Wix Containers Security with Twistlock
Wix.com, one of the leading web hosting platforms with millions of users worldwide, has selected Twistlock to protect its Wix containers running across its environments.
Wix is growing their usage of containers and Twistlock’s container security solution helps to identify potential vulnerabilities and enforce security policies across the development and production environment. The result of deploying Twistlock’s container security suite is that Wix can ensure that all containers, no matter which applications they are running, have a consistent security model from development through production.
Wix runs on many open source technologies so they particularly like Twistlock’s integration with online CVE (Common Vulnerabilities and Exposures) data, which makes it easy to find and fix vulnerabilities, not just in Linux components, but also in the Java and Node.js parts of their stack. Additionally, Twistlock’s container and image hardening policies have made it easier to centrally define and enforce security policies across their environments.
“Security is a top priority for us at Wix and Twistlock has made it easier for us to protect our customers even as we adopt new technologies like containers. Their integration with CVE databases has been particularly valuable in helping us find and fix vulnerabilities within containers and the hardening policies help us have the same security standards throughout the dev lifecycle.” said Gregory Man, Manager on the System Team at Wix.
All of us at Twistlock are grateful for the opportunity to work with Wix and are excited about the opportunity to keep improving our technology based on their real world feedback.
- Container Security
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
How My Company (Teckro) Uses ContainersRead the Blog
Mitigating CVE-2019-5736 Impacting RunC and DockerRead the Blog
From Agile to DevSecOps and DevOps SecurityRead the Blog
What’s Next for Cloud-Native Infrastructure Technology?Read the Blog
Cloud Native Security Beyond Your Cloud Vendor’s ToolsRead the Blog