Integration enforces full lifecycle software quality and compliance for GKE workloads
PORTLAND, OR, JULY 25, 2018 // Twistlock today announced support for Binary Authorization, coming soon to beta on Google Cloud Platform. With this integration, Google Kubernetes Engine (GKE) customers will now be able to use Twistlock to enforce attestations made with Binary Authorization, ensuring only compliant and trusted images are promoted across the development lifecycle and deployed to production. Joint Twistlock and GKE customers can now use Twistlock’s existing integrations with CI/CD pipelines and GKE to establish quality gates that enforce Binary Authorization policies at every stage of the software lifecycle.
“By integrating Binary Authorization support into the Twistlock platform, we’re ensuring that our customers in GKE can easily enforce using a shared framework across the CI/CD pipeline and into production,” said John Leon, Vice President of Business Development and Alliances at Twistlock. “By leveraging Twistlock’s CI/CD and orchestration integrations, customers can enforce Binary Authorization attestations at every stage of the application lifecycle from the same platform they use for vulnerability management and active threat protection.”
Twistlock is a Google Cloud Platform Security Partner and has worked closely with Google to bring strong, automated security to customers running cloud native applications on Google Cloud Platform. Previous integrations include Google Container Registry, support for Google Cloud Container Builder, collaboration on the Grafeas project, and integration with Google Cloud Security Command Center.
Twistlock’s cloud native cybersecurity platform also provides protection for Google Cloud Functions, ensuring that teams running the full spectrum of cloud native technologies enjoy unified protection with a single platform.
To learn more or see a demo of Twistlock, visit Twistlock.com
Trusted by 25% of the Fortune 100, Twistlock is the most complete, automated and scalable container cybersecurity platform. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies – Twistlock gives developers the speed they want, and CISOs the control they need.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
AWS Fargate Security: Runtime Defense with Twistlock 2.5Read the Blog
Cloud Native Forensics: Security Incident Response in Twistlock 2.5Read the Blog
Announcing Twistlock 2.5: GA Release NotesRead the Blog
GitOps 101: What Is GitOps, and Why Would You Use It?Read the Blog
DevSecOps Learning Resources: How to Learn to Do DevSecOpsRead the Blog