-15 years

**💭 Motivation:**

Building secure AI/ML infrastructure that scales with **rapid company growth** and sensitive model development. Needs **CUDA-enabled containers** that don't compromise security. Under pressure to maintain **competitive AI deployment speed** while ensuring data protection.

**🎯 Goals:**

- Deploy secure CUDA containers for model training and inference workloads
- Scale AI infrastructure from prototype to production without security debt
- Maintain sub-1-minute model deployment times with zero security incidents

**😤 Pain Points:**

- Standard container images lack specialized AI/ML security requirements
- Balancing rapid AI development cycles with enterprise security standards
- Limited security expertise within fast-growing engineering teams

### Persona 3: David, The FinTech Compliance Officer

*Segment: 🥉 Tertiary*

**Demographics:**

- Name: **David, The FinTech Compliance Officer**
- Age: **👤 Age**: 40-50
- Job Title: **💼 Job Title/Role**: Chief Compliance Officer, VP Risk Management, Security Compliance Lead
- Industry: **🏢 Industry**: Banking, Insurance, Financial Technology
- Company Size: **👥 Company Size**: 500-10,000 employees
- Education: **🎓 Education Degree**: MBA with Information Systems focus
- Location: **📍 Location**: Financial centers (NYC, Charlotte, Chicago)
- Years of Experience: **⏱️ Years of Experience**: 15-25 years

**💭 Motivation:**

Ensuring financial services meet **FIPS compliance** and regulatory requirements while modernizing legacy systems. Must balance **risk management** with innovation pressure. Needs audit-ready documentation and **proven security frameworks** for examiner scrutiny.

**🎯 Goals:**

- Achieve FIPS 140-2 certification for all containerized financial applications
- Pass regulatory audits with zero critical security findings
- Modernize legacy infrastructure while maintaining strict compliance standards

**😤 Pain Points:**

- Regulatory requirements evolving faster than security solution capabilities
- Difficulty finding FIPS-compliant container solutions for cloud migration
- Balancing innovation speed with conservative risk management culture

---

# Positioning & Messaging

## Positioning Statement

**Chainguard** is a **software supply chain security platform** for **Fortune 500 enterprises** that **eliminates container vulnerabilities and ensures compliance** with **zero-CVE distroless images built on SLSA L3-compliant infrastructure**

## Positioning Framework

### 1. Needs and Pain Points

What are their customer's needs and pain points around the problem the product is trying to solve?

• Supply chain attacks threaten enterprise cloud applications with malicious code injection [4]
• Traditional container images contain large attack surfaces with known vulnerabilities [9]
• Fragmented security tools create complexity and vendor management overhead [10]
• Regulatory compliance requires FIPS certification and audit-ready documentation [19]
• AI/ML workloads need specialized CUDA containers without compromising security [15]

### 2. Product Features

What product features will address these needs and solve these pain points?

• Zero-CVE distroless container images continuously rebuilt from secure environments [4] [7]
• SLSA L3-compliant infrastructure prevents malicious code from entering codebases [7]
• Wolfi Linux undistro specifically designed for software supply chain security [9]
• FIPS-compliant images for regulated industries with customization options [19]
• CUDA-enabled containers for secure AI/ML workloads [15]

### 3. Key Benefits

What are the key benefits (rational and emotional) of those product features?

• Eliminates known vulnerabilities with minimal attack surface protection [4] [6]
• Reduces security tool sprawl through comprehensive supply chain coverage [7]
• Ensures end-to-end software integrity with continuous security updates [4]
• Accelerates compliance audits with pre-certified FIPS standards [19]
• Enables secure AI innovation without sacrificing deployment speed [15]

### 4. Benefit Pillars

Which of those benefits would be categorized as benefit pillars?

🛡️ Zero-Vulnerability Foundation, 🚀 Enterprise-Ready Compliance, ⚡ Secure Innovation Velocity

### 5. Emotional Benefits

What emotional benefits would the user have when they engage with or use the product?

Core Emotional Promise:
Confidence that your cloud infrastructure is fundamentally secure from supply chain attacks [5] [20]

Supporting Emotions:
• Peace of mind knowing zero-CVE guarantees protect against unknown threats [7]
• Professional confidence in demonstrating measurable risk reduction to executives [11]
• Relief from eliminating complex multi-vendor security tool management [10]

### 6. Positioning Statement

What are some positioning statements that could reflect its key benefits, product features, and value?

Chainguard is a software supply chain security platform for Fortune 500 enterprises that eliminates container vulnerabilities and ensures compliance with zero-CVE distroless images built on SLSA L3-compliant infrastructure

### 7. Competitive Differentiation

How do they differentiate from other competitors?

