My name is Ben, and I’m the CEO of Twistlock.
This is our first blog post and I thought it would be nice to introduce our company.
We are a bunch of enterprise security nerds who realised that as much as we, as developers, love containers, IT security will hate them if they don’t support some of the standard controls and checks that enterprise software requires.
We basically noticed three big blind spots in the container space:
- Inspecting images prior to them being instantiated
- Augmenting access control for the container run-time environment with richer authentication and authorization mechanisms
- Assessing containers at run time
There are a lot of tools and initiatives provided by platforms and the ecosystem that cover some of these aspects, but there is nothing that focuses solely on providing a rich security suite to deal with all of them.
We’ve talked with several customers that have moved containers to production, and noticed that many of them have duct tape and glue solutions to cover these areas. We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get.
We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get. With this ever growing pain-point in mind, we’ve set out to solve the problem and make containers more secure so developers (and IT teams? I’m not sure which is right here) can focus on what they do best without worry. Rest easy, Twistlock is here.
- Container Security
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
2019 Gartner Market Guide for CWPP: What You Need to KnowRead the Blog
Key Differences in Security, Management for Serverless vs. ContainersRead the Blog
Docker vs. KubernetesRead the Blog
How Cloud Workload Protection is Different than Application SecurityRead the Blog
Zero-Trust Security: What It Means and How to Achieve ItRead the Blog