My name is Ben, and I’m the CEO of Twistlock.
This is our first blog post and I thought it would be nice to introduce our company.
We are a bunch of enterprise security nerds who realised that as much as we, as developers, love containers, IT security will hate them if they don’t support some of the standard controls and checks that enterprise software requires.
We basically noticed three big blind spots in the container space:
- Inspecting images prior to them being instantiated
- Augmenting access control for the container run-time environment with richer authentication and authorization mechanisms
- Assessing containers at run time
There are a lot of tools and initiatives provided by platforms and the ecosystem that cover some of these aspects, but there is nothing that focuses solely on providing a rich security suite to deal with all of them.
We’ve talked with several customers that have moved containers to production, and noticed that many of them have duct tape and glue solutions to cover these areas. We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get.
We realised that as more enterprises move to use containers for mission-critical applications, the more obvious this gap would get. With this ever growing pain-point in mind, we’ve set out to solve the problem and make containers more secure so developers (and IT teams? I’m not sure which is right here) can focus on what they do best without worry. Rest easy, Twistlock is here.
Follow us on Twitter
Keep up to date with the latest news from TwistlockLabs and TwistlockTeam.
Multiple Registry Scanners: 2.4 Deep Dive
At Twistlock, we’ve watched our customers implement security through...
The Challenges of Securing and Protecting Containers During Runtime
Containers deliver many advantages over virtual machines, but they als...
Infinite Scale and Multitenancy with Projects: 2.4 Deep Dive
At Twistlock, we’re working with enterprises across almost every ind...
Twistlock 2.4 Release Notes
Announcing Twistlock 2.4 We just signed off on Twistlock 2.4, the 13th...
5 Ways to Solve for Enterprise Cloud Security Challenges and Risks
Infrastructure as a Service (IaaS) clouds present a somewhat unique se...