Twistlock Container Security Platform

Twistlock is the cloud native cybersecurity platform for modern applications.

Container Security

Twistlock Container Security – Overview

Enterprise adoption of devops methodologies alongside the utilization of containers and microservices has changed the way modern applications are built and deployed. Organizations deliver value via software faster than ever before. Traditional security lacks the capabilities and depth required to protect modern applications and slows down development — putting blockers in front of value. Twistlock Container Security is purpose-built to deliver security to modern applications, offering better protection than ever before.

Security Across the Application Lifecycle

Container Security

Twistlock - Dashboard

Container Security - Dashboard

Request a Demo

eSec Forte Technologies is an Cert-In Empanelled | CMMi Level 3 | ISO 9001:2008 | ISO 27001-2013 certified Cyber Security and IT Services Company, Having headquarters in Gurugram, Mumbai, Bangalore, Delhi &– India, Singapore, Dubai & Sri Lanka.

Get Demo

Twistlock Container Security – Features

Runtime Defense

From network and application firewall, to container runtime defense, to host protection, Twistlock is the only security tool you need to defend your environment against active threats. Machine-learning powered runtime protection secures your entire environment leveraging network, file system, processes and system calls. Twistlock Runtime Defense offers automated enforcement of security model across your entire environment — deployed at scale with your container orchestrator. Security teams benefit from real-time incident detection and forensics providing a more comprehensive, autonomous, and actionable approach to incident response, with less performance burden, directly integrated with your runtime defense tooling.

Vulnerability Management

Twistlock automatically scans images at the build, in registry, and on running hosts. By integrating vulnerability management into CI / CD, users can create thresholds to alert or block code as it is built or deployed. Twistlock Vulnerability Explorer uses contextual data of your environment to automate risk scoring. Vulnerability data is powered by the Twistlock Intelligence Stream, which sources and aggregates vulnerability information directly from 30+ upstream projects, commercial sources, and proprietary research from Twistlock Labs.

Cloud Native Firewalls

Twistlock Cloud Native Network Firewall (CNNF) and Cloud Native Application Firewall (CNAF) and are automatically-modeled and deployed layer-3 and layer-7 firewalls for cloud native environments. Powered by the Twistlock Intelligence Stream, they automatically learn the network topology of your applications, provide application-tailored microsegmentation for all your microservices, and detect and prevent XSS attacks, SQL injection, and other modern threats.

Compliance

Twistlock automatically ensures compliance across images, hosts, containers. The Twistlock Platform offers native support for the Docker, Kubernetes, and Linux CIS Benchmarks, and provides templates for HIPAA, PCI, GDPR, and NIST SP 800-190 as well as full customization via OpenSCAP / XCCDF and custom Bash scripts. Compliance is integrated into CI / CD, so users can create thresholds to alert or block code as it is built or deployed.

CI/CD

Twistlock is fully integrated into your build and deploy pipeline. Automated as well as custom policies can block builds or deployments based on vulnerability intelligence or internal or external compliance regimes. Twistlock offers a native plugin for Jenkins, as well as a standalone command line scanner called twistcli — allowing development teams to integrate with any tool involved at the build process. Enterprises leverage Twistlock to specify theimages and registries that they have validated, and then Twistlock protects environments by preventing any other image, of unknown provenance, from running in specific environments.

Access Control

Twistlock Access Control allows you to define and enforce fine-grained policies governing user access to Docker and Kubernetes resources. Twistlock offers broad enterprise identity integrations with central credential management across cloud platforms. Comprehensive auditing features high fidelity audit detail for Docker API with a single view, including host audits for sudo and sshd..

BENEFITS

1
Automated

Advanced threat intelligence and machine learning capabilities deliver automated policy creation, runtime protection, and firewalling. As soon as code is built and deployed, Twistlock automatically acts based on your compliance state

2
Integrated

From CI/CD, to SIEM, to access control and secrets management, Twistlock integrates with the tools your developers use to deliver software and the tools your security teams already leverage for protection — the necessary combination of speed and visibility for today’s enterprises

3
Scalable

Twistlock runs in any environment, be it bare metal, public cloud, or anything in between. Twistlock supports all leading cloud providers and operating systems. Built for the world’s leading enterprises — Twistlock is engineered to automatically scale up and down as your environment and applications do.

We Want to Hear from You !!

Contact us today to learn more about our products and services.

Contact Us