Wix Containers Security with Twistlock
Wix.com, one of the leading web hosting platforms with millions of users worldwide, has selected Twistlock to protect its Wix containers running across its environments.
Wix is growing their usage of containers and Twistlock’s container security solution helps to identify potential vulnerabilities and enforce security policies across the development and production environment. The result of deploying Twistlock’s container security suite is that Wix can ensure that all containers, no matter which applications they are running, have a consistent security model from development through production.
Wix runs on many open source technologies so they particularly like Twistlock’s integration with online CVE (Common Vulnerabilities and Exposures) data, which makes it easy to find and fix vulnerabilities, not just in Linux components, but also in the Java and Node.js parts of their stack. Additionally, Twistlock’s container and image hardening policies have made it easier to centrally define and enforce security policies across their environments.
“Security is a top priority for us at Wix and Twistlock has made it easier for us to protect our customers even as we adopt new technologies like containers. Their integration with CVE databases has been particularly valuable in helping us find and fix vulnerabilities within containers and the hardening policies help us have the same security standards throughout the dev lifecycle.” said Gregory Man, Manager on the System Team at Wix.
All of us at Twistlock are grateful for the opportunity to work with Wix and are excited about the opportunity to keep improving our technology based on their real world feedback.
Follow us on Twitter
Keep up to date with the latest news from TwistlockLabs and TwistlockTeam.
How to Decide When to Use Serverless
Serverless computing is the new way to build apps in the cloud. The qu...
How Twistlock Can Protect Against Crypto Mining
The Crypto mining threat and how to protect against it As part of our ...
Cryptomining Malware Emerges
I have been watching for the spread of malware that, primarily, uses c...
Calling the Twistlock API from PowerShell
The Problem This morning, a colleague was looking for situations where...
What Makes Distributed Security ‘Cloud Native’: Podcast Overview
I caught up with Scott Fulton III on this edition of The New Stack Mak...