Vertical Industries  >   Financial Services Industry  >  

Securities Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Equity Trading, Security and Commodity Brokers, Stock Market, Security Brokers, Financial Securities Industry, Commodity Brokers, Mutual Fund Industry, Futures Trading, Commodity Investing Industry, Brokerage Houses
DEFINITION: Establishments in this group are primarily engaged in one of the following: underwriting securities issues and/or making markets for securities and commodities; acting as agents (i.e., brokers) between buyers and sellers of securities and commodities; providing security and commodities exchange services; and providing other services, such as managing portfolios of assets; providing investment advice;  … 
Definition continues below.
Securities Industry Reports
1 - 25 of 65 Matches Previous Page  |  Next Page
Machine Learning in Cyber Security
sponsored by Recorded Future
WHITE PAPER: AI systems are helping security operations centers function quicker and assess problems faster. Read this white paper to discover how your security posture can benefit from predictive analytics and threat intelligence.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

Hybrid Active Directory Security Detection and Alerting
sponsored by Quest
EBOOK: Changes to Active Directory are being made daily without your knowledge. Read this e-book to uncover how to suspect inappropriate changes and take action to protect yourself.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Quest

Hybrid Active Directory Security Investigation and Recovery
sponsored by Quest
EBOOK: Discover how to ensure user security while working with Active Directory as well as identify changes across multiple systems.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Quest

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

SearchSecurity.com

Security Delivery Platforms for Dummies
sponsored by Gigamon
EBOOK: Access this for dummies e-book to discover how a security delivery platform can eliminate network blind spots, optimize security tool performance and scalability and resolve conflict between network and security ops.
Posted: 13 Jun 2017 | Published: 30 Dec 2016

Gigamon

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

SANS Review: SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: In this brief resource, SANS reviews Arctic Wolf's SOC-as-a-Service offering so you can see how it stacks up against the competition.
Posted: 02 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

Cybersecurity Dissonance: Security Gap Between Perception and Reality
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: To meet their security needs, many SMBs are working with a security operations center (SOC). Learn how a SOC can help meet your protection needs, and discover other key security info in this resource.
Posted: 01 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

Ransomware: The Most Profitable Malware in History
sponsored by Cisco Umbrella
RESOURCE: Learn how to combat ransomware with four resources, including a blog post that details ransomware's past, present and future and a slideshow of ten shocking new facts about ransomware.
Posted: 30 May 2017 | Published: 30 Dec 2016

Cisco Umbrella

What's Driving Ransomware Attacks and How Should You Respond?
sponsored by Cisco Umbrella
WEBCAST: VP of Research at Gartner and leading authority on endpoint and server protection strategies, Peter Firstbrook, and Cisco Umbrella's CTO, Dan Hubbard, address the explosion of ransomware in the market and the simplest way for security practitioners to stay ahead of these attacks in this webcast.
Posted: 30 May 2017 | Premiered: Dec 30, 2016

Cisco Umbrella

Ransomware Defense for Dummies
sponsored by Cisco Umbrella
EBOOK: This Ransomware Defense For Dummies consists of five chapters that explore all you need to know to protect yourself from a costly ransomware attack.
Posted: 26 May 2017 | Published: 31 Jan 2017

Cisco Umbrella

Countering Evolving Cybersecurity Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.
Posted: 11 May 2017 | Published: 23 Jan 2017

Fortinet, Inc.

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany
Posted: 10 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Rethinking the Approach to Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.
Posted: 04 May 2017 | Published: 10 Feb 2017

Fortinet, Inc.

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany it.
Posted: 03 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Countering Evolving Cybersecurity Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.
Posted: 03 May 2017 | Published: 23 Jan 2017

Fortinet, Inc.

A Security Leaders Definitive Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it.
Posted: 02 May 2017 | Published: 30 Jan 2017

Fortinet, Inc.

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.
Posted: 02 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 01 May 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Demystifying The Threat Landscape: 10 Ways Network Security Pros Can Step Up Game
sponsored by F5 Networks
WHITE PAPER: In this eBook, you'll learn more about the changing network security landscape, where your business is most vulnerable today, and 10 areas you can step up your security game.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk Software, Inc
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk Software, Inc

From Spreadsheets To Software: The Intelligent Way To Manage Third-Party Risk
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Learn about forward-thinking systems that make third-party risk management a simpler and more efficient process.
Posted: 02 Jun 2017 | Published: 30 Dec 2016

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
1 - 25 of 65 Matches Previous Page    1 2 3    Next Page
 
SECURITIES INDUSTRY DEFINITION (continued): … Establishments in this group are primarily engaged in one of the following: underwriting securities issues and/or making markets for securities and commodities; acting as agents (i.e., brokers) between buyers and sellers of securities and commodities; providing security and commodities exchange services; and providing other services, such as managing portfolios of assets; providing investment advice; and trust, fiduciary, and custody services.Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement