Vulnerability Management

Built for Your Ever-Changing Container Environment

Containers and cloud native environments are constantly changing as developers and DevOps engineers build and deploy modern applications. Developers want to integrate vulnerability scanning into their CI process, while security teams want to continuously monitor and prevents risks to all the containers, images, and hosts in their environment. Twistlock combines deep insight into vulnerabilities across your stack with knowledge of your runtime deployment to create risk scoring specific to your unique environment.

Prevent Risk Throughout the SDLC

Don’t just understand your risks – prevent them. Twistlock is uniquely able to prevent the deployment of vulnerable images across your environment. Create granular policies that match your business requirements, like “prevent running images with medium or high Java vulnerabilities, for which vendor fixes are available, in my PCI environment”. Create policies centrally and have them enforced across thousands of hosts.

Security from Development to Production

Twistlock is the only vulnerability management tool you’ll need to securely deploy containers. Automated and custom policy enforcement offers complete control at every stage of the application lifecycle. Display detailed, actionable vulnerability findings for every build, in the same UI your dev teams are already using. Scan images in any registry, anywhere.

Integrate Security with Your Current Toolkit

Twistlock integrates with any CI tool and all your data is available in open formats like CSV, JSON, and even can be logged to syslog. Automate every aspect of scanning with a comprehensive API that makes it simple to integrate Twistlock with the rest of your CI/CD tooling. Developers, devops teams, and security teams can see measure risk over time with clear graphics and trend lines as issues are identified and remediated.

Leverage Next-Generation Vulnerability Intelligence

The Twistlock Intelligence Stream sources and aggregates vulnerability information directly from 30+ upstream projects, commercial sources, and proprietary research from Twistlock Labs. We focus on having the most precise data available covering all layers of your stack, so you have accurate visibility and the lowest rate of false positives. Twistlock combines this data with knowledge of your actual deployments such as which containers are exposed to the internet, which run with high privilege, and which have other security mitigations in place, so you can always see what vulnerabilities are most critical in your specific environment.

Adding security to a container based implementation of DevOps is essential for vulnerability management, audit logging and permission management to realize economic benefit in software security.”

Jim Routh CISO, Aetna

We are very pleased with Twistlock’s integration with CVE databases and the support of multiple technologies for vulnerability detection. This allows us to continue to grow container adoption without worrying about security.”

Ariel Moskovich DevOps Lead, AppsFlyer

Twistlock’s container security technology is a real differentiation for Booz Allen Hamilton’s Government-facing initiatives. It facilitates our customers’ adoption of DevOps while ensuring compliance with stringent security requirements.”

Frank S. Digiacomo Director of Business Development, Booz Allen Hamilton