Twistlock started as the container security platform that didn't make you want to throw your laptop out the window. The original team actually understood how containers work in production instead of just reading the Docker docs. Then Palo Alto bought them for $410 million in 2019 and now everything's part of Prisma Cloud, which means you get enterprise pricing for features you actually want.
The acquisition details show this wasn't just a talent grab - Palo Alto wanted Twistlock's runtime protection capabilities and their deep understanding of container orchestration security. But like most enterprise acquisitions, it came with pricing changes that hit existing customers hard.
How This Shit Actually Works
The whole system revolves around Defenders - these agents you install everywhere that supposedly don't impact performance. They're "lightweight" until you have 500 containers and they're eating 15% of your CPU during image scans. The architecture documentation makes it sound simple, but installing Defenders across 50+ Kubernetes nodes will ruin your weekend.
You get two ways to deploy this:
Self-Hosted (Compute Edition): You run the Console yourself, which means when it breaks at 2 AM, you're the one fixing it. Good news: you control the data. Bad news: you control the data, including the 500GB of scan results that accumulate faster than you'd expect. The YAML configs are massive and half the pods will crash on restart until you tune the resource limits.
SaaS Integration (Enterprise Edition): Palo Alto hosts it for you in their broader Prisma Cloud mess. Costs more but someone else deals with the 3 AM outages. You'll spend weeks figuring out which settings live where in the unified interface.
The Good Parts (Yes, There Are Some)
Twistlock actually does runtime protection right. While other tools are still trying to figure out containers, this thing monitors process execution, network connections, and filesystem changes in real time. The machine learning baseline takes about 2 weeks to stop alerting on your legitimate backup scripts, but once it learns your environment, it catches weird shit that signature-based tools miss.
Build Integration: The CI/CD plugins actually work. Jenkins, GitLab, whatever - it'll scan your images before they hit production and fail builds with high-severity vulns. The integration with Azure DevOps and GitHub Actions is solid too. Just don't be surprised when it flags every Python base image for having 47 "critical" vulnerabilities - half are OpenSSL versions from 2019 that don't actually affect your containerized app, but try explaining that to security.
Deploy-Time Gates: Admission controllers that actually prevent bad images from running. The image signing verification works if you can survive the key management nightmare.
Runtime Monitoring: This is where it shines. Behavioral monitoring catches cryptominers, privilege escalation attempts, and containers trying to phone home to sketchy IPs. The forensics are solid - when something goes wrong, you can actually see what happened instead of just getting an alert that says "suspicious activity detected."
What The Docs Don't Tell You
The vulnerability database is comprehensive but overwhelming. You'll get alerts for every CVE from 2015, including ones that don't actually affect your containerized apps. The ML models need constant tuning unless you enjoy getting 500 false positive alerts per day about your monitoring agents "exhibiting suspicious behavior."
Unit 42's threat intelligence is actually good, but half the signatures they push will trigger on legitimate DevOps tooling. The threat detection models are sophisticated but need heavy tuning. Plan to spend your first month creating exceptions for Ansible, Terraform, and whatever configuration management tools you're running. The MITRE ATT&CK framework integration helps contextualize alerts but doesn't reduce the noise.