My name is Ben, and I’m the CEO of Twistlock.
This is our first blog post and I thought it would be nice to introduce our company.
We are a bunch of enterprise security nerds who realised that as much as we, as developers, love containers, IT security will hate them if they don’t support some of the standard controls and checks that enterprise software requires.
We basically noticed three big blind spots in the container space:
- Inspecting images prior to them being instantiated
- Augmenting access control for the container run-time environment with richer authentication and authorization mechanisms
- Assessing containers at run time
There are a lot of tools and initiatives provided by platforms and the ecosystem that cover some of these aspects, but there is nothing that focuses solely on providing a rich security suite to deal with all of them.
We’ve talked with several customers that have moved containers to production, and noticed that many of them have duct tape and glue solutions to cover these areas. We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get.
We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get. With this ever growing pain-point in mind, we’ve set out to solve the problem and make containers more secure so developers (and IT teams? I’m not sure which is right here) can focus on what they do best without worry. Rest easy, Twistlock is here.
Follow us on Twitter
Keep up to date with the latest news from TwistlockLabs and TwistlockTeam.
Cryptomining Malware Emerges
I have been watching for the spread of malware that, primarily, uses c...
Calling the Twistlock API from PowerShell
The Problem This morning, a colleague was looking for situations where...
What Makes Distributed Security ‘Cloud Native’: Podcast Overview
I caught up with Scott Fulton III on this edition of The New Stack Mak...
Reflections on the 20th Anniversary of Open Source Technology
Exactly twenty years ago in February 1998, the term “open source” ...
Enhanced Syslog Data Streams: 2.3 Deep Dive
In each of our Twistlock releases, we publish some truly remarkable fe...