Vulnerability Management

Security from Development to Production

Identify and prevent vulnerabilities across the entire application lifecycle while prioritizing risk for your cloud native environments. Integrate vulnerability management into any CI process, while continuously monitoring, identifying, and preventing risks to all the hosts, images, and functions in your environment. Twistlock combines powerful vulnerability detection with always up to date intelligence and knowledge about your runtime deployments to prioritize risks specifically for your environment.

Prevent Risk Throughout the SDLC

Don’t just understand your risks–prevent them. Twistlock is uniquely able to prevent the deployment of vulnerable images across your environment. Build granular policies that match your business requirements, like “prevent running images with high or critical vulnerabilities, for which vendor fixes are available, in my PCI environment”. Create policies centrally and have them enforced across thousands of nodes.

Security Across the Entire Application Lifecycle

Twistlock is the only vulnerability management tool you’ll need to securely build and deploy cloud native applications. Automated and custom policy enforcement offers complete control at every stage of the application lifecycle. Display detailed, actionable vulnerability findings for every build, in the same UI your dev teams are already using. Scan images and functions in any registry, anywhere.

Integrate Security Into Any Tooling

Twistlock integrates vulnerability scanning with any CI tool and makes all your data available in open formats like CSV, JSON, and even syslog. Automate every aspect of scanning with a comprehensive API that makes it simple to integrate Twistlock with the rest of your CI/CD tooling. Developers, devops teams, and security teams can measure risk over time with clear graphics and trend lines as issues are identified and remediated.

Leverage Broad Spectrum Vulnerability Intelligence

The Twistlock Intelligence Stream sources and aggregates vulnerability information directly from 30+ upstream projects, commercial sources, governmental providers, and proprietary research from Twistlock Labs so you have the most precise data available covering all layers of your stack with accurate visibility and the lowest rate of false positives. Twistlock combines this data with knowledge of your actual deployments such as which containers are exposed to the internet, which run with high privilege, and which have other security mitigations in place, so you can always see what vulnerabilities are most critical in your specific environment.

Adding security to a container based implementation of DevOps is essential for vulnerability management, audit logging and permission management to realize economic benefit in software security.”

Jim Routh CISO, Aetna

We are very pleased with Twistlock’s integration with CVE databases and the support of multiple technologies for vulnerability detection. This allows us to continue to grow container adoption without worrying about security.”

Ariel Moskovich DevOps Lead, AppsFlyer

Twistlock’s container security technology is a real differentiation for Booz Allen Hamilton’s Government-facing initiatives. It facilitates our customers’ adoption of DevOps while ensuring compliance with stringent security requirements.”

Frank S. Digiacomo Director of Business Development, Booz Allen Hamilton
This guide breaks down the PCI DSS requirements section by section and provides clear instructions on how to design and operate a compliant containerized environment.
The Guide to PCI Compliance for Containers
DOWNLOAD
DOWNLOAD COMPLIANCE GUIDE