Twistlock Enterprise Edition
Twistlock is the first end-to-end security solution for containerized environments. Protect against exploits, malware and active threats with Twistlock’s advanced intelligence and machine learning capabilities. Automated policy creation and enforcement along with native integration to leading CI/CD tools provide security that doesn’t slow development. Robust compliance checks and extensibility allow full control over your environment from developer workstations through to production.
Twistlock runtime defense protects your containers against exploits, compromises, program mistakes and configuration errors. We monitor container activities, detect policy violations, report anomalies and execute corrective actions. We do all this without changing your host, your containers, the container daemon, or your applications.
Twistlock scans container images in registries, on dev workstations and on production servers for vulnerabilities and mis-configurations. We detect and report vulnerabilities in the Linux distro, app frameworks and even your customer app packages. The scanning tasks are seamlessly integrated with CI pipelines and existing processes.
The Twistlock access control solution allows you to define and enforce fine-grained policies governing user access to Docker and Kubernetes resources. Extend existing policies or define net-new–our access control layer is both flexible and powerful enough to handle most enterprise use cases.
With Twistlock, you can enforce standard configurations, container best practices, the use of trusted registries and recommended deployment templates. You will gain assurance that your containers environments wherever they reside, remain compliant with industry or company policies.
Twistlock integrates directly into your CI process so you can find and fix problems before they ever make it into production. Our continuous integration provides native plugins for popular CI tool platforms like Jenkins and TeamCity and a standalone scanner you can use with literally any other tool or workflow you have. Our plugins allow developers to see vulnerability status every time they run a build, without having to run a separate tool or use a different interface. Security teams can set policies that act as quality control gates to ensure only remediated images progress down the pipeline.
|Categories||Cloud and Virtualization > Containers > Container Clustering, Config, Management|
Cloud and Virtualization > Containers > Container Infrastucture
DevOps and Orchestration > Application Deployment
DevOps and Orchestration > Configuration Management and Continuous Integration
Security > Security Management and Analytics
Security > Vulnerability Assessment and Penetration
Use of the SDxCentral service directory is governed by our Terms of Service, including without limitation those sections under the headings "CONTENT", "LICENSING AND OTHER TERMS APPLYING TO CONTENT POSTED ON THE SDXCENTRAL SITES", "INDEMNITY; DISCLAIMER; LIMITATION OF LIABILITY" AND "COPYRIGHTS". Under no circumstances will SDxCentral be liable in any way for any Content, including, but not limited to, liability for any errors or omissions in any Content or for any loss or damage of any kind incurred as a result of the use of any Content posted, emailed or otherwise transmitted via the Sites.