Vertical Industries  >   Financial Services Industry  >  

Securities Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Equity Trading, Security and Commodity Brokers, Stock Market, Security Brokers, Financial Securities Industry, Commodity Brokers, Mutual Fund Industry, Futures Trading, Commodity Investing Industry, Brokerage Houses
DEFINITION: Establishments in this group are primarily engaged in one of the following: underwriting securities issues and/or making markets for securities and commodities; acting as agents (i.e., brokers) between buyers and sellers of securities and commodities; providing security and commodities exchange services; and providing other services, such as managing portfolios of assets; providing investment advice;  … 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Securities Industry White Papers (View All Report Types)
1 - 25 of 38 Matches Previous Page  |  Next Page
How to Build a Soc with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Having a security operations center (SOC) has become an absolute necessity for implementing threat lifecycle management to minimize damage caused by successful attacks. This white paper offers a guide to building an SOC with limited resources and provides the basics of the cyberattack lifecycle through the threat lifecycle management framework.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

The 3 Keys to Faster Threat Response
sponsored by RSA
WHITE PAPER: According to the latest RSA study rating organizations' cybersecurity maturity, 74% of those surveyed have inadequate systems to quickly recover from an attack. Explore this e-book to uncover a deeper understanding into 3 keys to a faster threat response.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

Measuring Cybersecurity Preparedness
sponsored by Dell SecureWorks
WHITE PAPER: According to the 2017 Cybersecurity Breaches Survey, 7 in 10 large UK enterprises experienced an attack or breach within the past 12 months. This Frost & Sullivan white paper reveals the overall cybersecurity preparedness of large UK organizations and places organizations in 3 categories: underprepared, in transition and security leaders.
Posted: 18 Dec 2017 | Published: 18 Dec 2017

Dell SecureWorks

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

Cybersecurity Dissonance: Security Gap Between Perception and Reality
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: To meet their security needs, many SMBs are working with a security operations center (SOC). Learn how a SOC can help meet your protection needs, and discover other key security info in this resource.
Posted: 01 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

Choosing the Right Provider for Mobile and Cloud Security
sponsored by MobileIron
WHITE PAPER: Learn about a mobile and cloud security provider that can help you secure any mobile app or cloud service on any device, simplify user access with certificate-based authentication, and more.
Posted: 04 Apr 2017 | Published: 30 Dec 2016

MobileIron

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

The Importance of Cloud Security Services
sponsored by Dell SecureWorks
WHITE PAPER: If you are already taking advantage of cloud service providers, are you confident that you have the right security measures in place? Learn how to tightly secure your cloud environment in this white paper.
Posted: 09 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

The Importance of Incident Management Services
sponsored by Dell SecureWorks
WHITE PAPER: The worst time to realize you are not prepared for a security incident is during a breach. Without a proven response plan or strategy, stressed personnel must make crucial decisions without a clear sense of order and priority. Discover how to prepare your enterprise for a security incident in this white paper.
Posted: 09 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

Spain: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Spain receive the most malware, phishing and spam attacks?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec

Evolving the Mobile Security Architecture Toward 5G
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper prepares your mobile security for 5G by examining the mobile threat landscape, software programmability and cellular standards.
Posted: 07 Jun 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

From Spreadsheets To Software: The Intelligent Way To Manage Third-Party Risk
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Learn about forward-thinking systems that make third-party risk management a simpler and more efficient process.
Posted: 02 Jun 2017 | Published: 30 Dec 2016

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

Managed Detection and Response
sponsored by Dell SecureWorks
WHITE PAPER: Being resilient to a threat from an advanced adversary is dependent on your organization's integrated capabilities to quickly detect them and respond. In this white paper, learn how you can employ and tune the security tools at your organization to combat today's threats.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and Intel® Xeon
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and Intel® Xeon

Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

5 Ways to Maximize the Value of Security & Monitoring Tools
sponsored by Ixia
WHITE PAPER: ROI is an important factor for evaluating the value of your network security infrastructure. In this white paper, learn how you can start eliminating visibility and security blind spots and extend the life of your monitoring tools.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Do You Trust Your Network Security?
sponsored by Ixia
WHITE PAPER: Protecting your network requires a deeper strategy than simply buying security inspection tools, integrating them, and expecting them to comprehensively inspect all of your traffic. Learn how to test your network elements before you go live in order to provide your organization the confidence that your network can survive an attack.
Posted: 06 Feb 2017 | Published: 30 Dec 2016

Ixia

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM
1 - 25 of 38 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement