AI DevelopmentNew Release13 min readPublished May 19, 2026

Orchestration stays on Anthropic; tool execution moves inside your perimeter — four providers, public beta, opens today.

Sandboxes + MCP Tunnels Land at Code with Claude London

Anthropic opened Code with Claude London with a structural product shift: self-hosted agent sandboxes enter public beta and MCP tunnels enter research preview. Tool execution moves inside your perimeter. The agent loop stays on Anthropic. Four launch partners — Cloudflare, Daytona, Modal, Vercel — with BYO sandbox as a fifth option.

DA
Digital Applied Team
Senior strategists · Published May 19, 2026
PublishedMay 19, 2026
Read time13 min
Sources7 primary
Launch providers
4
Cloudflare / Daytona / Modal / Vercel (+ BYO)
Sandboxes status
Beta
Public beta — open enrollment
MCP tunnels status
Preview
Research preview — by request
Ad-free essay
Feb 4
"Claude will remain ad-free" — reasserted today

Anthropic today launched self-hosted agent sandboxes (public beta) and MCP tunnels (research preview) at Code with Claude London — Anthropic's first dedicated developer event outside the United States. The announcement introduces a new architectural layer for Claude Managed Agents: the agent orchestration loop stays on Anthropic's infrastructure, while tool execution moves inside the customer's own cloud environment.

The timing is deliberate. Code with Claude London opened on the same morning as Google I/O 2026 at Shoreline Amphitheatre. Where Google spent its keynote on consumer-AI products — AI Mode for 1B users, the Spark personal agent, Universal Cart shopping — Anthropic spent its London stage on enterprise developer primitives. Both answers to "what does an AI agent need to do real work" reflect genuinely different bets on where enterprise trust gets earned.

This guide covers what shipped today, how the architecture split works, a provider-by-provider breakdown of the four sandbox partners (Cloudflare, Daytona, Modal, Vercel), how MCP tunnels expose private servers without inbound firewall rules, and the honest gaps still present at launch. Internal links to companion guides on AI transformation, enterprise agent reference architecture, and MCP server security best practices are woven throughout.

Key takeaways
  1. 01
    Self-hosted sandboxes are public beta — open enrollment today.Any Claude Managed Agents customer can enroll. Four launch partners (Cloudflare, Daytona, Modal, Vercel) plus a BYO sandbox option. Tool execution moves to your cloud; the agent loop stays on Anthropic.
  2. 02
    MCP tunnels expose private servers without firewall holes.A lightweight gateway you deploy makes one outbound encrypted connection. No inbound firewall rules. No public endpoints. Agents can reach internal databases, private APIs, knowledge bases, and ticketing systems.
  3. 03
    Four day-one customer references prove the beta is production-grade.Amplitude on Cloudflare, Clay on Daytona, DoorDash on Modal, Rogo on Vercel. These are live production agents in high-volume and regulated environments, not lab tests.
  4. 04
    The "Managed Agents" name collision with Google is the sharpest framing of the week.Google ships Managed Agents API hosted-only inside Google's infra. Anthropic ships Claude Managed Agents hosted-or-self-hosted inside your perimeter. Same product name, opposite architectures, same launch day.
  5. 05
    Three gaps remain at launch — AWS, memory, and GA status.Self-hosted sandboxes are not yet supported on Claude Platform on AWS. Memory is not supported in self-hosted sessions. MCP tunnels remain pre-production. Watch the public beta maturity arc for closure timelines.

01What Launched TodayTwo new primitives for Claude Managed Agents.

Anthropic announced two additions to Claude Managed Agents at Code with Claude London on May 19, 2026. Both ship under the umbrella of "perimeter-first" agent infrastructure — the idea that compliance, security, and data-residency requirements should be solved at the architecture level rather than negotiated case-by-case in enterprise contracts.

Self-hosted sandboxes (public beta)let teams configure Claude Managed Agents to execute tools inside their own cloud environment — Cloudflare, Daytona, Modal, Vercel, or a custom sandbox client the team already operates. The agent loop that handles context management, error recovery, and orchestration continues to run on Anthropic's infrastructure. What moves is tool execution: bash commands, file writes, API calls, code interpretation — any action the agent takes against the outside world now happens inside the customer perimeter.

MCP tunnels (research preview) solve a different problem. Private MCP servers — internal databases, knowledge bases, ticketing systems, proprietary APIs — have historically required either VPN exposure for cross-cloud agents (operationally painful) or a public endpoint with firewall rules (security surface). MCP tunnels replace both options with a single outbound encrypted connection initiated from inside the customer network. No inbound firewall modifications. No public endpoints. Tunnel administration runs through workspace settings in the Claude Console and applies to both Managed Agents and the Messages API.

