Twistlock, a security startup, is in the news again heading into the annual RSA conference, being recognized as one of the top 20 Cyber Security startups to watch by Dark Reading, and as a finalist nominee in the 2016 SC Awards.
The SC Awards represent one of the most prestigious awards in the security industry. Every year SC Magazine recognizes the most outstanding performers in various categories of the industry. This year, Twistlock is nominated as a finalist in the “Best Emerging Technology” category. The award winners will be announced on March 1st in San Francisco.
As a company that is barely one year old, Twistlock has grown tremendously in 2015. We went from a two-person founding team to a kick-ass team of 8 engineers. We brought on experienced business leaders. In the process of working with these customers, we gained experiences and expertise in container technologies. Recently we committed our authorization framework to the Docker open source code base and open sourced an extensible AuthZ plugin for all to use.
“I’m honored that the hard work of our entire team at Twistlock is being recognized.” CEO Ben Bernstein said, “At Twistlock, what drives us is customer reception and enthusiasm. Our customers consistently told us that our product addressed a big pain point for them, and that our technologies enabled their organizations to adopt containers to accelerate the pace of innovation. Our goal this year is to strengthen the breadth of our product and continue to invest in innovations that help solve the most pressing security challenges in the container ecosystem.”
Next week at the RSA conference, Twistlock will be leading a “Panel: “DevOps Engagement: Politics, People and Process” panel at the Rugged DevOps day on the first day of the conference. On Wednesday March 2nd, Twistlock’s CSO Dr. Chenxi Wang will lead a “Can Government encryption backdoor and privacy co-exist?” panel with the Chief Privacy Officer of Cisco, Encryption expert Matthew Green, and the former Associate General Counsel for NSA Richard Marshall. With the recent highlighted case of Apple against FBI, this promises to be a timely and extremely interesting discussion.
For more information on container security, read our Docker security resource guide.
- Container Security
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
How to Lock Down the Kernel to Secure the Container HostRead the Blog
One Chapter Ends, Another BeginsRead the Blog
The Greatest Security Risks Lurking in Your CI/CD PipelineRead the Blog
Cloud Platform Radar: Powerful Cloud Asset IdentificationRead the Blog
Securing Serverless Functions: Visibility with Serverless RadarRead the Blog