Palo Alto Networks Announces Intent to Acquire Twistlock. Get the details >

Vulnerability Management

Security from Development to Production

Identify and prevent vulnerabilities across the entire application lifecycle while prioritizing risk for your cloud native environments. Developers want to integrate vulnerability management into their CI process, while security teams want to continuously monitor, identify, and prevent risks to all the containers, images, and hosts in their environment. Twistlock provides deep insight into vulnerability management with cloud native intelligence and knowledge about your runtime deployments to create risk scoring that’s specific to your applications.

Prevent Risk Throughout the SDLC

Don’t just understand your risks – prevent them. Twistlock is uniquely able to prevent the deployment of vulnerable images across your environment. Create granular policies that match your business requirements, like “prevent running images with medium or high Java vulnerabilities, for which vendor fixes are available, in my PCI environment”. Create policies centrally and have them enforced across thousands of hosts.

Security from Development to Production

Twistlock is the only vulnerability management tool you’ll need to securely deploy containers. Automated and custom policy enforcement offers complete control at every stage of the application lifecycle. Display detailed, actionable vulnerability findings for every build, in the same UI your dev teams are already using. Scan images in any registry, anywhere.

Integrate Security with Your Current Toolkit

Twistlock integrates with any CI tool and all your data is available in open formats like CSV, JSON, and even can be logged to syslog. Automate every aspect of scanning with a comprehensive API that makes it simple to integrate Twistlock with the rest of your CI/CD tooling. Developers, devops teams, and security teams can measure risk over time with clear graphics and trend lines as issues are identified and remediated.

Leverage Next-Generation Vulnerability Intelligence

The Twistlock Intelligence Stream sources and aggregates vulnerability information directly from 30+ upstream projects, commercial sources, and proprietary research from Twistlock Labs. We focus on having the most precise data available covering all layers of your stack, so you have accurate visibility and the lowest rate of false positives. Twistlock combines this data with knowledge of your actual deployments such as which containers are exposed to the internet, which run with high privilege, and which have other security mitigations in place, so you can always see what vulnerabilities are most critical in your specific environment.

Adding security to a container based implementation of DevOps is essential for vulnerability management, audit logging and permission management to realize economic benefit in software security.”

Jim Routh CISO, Aetna

We are very pleased with Twistlock’s integration with CVE databases and the support of multiple technologies for vulnerability detection. This allows us to continue to grow container adoption without worrying about security.”

Ariel Moskovich DevOps Lead, AppsFlyer

Twistlock’s container security technology is a real differentiation for Booz Allen Hamilton’s Government-facing initiatives. It facilitates our customers’ adoption of DevOps while ensuring compliance with stringent security requirements.”

Frank S. Digiacomo Director of Business Development, Booz Allen Hamilton
This guide breaks down the PCI DSS requirements section by section and provides clear instructions on how to design and operate a compliant containerized environment.
The Guide to PCI Compliance for Containers