Public Beta
Self-Hosted Sandboxes
Open enrollment · Cloudflare / Daytona / Modal / Vercel / BYO

Tool execution moves to your cloud. The agent loop stays on Anthropic. Choose from four launch partners or bring your own sandbox client. Day-one customer references: Amplitude, Clay, DoorDash, Rogo.

Available now — Claude Console
Research Preview
MCP Tunnels
By request · Single outbound encrypted connection

Expose private MCP servers without inbound firewall rules. Reach internal databases, private APIs, knowledge bases, and ticketing systems. Applies to Managed Agents and the Messages API.

Access by request — research preview
Coverage snapshot — May 19, 2026
The New Stack, 9to5Mac, Business News Today, and Tech Monitor all reported simultaneously on launch. The clearest architecture framing came from 9to5Mac's coverage: “Both the sandbox where an agent executes tools and the services it reaches run within the established boundaries of your enterprise, under your security and runtime controls.” That single sentence is the product pitch in one line.

02ArchitectureOrchestration stays; tool execution moves.

The central architectural claim from the keynote is precise and worth unpacking carefully. According to Anthropic's product framing as reported by 9to5Mac: “The agent loop that handles orchestration, context management, and error recovery stays on Anthropic's infrastructure, while tool execution moves to your own configured environment.”

This is not "self-host Claude." The model weights, the agent loop, the context window management, and the error-recovery logic all remain on Anthropic's infrastructure. What changes is where the agent's outputs get executed. When Claude decides to run a bash command, write a file, call an API, or invoke a tool — that execution now happens inside the customer's sandbox, governed by the customer's security controls, DLP policies, IAM rules, and audit-log pipeline.

The practical implication for compliance teams is substantial. Before today, enterprise pilot delays of six to twelve weeks were routine at banks, insurers, healthcare providers, and regulated industrials because data-governance and infrastructure teams could not accept tool execution happening inside Anthropic's cloud. The split architecture addresses that objection at the platform level rather than through contractual carve-outs.

For a deeper architectural context — including how this pattern compares to other enterprise agent deployment models — see our enterprise agent platform reference architecture.

Run agents inside your own perimeter, with your security controls applied by default.Digital Applied synthesis, May 19, 2026

03Sandbox ProvidersFour partners, one BYO option — pick your isolation primitive.

Anthropic launched with four named sandbox partners and a BYO (bring-your-own) sandbox path for teams that have already built sandboxing infrastructure in-house. Each partner uses a different isolation primitive, which is the decision input enterprise architects actually need — not just a list of logos.

The four day-one customer references map cleanly to the four launch providers: Amplitude (Design Agent) on Cloudflare, Clay (Sculptor GTM agent) on Daytona, DoorDash (internal productivity agent) on Modal, Rogo (financial-analyst agent) on Vercel, per reporting by Business News Today. These are not lab tests — Amplitude, DoorDash, and Rogo operate in compliance-sensitive environments where exactly this kind of perimeter control was the blockers.

Cloudflare
microVMs with outbound network controls

Isolation via microVMs with fine-grained outbound network controls. Best when egress posture is the dominant constraint — teams that need to whitelist specific external endpoints and block everything else. Day-one customer: Amplitude.

Amplitude ← egress-controlled agents
Daytona
Stateful, pausable workspaces

Workspace VMs with full state retention and pause/resume capability. Best when the agent needs to resume multi-day or multi-week tasks with persistent file state. Day-one customer: Clay.

Clay ← long-running GTM agents
Modal
Container-based with CPU and GPU access

Container-based isolation with configurable CPU and GPU access. Best for compute-intensive tool execution — agents that invoke ML models, run data-processing pipelines, or require accelerator access. Day-one customer: DoorDash.

DoorDash ← GPU-capable tool execution
Vercel
Firecracker microVMs, rapid startup

Firecracker microVMs on Amazon Linux 2023. Rapid startup in custom cloud regions. GA since January 2026 with SOC 2 Type II. Best for DevX-first teams already in the Vercel ecosystem. Day-one customer: Rogo.

Rogo ← financial-analyst agents on Vercel
BYO Sandbox
Bring your own sandbox client

Documented escape hatch for teams that have already built sandboxing infrastructure in-house. Customer-defined isolation primitive, statefulness, and GPU access. Useful for regulated industries with proprietary execution environments.

