When Dima and I started Twistlock, we saw how poorly traditional security adapted to the cloud native world – and noted the importance of delivering automated, scalable security that worked with developers’ needs. We’ve been both amazed and humbled by the reception to Twistlock – our philosophy and our product.
We released Twistlock 1.0 in November 2015, delivering the industry’s first container security solution. Since then, it’s been a whirlwind of growth – from securing our Series A in July 2016, opening our Portland and New York offices later that year, to last week’s release of Twistlock 2.0. With this B round – we’re going to continue this trajectory. We’ll be expanding our research and development teams, growing our partnerships, and sharpening our execution – so we can continue to drive the future of cloud native security.
One of my favorite parts of Twistlock’s growth to date is the is the opportunity to work with and learn from the best our industry has to offer. That’s why I’m also proud to share that Brendan Hannigan from Polaris will be joining us as Chairman of the Board. Brendan’s experience growing security companies, and running the world’s largest enterprise security provider at IBM Security is an invaluable contribution to Twistlock, and we’re thrilled to have him on board.
As we embark on the next phase for Twistlock, I want to thank our friends and partners in the industry who’ve helped us shape and deliver solutions enterprises can use. Thank you too, to our board and advisors, who’ve guided our growth and helped us scale swiftly and responsibly. And also, thank you to our customers – for helping us refine and evolve our product and the protection it delivers – and for trusting us to secure their production environments.
Your support has gotten us here – and we’re just getting started. Onward!
Ben and the Twistlock team.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
How to Lock Down the Kernel to Secure the Container HostRead the Blog
One Chapter Ends, Another BeginsRead the Blog
The Greatest Security Risks Lurking in Your CI/CD PipelineRead the Blog
Cloud Platform Radar: Powerful Cloud Asset IdentificationRead the Blog
Securing Serverless Functions: Visibility with Serverless RadarRead the Blog