Only provider offering purpose-built Wolfi Linux undistro with zero-CVE guarantees and SLSA L3 compliance for enterprise supply chain security [9] [7]

vs. Snyk: Chainguard provides comprehensive container security vs. developer-focused code scanning [10] [11]
vs. Aqua Security: Built-from-ground-up security foundation vs. layered lifecycle tools [10]
vs. Docker Hub: Zero-CVE continuously rebuilt images vs. standard vulnerability scanning [4]

Key Differentiators:
• Purpose-built Wolfi undistro eliminates traditional Linux distribution bloat [9]
• End-to-end SLSA L3 compliance with measurable supply chain integrity [7]
• Proven enterprise adoption by Fortune 500 companies like Snowflake and HPE [13]

## Messaging Guide

| # | Type | Message | Priority |
|---|------|---------|----------|
| 1 | 🎯 Top-Line Message | The only container security platform built from the ground up to eliminate supply chain attacks with zero-CVE guarantees and enterprise-grade compliance [5] [7] | Primary |
| 2 | 🛡️ Zero-Vulnerability Foundation | Eliminate known vulnerabilities before they enter your infrastructure with continuously rebuilt distroless containers [4] | High |
| 3 | 🛡️ Zero-Vulnerability Foundation | Built on Wolfi Linux undistro specifically designed to minimize attack surface and prevent supply chain compromises [9] | High |
| 4 | 🛡️ Zero-Vulnerability Foundation | SLSA L3-compliant infrastructure ensures end-to-end software integrity from development to production [7] | Medium |
| 5 | 🚀 Enterprise-Ready Compliance | FIPS-compliant container images accelerate regulatory audits and meet strict financial services requirements [19] | High |
| 6 | 🚀 Enterprise-Ready Compliance | Trusted by Fortune 500 companies including Snowflake, Canva, and Hewlett Packard Enterprise for mission-critical workloads [13] | High |
| 7 | 🚀 Enterprise-Ready Compliance | Best-in-class SLA for CVE remediation with enterprise support contracts and audit-ready documentation [7] | Medium |
| 8 | ⚡ Secure Innovation Velocity | Enable secure AI/ML development with CUDA-enabled containers that don't compromise on security standards [15] | High |
| 9 | ⚡ Secure Innovation Velocity | Reduce security tool sprawl by 40% through comprehensive supply chain protection in a single platform [7] | High |
| 10 | ⚡ Secure Innovation Velocity | Deploy with confidence knowing your containers are continuously updated and maintained by security experts [4] | Medium |
| 11 | ⚡ Secure Innovation Velocity | Scale from startup to enterprise without accumulating security debt through proven container foundation [20] | Medium |

---

# References

[1] Chainguard - 2026 Company Profile, Team, Funding & Competitors - Tracxn
   https://tracxn.com/d/companies/chainguard/__lB37xu-JClvYpaTJjeBG6lsnDteO4IwuYq-yf1A2Geg

[2] Chainguard 2026 Company Profile: Valuation, Funding & Investors | PitchBook
   https://pitchbook.com/profiles/company/484806-52

[3] Cybersecurity startup Chainguard lands $356M at $3.5B valuation, up from $1.1B a year ago – GeekWire
   https://www.geekwire.com/2025/cybersecurity-startup-chainguard-lands-356m-now-valued-at-3-5b/

[4] Chainguard - Crunchbase Company Profile & Funding
   https://www.crunchbase.com/organization/chainguard

[5] About: The team, customers, and investors building the future
   https://www.chainguard.dev/about-us

[6] Overview of Chainguard Containers — Chainguard Academy
   https://edu.chainguard.dev/chainguard/chainguard-images/overview/

[7] The trusted source for open source | Chainguard
   https://www.chainguard.dev

[8] Chainguard Images
   https://images.chainguard.dev/

[9] Chainguard Containers FAQs — Chainguard Academy
   https://edu.chainguard.dev/chainguard/chainguard-images/faq/

[10] Best 5 Chainguard Alternatives for 2026 | Echo
   https://www.echo.ai/blog/best-5-chainguard-alternatives-for-2026

[11] Compare Chainguard vs. Snyk | G2
   https://www.g2.com/compare/chainguard-vs-snyk

[12] Chainguard Containers vs Snyk comparison
   https://www.peerspot.com/products/comparisons/chainguard-containers_vs_snyk

[13] Chainguard | LinkedIn
   https://www.linkedin.com/company/chainguard-dev

[14] Introducing Chainguard Actions: Trusted CI/CD Workflows for Developers and AI Coding Agents
   https://www.prnewswire.com/news-releases/introducing-chainguard-actions-trusted-cicd-workflows-for-developers-and-ai-coding-agents-302715401.html

[15] Welcome, Chainguard! | Salesforce Ventures
   https://salesforceventures.com/perspectives/welcome-chainguard/

[16] Chainguard - Products, Competitors, Financials, Employees, Headquarters Locations
   https://www.cbinsights.com/company/chainguard

[17] Working at Chainguard | Great Place To Work®
   https://www.greatplacetowork.com/certified-company/7086906

[18] 39 Chainguard Customer Reviews & References | FeaturedCustomers
   https://www.featuredcustomers.com/vendor/chainguard

[19] Chainguard Reviews 2026: Details, Pricing, & Features | G2
   https://www.g2.com/products/chainguard/reviews

[20] Customers | Chainguard
   https://www.chainguard.dev/customers