Custom-regulated envs

Choosing between these five options is primarily a function of three variables: the isolation primitive your security team will approve (microVM vs container vs workspace VM), whether the agent workload requires GPU access or stateful resumption, and which cloud or vendor ecosystem your team already operates in. Teams on Vercel who already have SOC 2 Type II in place should default to the Vercel integration. Teams running GPU-bound pipelines should evaluate Modal. Teams with complex egress requirements should start with Cloudflare. Teams running multi-week autonomous agents should look at Daytona.

04MCP TunnelsOne outbound connection, no inbound firewall rules.

MCP tunnels solve a different problem from self-hosted sandboxes. While sandboxes control where tool execution happens, tunnels control how agents reach private resources — databases, internal APIs, knowledge bases, ticketing systems — without those resources needing to be exposed to the public internet.

The mechanism, as described in The New Stack's reporting: a lightweight gateway you deploy inside your network makes a single outbound encrypted connection to Anthropic's infrastructure. No inbound firewall rule modifications. No public endpoint creation. Traffic is encrypted end-to-end. Agents on Anthropic's side reach private MCP servers through that tunnel; the servers themselves never become reachable from the public internet.

The analogy to prior art is useful. Cloudflare Tunnel and Tailscale Funnel established the "outbound-only gateway" pattern for web traffic. MCP tunnels apply that pattern specifically to the MCP transport layer — using the MCP 2025-11-25 specification (stdio and Streamable HTTP transports) rather than arbitrary HTTP. Administration runs through the Claude Console workspace settings and the tunnels apply to both Managed Agents and the Messages API — meaning even non-agentic Messages API calls can reach private servers through a configured tunnel.

For engineering teams evaluating whether MCP tunnels reduce the security review surface compared with running a VPN-exposed MCP server, see our guide on MCP server security best practices. The tunnel pattern eliminates the inbound-exposure surface but introduces a dependency on Anthropic's gateway availability and encryption implementation — factors your security team should evaluate during the research preview period.

MCP tunnels — what we don't know yet
Anthropic has not published the specific encryption protocol (TLS version, cipher suite, or transport-layer implementation) used by MCP tunnels. Coverage confirms "end-to-end encrypted" and "single outbound connection" — verify implementation details on docs.anthropic.com before production rollout. MCP tunnels remain pre-production (research preview) as of May 19, 2026.

05The EventAnthropic's first developer conference outside the US.

Code with Claude London opened on May 19, 2026 at a Riverside venue in London — Anthropic's first dedicated developer conference outside the United States and its first in Europe, per reporting by Fortune. The event was heavily oversubscribed, drawing enterprise customers, startup workers, and Claude enthusiasts. Format mirrored the San Francisco and New York City Code with Claude editions.

The Day 1 Claude Platform agenda covered multi-agent orchestration, outcomes, memory, dreaming, advisor strategy, Claude Managed Agents, self-hosted sandboxes, and MCP tunnels. Claude Code sessions covered routines, auto mode, work trees, memory, agents view, remote control, and improved desktop workflows.

The most-cited stage data point came from Spotify: more than 99% of Spotify engineers use AI coding tools every week, 94% report higher productivity, PR frequency is up 76%, and 2.5 million automated maintenance PRs have been merged via fleet management. These numbers serve as the empirical floor for the "agents work at production scale" thesis that frames the sandbox and tunnel announcements — cited via Fortune's reporting, not as Anthropic's own figures.

Two on-stage quotes from Fortune capture the cultural register Anthropic aimed for. Fiona Fung, Head of Engineering at Anthropic: “Pick your noisiest workflow and ask if it's still serving its purpose.” Boris Cherny, Head of Claude Code: “I buy my veggies at a farmer's market. There's always room for that.” Both land in the same frame — AI does the grunt work; humans retain judgment over what matters.

For context on what was previewed before the event, see our pre-event preview of Code with Claude London.

06Counter-ProgrammingSame day as I/O — the Managed Agents name collision.

The most structurally interesting thing about May 19, 2026 is the name collision. Google announced its “Managed Agents API” at Google I/O. Anthropic announced its “Claude Managed Agents” self-hosted mode at Code with Claude London. Two of the three frontier labs released enterprise agent primitives with the same product name on the same day — with architecturally opposite implementations.

Google
Managed Agents API — hosted-only

Google's Managed Agents API runs tool execution inside Google's isolated Linux environment. Orchestration and tool execution stay in Google's cloud. Lower ops burden for teams that trust Google's runtime. No customer-perimeter option.

Hosted-only · Google cloud
Anthropic
Claude Managed Agents — hosted or self-hosted

Anthropic's Claude Managed Agents ships both hosted (standard) and self-hosted (new today). Self-hosted moves tool execution inside the customer perimeter via Cloudflare, Daytona, Modal, Vercel, or BYO. Higher ops overhead; full data-sovereignty.

