iifl-logo

Financial Sector

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Download App
image

Nifty and Sensex scaled new highs led by FMCG, autos, and banks.

image

Investors can get a discretionary portfolio of equity, debt, and other assets in a strategic mix.

image

FPIs are back to buying in equities, but stay cautious ahead of GDP and fiscal deficit data.

image

Fed minutes push the CME Fedwatch very close to the Fed guidance.

image

The big macro news for the week was that the UK and Japan officially tipped into recession.

image

The pay-in date for the bonds is February 28, facilitating the exchange of bonds and funds between issuers and investors

image

Its parent company, Reliance Industries, also achieved a record high on February 23.

image

Equity benchmark Nifty traded flat-to-positive after it claimed an all-time high of 22,297

image

The NFO is available for subscription from February 9 to February 23.

image

The NFO is available for subscription from February 22 to March 07.

Download App
Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor), PFRDA Reg. No. PoP 20092018

ISO certification icon
We are ISO/IEC 27001:2022 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.