Wix Containers Security with Twistlock
Wix.com, one of the leading web hosting platforms with millions of users worldwide, has selected Twistlock to protect its Wix containers running across its environments.
Wix is growing their usage of containers and Twistlock’s container security solution helps to identify potential vulnerabilities and enforce security policies across the development and production environment. The result of deploying Twistlock’s container security suite is that Wix can ensure that all containers, no matter which applications they are running, have a consistent security model from development through production.
Wix runs on many open source technologies so they particularly like Twistlock’s integration with online CVE (Common Vulnerabilities and Exposures) data, which makes it easy to find and fix vulnerabilities, not just in Linux components, but also in the Java and Node.js parts of their stack. Additionally, Twistlock’s container and image hardening policies have made it easier to centrally define and enforce security policies across their environments.
“Security is a top priority for us at Wix and Twistlock has made it easier for us to protect our customers even as we adopt new technologies like containers. Their integration with CVE databases has been particularly valuable in helping us find and fix vulnerabilities within containers and the hardening policies help us have the same security standards throughout the dev lifecycle.” said Gregory Man, Manager on the System Team at Wix.
All of us at Twistlock are grateful for the opportunity to work with Wix and are excited about the opportunity to keep improving our technology based on their real world feedback.
- Container Security
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
Key Differences in Security, Management for Serverless vs. ContainersRead the Blog
Docker vs. KubernetesRead the Blog
How Cloud Workload Protection is Different than Application SecurityRead the Blog
Zero-Trust Security: What It Means and How to Achieve ItRead the Blog
Service Mesh. Service Fabric. Service Bus. What Does It All Mean?!Read the Blog