As we count down to the release of Twistlock 2.0, we’ve been highlighting some of the new functionality debuting this month. If you missed our introduction and overview of the all-new Runtime Radar – make sure to check that out. Today, we’re going to talk about a brand new feature added to Twistlock – Compliance Explorer, our compliance management system.
Today, Twistlock helps enterprises worldwide enforce compliance. Whether with our native support for the Docker CIS benchmark, or our HIPAA and PCI templates, our customers rely on Twistlock to enforce and report on compliance across the entire environment. With Twistlock 2.0, we’re excited to expand upon this capability, and provide a centralized compliance management system dashboard – Compliance Explorer.
A Single View into Internal and External Compliance Policies for Containerized Environments
This all-new interface in the Twistlock Console provides a single view of all policies enforced in your environment, the current compliance state, and historical compliance data. For each policy in your environment, Compliance Explorer shows the percentage of compliant containers, hosts and images – and highlights any non-compliant entities in an easy visual manner.
In addition to current compliance state, Compliance Explorer shows the last 30 days of compliance state in graphical format – and all data is easily exportable for integration to other tooling, or for use in audit. Organizations using Twistlock to manage compliance can now easily understand current state – and quickly triage any policy violations.
We’re excited to deliver Compliance Explorer to our customers in just a few weeks – and we can’t wait to share the rest of 2.0 with you. Next up: Integrations, Optimizations, and more!
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
IAM Roundup: AWS vs. Azure vs. GCPRead the Blog
How to Securely Configure a Linux Host for ContainersRead the Blog
Don’t Forget the Audit Trail! The Role of Reporting in SecurityRead the Blog
Securing Cloud Native Applications on Pivotal Container Service (PKS)Read the Blog
What to Know: Gartner’s Security Considerations and Best Practices for Securing Serverless PaaSRead the Blog