My name is Ben, and I’m the CEO of Twistlock.
This is our first blog post and I thought it would be nice to introduce our company.
We are a bunch of enterprise security nerds who realised that as much as we, as developers, love containers, IT security will hate them if they don’t support some of the standard controls and checks that enterprise software requires.
We basically noticed three big blind spots in the container space:
- Inspecting images prior to them being instantiated
- Augmenting access control for the container run-time environment with richer authentication and authorization mechanisms
- Assessing containers at run time
There are a lot of tools and initiatives provided by platforms and the ecosystem that cover some of these aspects, but there is nothing that focuses solely on providing a rich security suite to deal with all of them.
We’ve talked with several customers that have moved containers to production, and noticed that many of them have duct tape and glue solutions to cover these areas. We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get.
We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get. With this ever growing pain-point in mind, we’ve set out to solve the problem and make containers more secure so developers (and IT teams? I’m not sure which is right here) can focus on what they do best without worry. Rest easy, Twistlock is here.
Follow us on Twitter
Keep up to date with the latest news from TwistlockLabs and TwistlockTeam.
Twistlock Releases Serverless Runtime Defense
A few months ago, we wrote a piece on “The Continuum of Cloud Native...
Why DevSecOps is No Longer Optional
DevSecOps has been a hot topic within tech conversations for a few yea...
Better Together: Announcing The Twistlock Advantage Program
It’s been about three years since we exited stealth with the first g...
My Security Toolset Today Vs 10 Years Ago
It can be easy to forget how sophisticated IT security tools are today...
How to crash the Linux Kernel with a CDROM interaction – CVE-2018-11506
I’ve recently discovered and reported a buffer overflow vulnerabilit...