Vertical Industries  >   Financial Services Industry  >  

Securities Industry

RSS Feed   
ALSO CALLED: Equity Trading, Security and Commodity Brokers, Stock Market, Security Brokers, Financial Securities Industry, Commodity Brokers, Mutual Fund Industry, Futures Trading, Commodity Investing Industry, Brokerage Houses
DEFINITION: Establishments in this group are primarily engaged in one of the following: underwriting securities issues and/or making markets for securities and commodities; acting as agents (i.e., brokers) between buyers and sellers of securities and commodities; providing security and commodities exchange services; and providing other services, such as managing portfolios of assets; providing investment advice;  … 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Securities Industry Reports
1 - 25 of 99 Matches Previous Page  |  Next Page
6 Steps For Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. Download this white paper to learn about IBM Resilient, and review the 6 steps to developing sophisticated and robust incident response functions.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER: Download this white paper to learn about a dynamic threat blocking (DTB) tool that is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack, dynamically.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Armor

Why Dwell Time Should Be Considered a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: In this white paper, learn why operations centered on Dwell Time - in their architectures, policies and processes - have an opportunity to make meaningful enhancements to their security strategy and maximize the investments made in their current security programs.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Armor

How You Can Use the Dark Web for Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Deciphering the terminology around what the dark web is or isn't can be confusing. Learn how to better understand the dark web, the potential benefits of information gathered from these anonymous communities, and how it can be used to produce valuable threat intelligence.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

Understanding Security Processes and the Need to Automate
sponsored by Skybox Security
RESEARCH CONTENT: Most organizations have room to grow in their understanding of key security and security automation processes. In this report, explore the results of an in-depth Osterman Research survey focused on understanding current security processes and how organizations are working to improve and automate them.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Skybox Security

Critical Considerations for Choosing a Cloud Security Provider
sponsored by IBM Akamai
WHITE PAPER: Download this white paper to learn how you can augment your existing on-premises infrastructure with security measures in the cloud for a more robust web security posture, and explore 7 critical factors you should look for in a cloud security provider.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

IBM Akamai

Security Automation and Orchestration (SAO) Capabilities
sponsored by Swimlane
WHITE PAPER: Security Automation and Orchestration (SAO) platforms help security teams manage a growing volume of alerts and incidents more efficiently by automating manual response workflows. Download this white paper to learn about SAO platforms, and explore common features and capabilities.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Swimlane

The State of Web Application Security
sponsored by Radware
WHITE PAPER: Download this white paper on web application security for a summary of current global perceptions on the state of application attacks, and insights on how to best identify and mitigate threats in the future.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

IoT Attack Handbook
sponsored by Radware
WHITE PAPER: Download this IoT Attack Handbook to learn about each Mirai attack vector, understand the profile and parameters of the attacks and explore how to defend against each of the attacks.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

Applying Software-Defined Security to the Branch Office
sponsored by Versa Networks
WHITE PAPER: The end goal of deploying software-defined security (SD-Security) for your branch offices is to have additional layers of security for better defense-in-depth, when and where you need them. Read this white paper to learn how you can apply SD-security to your branch office.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

Versa Networks

Exposed & At Risk: Why Your Approach to Web Application Security is Insufficient
sponsored by ThreatX
WEBCAST: Watch this webinar to learn about combining web app security approaches and modern web app firewall tech to address the rapidly evolving the security needs of hybrid cloud environments.
Posted: 29 Aug 2018 | Premiered: Aug 29, 2018

ThreatX

KuppingerCole Report Executive View: One Identity Safeguard
sponsored by One Identity
ANALYST REPORT: Download this white paper to learn about a privileged management platform and how it can help you manage security risks associated with the use of privileged accounts in an organization.
Posted: 21 Aug 2018 | Published: 31 Jul 2018

One Identity

Two-Factor Authentication That Makes Users and IT Security Happy
sponsored by One Identity
WHITE PAPER: Download this white paper to learn about One Identity, an identity and access management tool that uses a set of factors to assess the risk a given access attempt represents, and respond with appropriate security measures.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

The Cloud Generation: A Perfect Storm of Security Challenges
sponsored by Symantec
WHITE PAPER: As cloud adoptions increase, organizations are realizing that securing their data is a lot harder. Some organizations are looking to secure web gateways (SWGs) to help fight off threats. Download this report to learn about SWGs and properly securing your organization in the cloud generation.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Symantec

Symantec Web Security Service
sponsored by Symantec
WHITE PAPER: As technology evolves, legacy security solutions are becoming less effective. That's where a secure web gateway (SWGs) solution can help. Using a SWG can help you secure all Internet traffic, not only web traffic. Download this report to learn about today's enterprise-security reality and why SWGs could be the key to protecting your data.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Symantec

ESG – Enabling Cybersecurity in the Age of Digital Transformation
sponsored by VMware
ANALYST REPORT: Read this white paper to explore the impact of digital transformation on cybersecurity processes and technologies and the architecture for securing the foundational aspects of modern, enterprise IT.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

VMware

Transforming Security in the Mobile Cloud Era
sponsored by VMware
WHITE PAPER: Read this eBook to explore insights that can help you re-evaluate how your IT department approaches security in the mobile cloud era.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

VMware

The Hunt for IoT: The Rise of Thingbots in Europe
sponsored by F5 Networks
WHITE PAPER: More attackers are using IoT devices to build malicious bots. Often times, IoT devices are easy to access and exploit due to open Telnet ports and manufacturers' lax security controls. Download this Threat Analysis Report on IoT devices to learn about these newly developed cyberweapons.
Posted: 21 Sep 2018 | Published: 31 Jul 2017

F5 Networks

Supplement Your Security Teams with a Managed SOC
sponsored by Oracle Dyn
RESOURCE CENTER: More IT and security leaders are leveraging a managed security operations center (SOC) as a critical line of defense in protecting their organization's assets, data, operations, and reputation. Download this custom article to explore the top 5 reasons to consider a managed SOC and what to look for in a provider.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Oracle Dyn

4 Considerations for Achieving a Zero Trust Network
sponsored by FireMon
WHITE PAPER: In a Zero Trust network security model, no communication, system, user, machine or packet goes anywhere without validation. But how do you make that happen? Read this white paper to learn about the 4 functions needed to establish a Zero Trust network, and tips for avoiding problems that could cause your strategy to fail.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

FireMon

Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint, Inc.
EBOOK: Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Proofpoint, Inc.

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Download this infographic to learn about Citrix's Secure Digital Workspace, a software defined perimeter that combines secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

Why GDPR is Nothing to Fear
sponsored by FireMon
WHITE PAPER: Download this guide for the steps your organization can take to maintain compliance with GDPR regulations and fortify consumer trust.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

FireMon

Managing Security on Shared Resources
sponsored by WinMagic
WEBCAST: Watch this video to learn about SecureDoc, an encryption tool that can help you strengthen security and maintain compliance, while enabling employees to use their own devices safely.
Posted: 15 Aug 2018 | Premiered: Apr 3, 2017

WinMagic

Strengthening Your Security with SecureDoc
sponsored by WinMagic
WEBCAST: Watch this short video to learn about protecting your assets with SecureDoc, which can help strengthen your organization's security and remain compliant.
Posted: 15 Aug 2018 | Premiered: Aug 15, 2018

WinMagic
1 - 25 of 99 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement