Palo Alto Networks Announces Intent to Acquire Twistlock. Get the details >


Securing Cloud Native Apps with Layer 3 and Layer 7 Firewalling

The Twistlock Platform empowers security teams to move beyond manually managing whitelisted IP addresses by offering firewalls built for cloud native environments. Twistlock provides layer 3 firewalls and layer 7 firewalls that automatically learn the network topology of your applications and provide application-tailored microsegmentation for all your microservices. This allows for the management of modern threats.

Automation Combined with Machine Learning

Automation is the key enabler of Twistlock Firewalls. The Twistlock Platform automatically maps, identifies, and whitelists valid traffic flows in your environment based on our proximity to your applications and our knowledge of how they behave. Twistlock dynamically creates filters that automatically allow valid connections and drop suspicious connections, regardless of where your containers are running in the cluster. This process all happens without requiring you to change the way you build, deploy, or run the apps we protect.

Purpose-Built for Cloud Native Apps

The Twistlock Cloud Native Application Firewall (CNAF) combines our knowledge, placement, and visibility of your environment to automatically filter web traffic sent to your applications regardless of what cloud, cluster node, IP address, or port they happen to be running on. With CNAF, the Twistlock Platform automatically knows where your applications are running, automatically re-routes inbound traffic through Twistlock Defender, and applies an optimized, application-specific, layer-7 filter to it, sending only clean traffic to the actual container.

Purpose-Built for Cloud Native Networks

The Twistlock Cloud Native Network Firewall (CNNF) is a container aware, machine-learning driven, layer-3 firewall that works in any cloud and orchestrator. This powerful feature automatically models all the traffic flows between all your microservices and allows security teams to centrally view and enforce safe traffic flows while automatically blocking anomalies without requiring manual rule creation and management.

“Adding security to a container based implementation of DevOps is essential for vulnerability management, audit logging and permission management to realize economic benefit in software security.”

Jim Routh CISO, Aetna

We are very pleased with Twistlock’s integration with CVE databases and the support of multiple technologies for vulnerability detection. This allows us to continue to grow container adoption without worrying about security.”

Ariel Moskovich DevOps Lead, AppsFlyer

Twistlock’s container security technology is a real differentiation for Booz Allen Hamilton’s Government-facing initiatives. It facilitates our customers’ adoption of DevOps while ensuring compliance with stringent security requirements.”

Frank S. Digiacomo Director of Business Development, Booz Allen Hamilton
This guide breaks down the PCI DSS requirements section by section and provides clear instructions on how to design and operate a compliant containerized environment.
The Guide to PCI Compliance for Containers