Every hyperscaler privacy product has the same architectural shape. An SDK in a language your developers use, or an API your application calls, or a managed service behind that API. All of them require your developers to remember to call them. All of them can be bypassed by a developer who forgets.
Presential integrates differently. An Envoy sidecar runs inside your cluster, with a WASM filter at the network layer. Traffic crossing the pod passes through the filter whether or not the developer configured it. The enforcement is structural, not procedural.
A hyperscaler cannot ship this without running inside your cluster. Running inside your cluster means running code your security team inspected, on infrastructure your team operates, under policies you defined. That is the inverse of the hyperscaler business model, which is selling you infrastructure you rent from them.