Latest release includes improved Runtime Radar and new Compliance Explorer for large enterprises and government agencies
AUSTIN, Texas—DockerCon—April 17, 2017— Twistlock, the leading provider of cloud container security solutions, today announced the availability of Twistlock 2.0 during DockerCon in Austin, Texas. The latest release of Twistlock’s flagship product includes an updated user interface, significant performance improvements and several new features that enable organizations to stop an attack before it starts.
While Twistlock 2.0 was built to handle even the most stringent of security requirements found in many enterprises, it also benefits smaller development teams that need more simplicity and agility to take their innovations to market more quickly and safely. To better help companies stay in front of a potential compromise, Twistlock 2.0 builds on the capability to identify vulnerabilities as part of the continuous integration (CI) process and relies on frequent monitoring to prevent the deployment of unsafe and non-compliant images in the first place.
“Container security needs to be truly application aware and based upon developer intent,” said John Morello, chief technology officer at Twistlock. “Twistlock 2.0 relies on application intent analysis to produce a more predictable and secure container environment. Twistlock 2.0’s breadth and depth of compliance features and applicability to various industries make it an obvious choice for organizations looking to improve their container security.”
Runtime Radar 2.0
Initially introduced in Twistlock 1.6 as a way to visualize how containers interact with each other, Runtime Radar 2.0 builds on that capability to provide a single view into the status, connectivity, and risk state of an organization’s environment. In a single glance, Runtime Radar allows organizations to visualize their entire environment from relationships between pods to processes to network calls, file access and system calls for individual containers. New features include color-coded overlays of vulnerabilities and compliance state and the ability to export an organization’s connectivity topology into a Kubernetes networking policy. Each of these new features increase the understanding of a company’s inherent security risk in addition to providing an additional layer of defense.
Large enterprises and government agencies have demanding compliance needs. In addition to needing the ability to check their state of compliance at any point in time, these organizations must also have the ability to actively enforce compliance across their entire environment. Twistlock’s new Compliance Explorer relies on predictive analytics to monitor an organization’s current compliance state and creates a dashboard displaying how compliant a company is at any given point in time, listing out those entities that are non-compliant. This data can also be exported for integration with other tools.
Additional new capabilities and features available in Twistlock 2.0 include:
Twistlock is the industry’s first enterprise security suite for container security. Twistlock’s technology addresses risks on the host and within the application of the container, enabling enterprises to consistently enforce security policies, monitor and audit activity and identify and isolate threats in a container or cluster of containers. Twistlock’s mission is to provide a full, enterprise-grade security stack for containers, so organizations can confidently adopt and maximize the benefits of containers in their production environment. For more information, please visit www.twistlock.com
- Press Releases
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
Know Your Firewall: Layer 3 vs. Layer 7Read the Blog
Baking Compliance in your CI/CD PipelineRead the Blog
Serverless Security Suggestions: Tips for Keeping Serverless Functions SecureRead the Blog
Why a Common Security Toolset is Essential for DevSecOpsRead the Blog
Putting the “Ops” in DevSecOps: Why It’s Hard and How to Do ItRead the Blog