When Dima and I started Twistlock, we saw how poorly traditional security adapted to the cloud native world – and noted the importance of delivering automated, scalable security that worked with developers’ needs. We’ve been both amazed and humbled by the reception to Twistlock – our philosophy and our product.
We released Twistlock 1.0 in November 2015, delivering the industry’s first container security solution. Since then, it’s been a whirlwind of growth – from securing our Series A in July 2016, opening our Portland and New York offices later that year, to last week’s release of Twistlock 2.0. With this B round – we’re going to continue this trajectory. We’ll be expanding our research and development teams, growing our partnerships, and sharpening our execution – so we can continue to drive the future of cloud native security.
One of my favorite parts of Twistlock’s growth to date is the is the opportunity to work with and learn from the best our industry has to offer. That’s why I’m also proud to share that Brendan Hannigan from Polaris will be joining us as Chairman of the Board. Brendan’s experience growing security companies, and running the world’s largest enterprise security provider at IBM Security is an invaluable contribution to Twistlock, and we’re thrilled to have him on board.
As we embark on the next phase for Twistlock, I want to thank our friends and partners in the industry who’ve helped us shape and deliver solutions enterprises can use. Thank you too, to our board and advisors, who’ve guided our growth and helped us scale swiftly and responsibly. And also, thank you to our customers – for helping us refine and evolve our product and the protection it delivers – and for trusting us to secure their production environments.
Your support has gotten us here – and we’re just getting started. Onward!
Ben and the Twistlock team.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
Beyond App Security: Securing Applications No Matter Where They LiveRead the Blog
Surveying the Container Orchestration LandscapeRead the Blog
Building the Right Toolbox for a Successful DevSecOps CareerRead the Blog
BOD 19-02: DHS Vulnerability Remediation RequirementsRead the Blog
How Cloud Native Security is Adapting to New Hybrid Reality for EnterprisesRead the Blog