Vertical Industries  >   Financial Services Industry  >  

Securities Industry

RSS Feed   
ALSO CALLED: Equity Trading, Security and Commodity Brokers, Stock Market, Security Brokers, Financial Securities Industry, Commodity Brokers, Mutual Fund Industry, Futures Trading, Commodity Investing Industry, Brokerage Houses
DEFINITION: Establishments in this group are primarily engaged in one of the following: underwriting securities issues and/or making markets for securities and commodities; acting as agents (i.e., brokers) between buyers and sellers of securities and commodities; providing security and commodities exchange services; and providing other services, such as managing portfolios of assets; providing investment advice;  … 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Securities Industry Reports
1 - 25 of 48 Matches Previous Page  |  Next Page
Building Networks with Security at Their Core
sponsored by 128 Technology
WHITE PAPER: Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

128 Technology

Authentication for Your Ever-Changing Needs
sponsored by Micro Focus
WHITE PAPER: In today's connected world, outsider threats are real and—at times—daunting. User credentials for access serve as an essential layer of defense. Learn about Micro Focus Advanced Authentication, which can enable secure interaction with employees, partners, and customers in this white paper.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Micro Focus

A Network Operations Guide for Intent-Based Segmentation
sponsored by Fortinet, Inc.
WHITE PAPER: Download this white paper to learn more about Intent-based Segmentation and how it can help you effectively improve security posture, mitigate risks, and support compliance and operational efficiency—without altering your network architecture.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Fortinet, Inc.

How To Secure IaaS/PaaS Effectively: Customer Responsibilities in the Shared Security Model
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the impact of IaaS/PaaS on your security focus, your responsibilities under shared security models, and a security analysis of IaaS/PaaS vs. on-premise environments.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

MASERGY

Tuning Your Log Volume
sponsored by Corelight
WHITE PAPER: In this white paper, learn how filtering can help reduce log volume and make it more manageable and useful—rather than letting it unintentionally fill up disks or drive up SIEM costs.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

Corelight

Zscaler: Use Cases for Gateway Security Stack as a Service
sponsored by Zscaler
CASE STUDY: Download this white paper to learn how you could shift from a hub-and-spoke architecture to an agile, direct-to-internet architecture by using a gateway security stack as a service.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

Zscaler

The Soar Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
WHITE PAPER: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Splunk

Security Automation and Orchestration (SAO) Capabilities
sponsored by Swimlane
WHITE PAPER: Security Automation and Orchestration (SAO) platforms help security teams manage a growing volume of alerts and incidents more efficiently by automating manual response workflows. Download this white paper to learn about SAO platforms, and explore common features and capabilities.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Swimlane

The State of Web Application Security
sponsored by Radware
WHITE PAPER: Download this white paper on web application security for a summary of current global perceptions on the state of application attacks, and insights on how to best identify and mitigate threats in the future.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

IoT Attack Handbook
sponsored by Radware
WHITE PAPER: Download this IoT Attack Handbook to learn about each Mirai attack vector, understand the profile and parameters of the attacks and explore how to defend against each of the attacks.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

Applying Software-Defined Security to the Branch Office
sponsored by Versa Networks
WHITE PAPER: The end goal of deploying software-defined security (SD-Security) for your branch offices is to have additional layers of security for better defense-in-depth, when and where you need them. Read this white paper to learn how you can apply SD-security to your branch office.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

Versa Networks

Exposed & At Risk: Why Your Approach to Web Application Security is Insufficient
sponsored by ThreatX
WEBCAST: Watch this webinar to learn about combining web app security approaches and modern web app firewall tech to address the rapidly evolving the security needs of hybrid cloud environments.
Posted: 29 Aug 2018 | Premiered: Aug 29, 2018

ThreatX

2018: Cyberthreat Predictions & Security Strategy
sponsored by Aruba Networks
VIDEO: With major breaches exposing a vast amount of personal information and disruptive ransomware attacks shaking the world, it is critical to examine the lessons learn from these events to shape a strategy. In this webinar, listen to a panel of security experts as they discuss.
Posted: 10 Aug 2018 | Premiered: 02 Aug 2018

Aruba Networks

LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'
sponsored by LogRhythm, Inc.
ANALYST REPORT: Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

LogRhythm, Inc.

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

SearchSecurity.com

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

SANS Review: SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: In this brief resource, SANS reviews Arctic Wolf's SOC-as-a-Service offering so you can see how it stacks up against the competition.
Posted: 02 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

Array Networks Secure Access Gateway Datasheet (SSL VPN)
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's AG Series secure access gateways and see how they match up against the competition.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

Array Networks

5 Ways to Manage Mobility and IOT Risks
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn the five steps you need to take to mitigate the risk of mobile and IoT-enabled data breaches.
Posted: 24 Mar 2017 | Published: 30 Dec 2016

Aruba Networks

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

How Ransomware Attacks have Changed
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

Logrythm's Security Analytics Platform: Product Overview
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.
Posted: 20 Sep 2017 | Published: 14 Sep 2017

LogRhythm, Inc.

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk Software, Inc
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk Software, Inc

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks
1 - 25 of 48 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement