Tech Library White Papers

See our Free Webcasts.

  • Why Runtime Application Self-Protection is Critical for Next Generation App Security

    As application publishers, you have no control over your users and their mobile devices. Apps often run on jailbroken or malware-infected devices; rogue apps are plentiful, thus opening doors for hackers to exploit mobile app vulnerabilities. So how do you ensure the security of your app and data? Read this paper and learn more.

  • A Developer's Guide to Securing Mobile Applications

    The 2016 Mobile Top 10 Risks published by OWASP include such vulnerabilities as improper platform usage, insecure communication, storage, poor user authentication and authorization, and even the provisioning process. Learn more.

  • Accelerate automation with Ansible by Red Hat

    Ansible by Red Hat® can help organizations achieve an effective approach to business automation, but the path to DevOps can be long and complex. Outdated habits must be replaced with more efficient practices, but new tools and processes require buy-in from various stakeholders across the organization. Additionally, groups must be taught the specific best practices for their work. Red Hat Consulting helps customers successfully adopt and integrate Ansible to create and sustain standardized, centralized automation practices that add business and market value and build a solid foundation for DevOps.

  • Red Hat Open Innovation Labs

    Red Hat Open Innovation Labs is an immersive residency that arms customers with the skills, tools, and process to deliver better software, more quickly, to meet the mandates of today’s market. Whether it’s co-creating a disruptive product, catalyzing cultural transformation in the enterprise, or discovering what’s possible with a suite of proven and open tools and methods — Open Innovation Labs is designed to accelerate organizations’ most innovative ideas. Read on.

  • Making Old Applications New Again

    In this white paper, Red Hat takes a look at three specific software development patterns to modernize existing applications. These modernization patterns address transitioning existing applications to more modern architectures and infrastructure and making them accessible to new applications.

  • Modernize Application Delivery with Container Platforms

    Businesses are increasingly interested in the value of container adoption. In the next two years, over 90% of organizations will make new investments in containers and other emerging technologies that facilitate DevOps. Seventy-one percent of organizations anticipate using containers for cloud applications or are already using them. Learn more.

  • A Structured Design Approach to Business Automation

    In many leading companies, IT must provide tools to help the business respond to competition, comply with industry regulations, and engage customers. IT is expected to provide solutions that are high quality, flexible enough for rapid, frequent change, and available at predictable preferably low cost. Learn more.

  • How to Securely Configure a Linux Host to Run Containers

    This guide, as part of the Twistlock Container Security How-To Guides series, describes the concrete steps that you can follow to configure a Linux host to run Docker containers securely. Learn more.

  • Guide to HIPAA Compliance for Containers

    For organizations using containerized environments to handle ePHI, ensuring HIPAA compliance without sacrificing the benefits of containers can be a challenge. Twistlock's Guide to HIPAA Compliance for Containers outlines clear steps to design and operate a fully-compliant containerized environment. Learn more.

  • Guide to PCI Compliance for Containers

    With the prevalence of electronic payments, nearly every organization is impacted by Payment Card Industry (PCI) Data Security Standard (DSS) requirements. However, there’s very little guidance on how to run containers in a manner that’s compliant with these requirements. The Twistlock Guide to PCI Compliance for Containers breaks down the PCI DSS requirements section by section and provides clear instructions on how to design and operate a containerized environment in a compliant manner. Learn more.

  • Solving Database Deployments with Database DevOps

    This whitepaper explains how to overcome challenges presented by database change management. By extending DevOps practices to the database, you gain consistency across applications and databases while increasing team efficiencies. Read more.

  • DevOps and Continuous Delivery eBook

    Read this eBook to learn everything you need to know about faster software releases. You’ll get all your questions answered about successfully adopting DevOps and Continuous Delivery in your enterprise. Learn more.