My name is Ben, and I’m the CEO of Twistlock.
This is our first blog post and I thought it would be nice to introduce our company.
We are a bunch of enterprise security nerds who realised that as much as we, as developers, love containers, IT security will hate them if they don’t support some of the standard controls and checks that enterprise software requires.
We basically noticed three big blind spots in the container space:
- Inspecting images prior to them being instantiated
- Augmenting access control for the container run-time environment with richer authentication and authorization mechanisms
- Assessing containers at run time
There are a lot of tools and initiatives provided by platforms and the ecosystem that cover some of these aspects, but there is nothing that focuses solely on providing a rich security suite to deal with all of them.
We’ve talked with several customers that have moved containers to production, and noticed that many of them have duct tape and glue solutions to cover these areas. We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get.
We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get. With this ever growing pain-point in mind, we’ve set out to solve the problem and make containers more secure so developers (and IT teams? I’m not sure which is right here) can focus on what they do best without worry. Rest easy, Twistlock is here.
- Container Security
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
How to Lock Down the Kernel to Secure the Container HostRead the Blog
One Chapter Ends, Another BeginsRead the Blog
The Greatest Security Risks Lurking in Your CI/CD PipelineRead the Blog
Cloud Platform Radar: Powerful Cloud Asset IdentificationRead the Blog
Securing Serverless Functions: Visibility with Serverless RadarRead the Blog