As we count down to the release of Twistlock 2.0, we’ve been highlighting some of the new functionality debuting this month. If you missed our introduction and overview of the all-new Runtime Radar – make sure to check that out. Today, we’re going to talk about a brand new feature added to Twistlock – Compliance Explorer, our compliance management system.
Today, Twistlock helps enterprises worldwide enforce compliance. Whether with our native support for the Docker CIS benchmark, or our HIPAA and PCI templates, our customers rely on Twistlock to enforce and report on compliance across the entire environment. With Twistlock 2.0, we’re excited to expand upon this capability, and provide a centralized compliance management system dashboard – Compliance Explorer.
A Single View into Internal and External Compliance Policies for Containerized Environments
This all-new interface in the Twistlock Console provides a single view of all policies enforced in your environment, the current compliance state, and historical compliance data. For each policy in your environment, Compliance Explorer shows the percentage of compliant containers, hosts and images – and highlights any non-compliant entities in an easy visual manner.
In addition to current compliance state, Compliance Explorer shows the last 30 days of compliance state in graphical format – and all data is easily exportable for integration to other tooling, or for use in audit. Organizations using Twistlock to manage compliance can now easily understand current state – and quickly triage any policy violations.
We’re excited to deliver Compliance Explorer to our customers in just a few weeks – and we can’t wait to share the rest of 2.0 with you. Next up: Integrations, Optimizations, and more!
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
Beyond App Security: Securing Applications No Matter Where They LiveRead the Blog
Surveying the Container Orchestration LandscapeRead the Blog
Building the Right Toolbox for a Successful DevSecOps CareerRead the Blog
BOD 19-02: DHS Vulnerability Remediation RequirementsRead the Blog
How Cloud Native Security is Adapting to New Hybrid Reality for EnterprisesRead the Blog