Hosted or self-hosted · customer perimeter

The architectural delta is the trust spectrum. Google says: trust the runtime — we've isolated it, our security posture is your security posture. Anthropic says: bring the runtime to you — your security controls apply by default, we handle orchestration only. Neither position is wrong. They reflect different primary customers. Google's model optimizes for teams that want zero infrastructure overhead and trust Google's cloud security team. Anthropic's model optimizes for regulated industries, multi-cloud enterprises, and teams where data-residency requirements make vendor-cloud tool execution a non-starter.

The name collision matters for procurement teams evaluating both platforms in the same quarter. Request vendors clarify what “managed agent” means in their specific proposal — whether tool execution runs inside the vendor's cloud or inside yours is the load-bearing architectural decision, not a footnote.

For the Google side of the collision — the Interactions API, the antigravity-preview-05-2026 default agent, and the AGENTS.md + SKILL.md configuration model — see our Google Managed Agents API deep dive. For a complete breakdown of what else Google announced at I/O 2026, see our complete Google I/O 2026 announcement guide.

07Enterprise PositioningThe Feb 4 ad-free essay, reasserted on stage.

On February 4, 2026, Anthropic published “Claude is a space to think” — the canonical essay articulating the company's stance on Claude's relationship to users. The essay's most-quoted line: “Claude will remain ad-free. Our users won't see ‘sponsored’ links adjacent to their conversations with Claude.” The essay is not new this week. It was not published today. The London keynote leaned on it — Anthropic reasserted the stance on stage — but the commitment to remaining ad-free is nearly four months old.

The restatement timing is not accidental. Google I/O's May 19 keynote featured ad-integrated AI products — Universal Cart shopping that connects AI Mode to Google's advertising business, consumer AI features that are structurally adjacent to ad revenue. By reasserting the February 4 essay from a London stage on the same morning, Anthropic positioned enterprise contracts and paid subscriptions as its complete business model — structurally opposite the consumer-ads architecture that Google's developer day was partly built around.

The same day, Anthropic announced that Andrej Karpathy had joined as a research scientist — a research-talent signal layered on top of the product announcements, without direct connection to the sandbox or tunnel launches. And KPMG announced a strategic alliance to integrate Claude across its 276,000-person workforce — the third proof point of the day that Anthropic's enterprise momentum extends well beyond developer tooling.

For enterprise teams weighing the compliance and governance implications of these moves, our SOC 2 controls mapping for agentic AI provides the audit framework for evaluating vendor commitments against your organization's control environment.

08Honest GapsWhat's missing at launch.

Anthropic was transparent about what isn't available yet. Three gaps are documented in the launch coverage and one structural limitation applies to how the sandbox client is scoped.

Gap 01
Not yet supported
AWS

Self-hosted sandboxes are not yet available on Claude Platform on AWS. Teams running Anthropic on Bedrock or Claude in their AWS-native stack cannot use self-hosted sandboxes at launch.

Roadmap item — no GA date published
Gap 02
Absent in self-hosted sessions
Memory

Memory — the ability for agents to persist facts and context across sessions — is not supported in self-hosted sandbox sessions at launch. Standard hosted Managed Agents retain memory; self-hosted mode does not.

Not supported at public beta launch
Gap 03
Pre-production only
Tunnels

MCP tunnels remain a research preview — access by request, not open enrollment. Pre-production status means Anthropic may iterate on the protocol, auth model, or operational surface before GA.

Research preview — access by request
Gap 04
Orchestrator-only sandbox client
Scope

The sandbox client runs at the orchestrator level — it controls where tool execution happens, but is not a general compute primitive. Teams expecting a fully general-purpose cloud runtime may need to supplement with additional infrastructure.

Architectural boundary — not a VM replacement

These gaps are predictable for a first-day public beta — the priority was enabling the trust architecture (tool execution in your perimeter) before optimizing for platform breadth (every cloud, every memory model). For teams currently on AWS who need self-hosted sandboxes, the practical options are to wait for AWS support, evaluate the BYO sandbox path with a proxy layer, or run a parallel Cloudflare or Modal pilot on a non-AWS workload to build operational experience before the AWS integration lands.

09Roadmap SignalsAWS support, session memory, and the path to GA.

Three signals from the public beta maturity arc are worth watching.

AWS support closure.The AWS gap is the single largest blocker for enterprise teams whose infrastructure is AWS-native. Anthropic hasn't published a timeline, but the gap is explicitly documented in launch coverage as a near-term roadmap item rather than a "not planned" note. The Vercel Sandbox (Firecracker on Amazon Linux 2023) and the BYO path suggest the infrastructure patterns for AWS alignment already exist — the question is operational readiness and certification.

