When Dima and I started Twistlock, we saw how poorly traditional security adapted to the cloud native world – and noted the importance of delivering automated, scalable security that worked with developers’ needs. We’ve been both amazed and humbled by the reception to Twistlock – our philosophy and our product.
We released Twistlock 1.0 in November 2015, delivering the industry’s first container security solution. Since then, it’s been a whirlwind of growth – from securing our Series A in July 2016, opening our Portland and New York offices later that year, to last week’s release of Twistlock 2.0. With this B round – we’re going to continue this trajectory. We’ll be expanding our research and development teams, growing our partnerships, and sharpening our execution – so we can continue to drive the future of cloud native security.
One of my favorite parts of Twistlock’s growth to date is the is the opportunity to work with and learn from the best our industry has to offer. That’s why I’m also proud to share that Brendan Hannigan from Polaris will be joining us as Chairman of the Board. Brendan’s experience growing security companies, and running the world’s largest enterprise security provider at IBM Security is an invaluable contribution to Twistlock, and we’re thrilled to have him on board.
As we embark on the next phase for Twistlock, I want to thank our friends and partners in the industry who’ve helped us shape and deliver solutions enterprises can use. Thank you too, to our board and advisors, who’ve guided our growth and helped us scale swiftly and responsibly. And also, thank you to our customers – for helping us refine and evolve our product and the protection it delivers – and for trusting us to secure their production environments.
Your support has gotten us here – and we’re just getting started. Onward!
Ben and the Twistlock team.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
How to Securely Configure a Linux Host for ContainersRead the Blog
Don’t Forget the Audit Trail! The Role of Reporting in SecurityRead the Blog
Securing Cloud Native Applications on Pivotal Container Service (PKS)Read the Blog
What to Know: Gartner’s Security Considerations and Best Practices for Securing Serverless PaaSRead the Blog
Crypto Mining and the Cloud: The Perfect IT Security StormRead the Blog