Tech Library White Papers

See our Free Webcasts.

  • A Structured Design Approach to Business Automation

    In many leading companies, IT must provide tools to help the business respond to competition, comply with industry regulations, and engage customers. IT is expected to provide solutions that are high quality, flexible enough for rapid, frequent change, and available at predictable preferably low cost. Learn more.

  • How to Securely Configure a Linux Host to Run Containers

    This guide, as part of the Twistlock Container Security How-To Guides series, describes the concrete steps that you can follow to configure a Linux host to run Docker containers securely. Learn more.

  • Guide to PCI Compliance for Containers

    With the prevalence of electronic payments, nearly every organization is impacted by Payment Card Industry (PCI) Data Security Standard (DSS) requirements. However, there’s very little guidance on how to run containers in a manner that’s compliant with these requirements. The Twistlock Guide to PCI Compliance for Containers breaks down the PCI DSS requirements section by section and provides clear instructions on how to design and operate a containerized environment in a compliant manner. Learn more.

  • cover

    NoSQL Database Evaluation Guide

    This paper delves deeply into each core requirement and provides a comparison of leading NoSQL databases against the eight core requirements.

  • Enterprise Java Community Reacts When Gartner App Platform Report Calls Java EE Obsolete

    When Gartner analysts issued a report saying Java EE is fading from relevance and on the verge of obsolescence, the Java EE community struck back. John Waters, editor-at-Large for Application Development Trends, captured the strong rebuttal to Gartner for his readers.

  • Fünf Schritte zur Vorbereitung auf Sicherheitslücken

    Dieses Dokument dient als Leitfaden zur Vorbereitung auf heikle Sicherheitslücken und unterstützt Risikomanagement- und Sicherheitsteams, damit sie mit der entsprechenden Dringlichkeit an die Sache herangehen können.

  • Wodurch entstehen Software-Sicherheitslücken?

    Unternehmen werden anfälliger für eine besonders häufige Art von Cyberangriffen – nämlich Angriffe auf Anwendungsebene.


    Laut Akamai nehmen Angriffe auf Anwendungsebene sehr viel schneller zu als Infrastrukturangriffe. Und doch sind viele Organisationen weiterhin zurückhaltend, ein Programm für die Anwendungssicherheit zu erstellen.

  • Magic Quadrant for Application Security Testing

    In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.

  • DevSecOps: How to Seamlessly Integrate Security Into DevOps

    Recent Gartner research indicates that 38% of enterprises are now using DevOps, and 50% will be actively using it by the end of 2016. It is important integrate security into the process. These best practices allow you to incorporate security into your DevOps program to achieve DevSecOps, maintaining speed of deployment with secure software benefits. Read more!

  • App Security Can’t Happen Without Developers

    To ensure your company does not suffer brand and financial damage due to a data breach, it is important to constantly keep security at the forefront. The most efficient and cost effective way to secure your applications is to have your development team be cognizant of security throughout the application development lifecycle. Read more!

  • Five Principles For Securing DevOps

    DevOps is a new way of organizing development and IT work, and DevOps practices are spreading rapidly. Although firms that install these programs are likely to be more profitable and productive, it’s also important to secure DevOps and understand how it changes the requirements for AppSec solutions. This eBook outlines the evolution of DevOps and the five principles that must be addressed to properly integrate DevOps and application security. Download the eBook now.