Twistlock's Container Security Resources
OpenShift Commons Image Builder SIG #6: How to Make Your Containers More Secure
Ben Bernstein – Implementing & Architecting Secure Docker Environments
Chenxi Wang – Protect Containerized Applications With System Call Profiling
TNS Analysts: Creating An Automated Model for Container Security
“Adding security to a container based implementation of DevOps is essential for vulnerability management, audit logging and permission management to realize economic benefit in software security..”
Chief Information Security Officer
“Twistlock’s container security technology is a real differentiator for Booz Allen Hamilton’s Government-facing initiatives. It facilitates our customers’ adoption of DevOps while ensuring compliance with stringent security requirements.”
Frank S. Digiacomo,
Director of Business Development
“Twistlock can help AWS customers secure their container workloads, including containerized applications that run on Amazon EC2 Container Service and container images that are stored in EC2 Container Registry”
Solutions Architect for AWS
“We are very pleased with Twistlock’s integration with CVE databases and the support of multiple technologies for vulnerability detection. This allows us to continue to grow container adoption without worrying about security”
“Twistlock has proven to be the only full-featured container security product capable of protecting our cloud technologies and meeting the rigorous standard of security requirements at InVision.”
VP of Information Security
Purpose-built Container Security for Docker & Beyond
Twistlock’s technologies are built for containers — from hardening images in development to protecting containers in production — everything we do fits seamlessly in the container environment.
“Top 20 Cyber Security firms
to watch in 2016”
Twistlock delivers Docker container security for every stage of the DevOps workflow – with seamless CI integration, extensive API support, and dev-to-production security controls that deliver consistent policies across the container lifecycle.
No changes to the host, the container daemon, or your applications.
Managing vulnerabilities in Linux distro and app frameworks (Node.js, Java, Python, Ruby)
From dev machines, to private clouds and public clouds. We are everywhere your containers run.
Cradle To Scale
Consistent policy enforcement from Images, registries, to production servers.
Get The “All About Container” White Paper Series
This informational white paper series – “All About Containers” – describes the history, fundamental concepts, operational benefits, and security implications of virtual containers, from LXC to Docker. Part 1 of the series explores basic concepts and the history of containers. Part 2 takes a deep dive into Docker technology. Part 3 details security challenges and opportunities with containerized applications. Part 4 takes a comprehensive look at the various pieces in the container ecosystem and how they fit together.