Memory in self-hosted sessions. Session memory is a core differentiator for autonomous agents running multi-step, multi-day workflows. Its absence in self-hosted mode means teams need workarounds — external vector stores, manual context injection, or session-stitching logic — that add operational complexity. Adding memory to self-hosted sessions is likely a pre-GA requirement.

MCP tunnels GA. The research preview label means protocol and auth-model iteration is still in flight. Teams evaluating MCP tunnels as a production pattern should track the MCP 2025-11-25 specification changelog — specifically the OAuth 2.1 + PKCE authorization model — because the tunnel auth handshake is likely built on that foundation and may shift before GA. Our guide on the Claude Agent SDK production patterns covers the auth-integration surface in detail.

The counter-programming interpretation for forward-looking product strategy: Anthropic is building the enterprise-perimeter primitives in 2026 that will define which platform regulated industries default to in 2027. The compliance-bottleneck problem ("six to twelve weeks of pilot delays") is a large enough TAM blocker that solving it structurally — rather than contractually — is the right product priority. AWS support, memory in self-hosted, and MCP tunnels GA are the three milestones that convert the launch thesis from a compelling pitch into a default enterprise choice.

Claude Managed Agents feature maturity — May 19, 2026

Source: Business News Today, 9to5Mac — launch coverage May 19, 2026
AWS supportClaude Platform on AWS — not yet available
Roadmap
Memory in self-hostedCross-session persistence — not at public beta
Roadmap
MCP tunnels GAResearch preview — by request only
Preview
Self-hosted sandboxesPublic beta — open enrollment today
Beta
Hosted Managed AgentsStandard mode — generally available
GA
Conclusion — May 19, 2026

Orchestration stays. Tool execution moves. That is the entire architectural shift.

Code with Claude London opened with a structural pivot. Today's announcement moves tool execution outside Anthropic's own infrastructure and into the customer's perimeter. Cloudflare, Daytona, Modal, and Vercel are the launch providers; Amplitude, Clay, DoorDash, and Rogo are the day-one customer references. The architecture split — orchestration stays, tool execution moves — is the single most-quoted line from the keynote because it is the precise statement of what changed.

The Managed Agents name collision with Google is the cleanest framing of the week. Google's Managed Agents API ships hosted-only inside Google's cloud. Anthropic's Claude Managed Agents ships hosted-or-self-hosted inside yours. Two frontier labs released enterprise agent primitives with the same product name on the same day. The architectural delta is the trust spectrum: Google says trust the runtime; Anthropic says bring the runtime to you.

The counter-programming holds even without the product announcements. Anthropic reasserted the February 4 "Claude will remain ad-free" essay on stage in London on the same morning Google announced ad-adjacent consumer AI products. Andrej Karpathy joined Anthropic as a research scientist the same day. Watch for AWS support to close, memory to land in self-hosted sessions, and MCP tunnels to exit research preview as the public beta matures through Q3 2026.

Enterprise agent infrastructure, done right

Tool execution inside your perimeter — compliance-first.

Our team helps regulated enterprises evaluate, deploy, and govern self-hosted Claude agent infrastructure — including sandbox provider selection, MCP tunnel security review, and compliance-ready rollout frameworks — delivered in weeks, not quarters.

Free consultationExpert guidanceTailored solutions
What we work on

Claude Managed Agents engagements

  • Sandbox provider selection — Cloudflare / Daytona / Modal / Vercel vs BYO
  • MCP tunnel security review and compliance sign-off
  • SOC 2 Type II gap analysis for self-hosted agent deployments
  • Multi-provider agent routing and cost governance
  • Six-week pilot-to-production programs for regulated industries
FAQ · Code with Claude London — sandboxes and MCP tunnels

Questions we're getting on sandboxes and MCP tunnels.

Anthropic announced two additions to Claude Managed Agents: self-hosted agent sandboxes (public beta, open enrollment) and MCP tunnels (research preview, access by request). Self-hosted sandboxes let enterprises configure tool execution to run inside their own cloud perimeter — Cloudflare, Daytona, Modal, Vercel, or a bring-your-own sandbox client — while the agent orchestration loop stays on Anthropic's infrastructure. MCP tunnels let agents reach private internal servers without inbound firewall rules, using a single outbound encrypted connection. Both features target the compliance and data-governance bottlenecks that have slowed enterprise agent pilots. The event itself was Anthropic's first dedicated developer conference outside the United States.