Vertical Industries  >   Financial Services Industry  >  

Securities Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Equity Trading, Security and Commodity Brokers, Stock Market, Security Brokers, Financial Securities Industry, Commodity Brokers, Mutual Fund Industry, Futures Trading, Commodity Investing Industry, Brokerage Houses
DEFINITION: Establishments in this group are primarily engaged in one of the following: underwriting securities issues and/or making markets for securities and commodities; acting as agents (i.e., brokers) between buyers and sellers of securities and commodities; providing security and commodities exchange services; and providing other services, such as managing portfolios of assets; providing investment advice;  … 
Definition continues below.
Securities Industry Reports
1 - 25 of 83 Matches Previous Page  |  Next Page
Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec

The Buck Stops Where?
sponsored by BitSight
WHITE PAPER: By 2020, Gartner estimates that 75% of Fortune 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. In this white paper, gain insight into how data breaches are affecting both large and small businesses and how these businesses can mitigate their risks of future data breaches.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

BitSight

How Ransomware Attacks have Changed
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

Logrythm's Security Analytics Platform: Product Overview
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.
Posted: 20 Sep 2017 | Published: 14 Sep 2017

LogRhythm, Inc.

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
VIDEO: Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.
Posted: 19 Sep 2017 | Premiered: 19 Sep 2017

CyberArk Software, Inc

Euronext Case Study: Implementing an Endpoint Protection Platform
sponsored by Symantec & Blue Coat Systems
CASE STUDY: Euronext's recent IPO was a catalyst to create a coherent security environment across the new business. Read this case study to uncover how Euronext overcame its security challenges by implementing an endpoint protection platform.
Posted: 14 Sep 2017 | Published: 31 Dec 2015

Symantec & Blue Coat Systems

Sweden: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Sweden experience the most email attacks, including: malware, phishing, and spam?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

LogRhythm, Inc.

Optimize your AML Investigation Productivity
sponsored by Attivio, Inc.
EBOOK: Read this e-book to reveal a holistic view of risk and compliance to strengthen your anti-money laundering software.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

The Power of the Proxy
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how the Proxy platform protects you by stopping advanced and evasive malware.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Symantec & Blue Coat Systems

United Kingdom: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Take a closer look at this brief resource to reveal cyber threat statistics based on company size and industry in the UK.
Posted: 13 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Netherlands: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
RESOURCE: Discover which company sizes amongst industries receive the most malware, phishing, and spam attacks.
Posted: 12 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Saudi Arabia: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
RESOURCE: Which industries receive the most email attacks, including malware, phishing and spam?
Posted: 12 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

Travis Perkins PLC Adopts Analytics-Driven SIEM to Enable Hybrid Cloud Transition
sponsored by Splunk Services UK Ltd
CASE STUDY: Uncover how a cloud-first approach and machine learning can enhance your security posture across hybrid environments. Read this case study to learn more about the benefits Travis Perkins PLC saw.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

Splunk Services UK Ltd

Are You a Proxy Pro? Put Yourself to the Test
sponsored by Symantec
WHITE PAPER: ProxySG consolidates a broad feature-set to authenticate users, filter web traffic, identify cloud application usage, and provide data loss prevention and more. Check out these key capabilities you should leverage on your Blue Coat Proxy.
Posted: 23 Aug 2017 | Published: 31 Dec 2016

Symantec

A New Dawn For Data Privacy
sponsored by Symantec
RESOURCE: At GDPR's core is the idea of privacy as a fundamental right, along with radical changes in the way organizations are required to manage data. Check out this infographic to start preparing your organization for the 2018 deadline.
Posted: 23 Aug 2017 | Published: 23 Aug 2017

Symantec

Office 365 Risk Mitigation
sponsored by Mimecast
WHITE PAPER: Read this white paper to discover suggestions to enhance the security of your Office 365. With the suggestions provided, determine which security tactics will improve your security posture.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Mimecast

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec

Advanced Email Security
sponsored by Proofpoint, Inc.
RESOURCE: Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Proofpoint, Inc.

Global Bank Achieves Database Security Success
sponsored by Trustwave
CASE STUDY: Check out how one international banking organization overcame the challenge of protecting their databases with their existing technology that was complex and difficult to deploy.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Trustwave

The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Spain: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Spain receive the most malware, phishing and spam attacks?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Germany: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
RESOURCE: Check out this resource to uncover cyber threat statistics in Germany broken up by source ranking, location and more.
Posted: 13 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems
1 - 25 of 83 Matches Previous Page    1 2 3 4    Next Page
 
SECURITIES INDUSTRY DEFINITION (continued): … Establishments in this group are primarily engaged in one of the following: underwriting securities issues and/or making markets for securities and commodities; acting as agents (i.e., brokers) between buyers and sellers of securities and commodities; providing security and commodities exchange services; and providing other services, such as managing portfolios of assets; providing investment advice; and trust, fiduciary, and custody services.Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement