• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Products Archive

Remember the security basics as your cybersecurity strategy evolves

Remember the security basics as your cybersecurity strategy evolves

Estimated reading time: 3 minutes

Most cybersecurity strategies thrive on advanced technologies when it comes to mitigating complex threats. In the meanwhile, CISOs and the concerned IT heads tend to ignore the basic precautions and security standards required for preventing data breaches. Although technological...
Read Blog
November 15, 2017

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Estimated reading time: 3 minutes

Organizations using software modules are more likely to get affected by intruders and unsolicited access. Moreover, if the software is popular, there are additional chances that the connected services and written codes might attract hackers and malicious parties. Security...
Read Blog
November 14, 2017

Deploying Endpoint Security: Key factors to consider

Deploying Endpoint Security: Key factors to consider

Estimated reading time: 2 minutes

Endpoint security is the front line in the fight against cyber attacks. Most of the attacks on organizations can be traced to a source that is external to the network i.e. the attack originates from something connected to the enterprise network. Which...
Read Blog
November 10, 2017

Strengthen your Enterprise Security with Seqrite EPS

Strengthen your Enterprise Security with Seqrite EPS

Estimated reading time: 3 minutes

With the increase in mobility of users, their usage and the access to the organization’s information assets extending to off-campus locations, the security perimeter keeps continuously changing.  This has led to a situation that a simple security solution within...
Read Blog
October 6, 2017

Setting up a business? Secure it with Seqrite EPS

Setting up a business? Secure it with Seqrite EPS

Estimated reading time: 3 minutes

Starting a new business is an exciting and stressful period in anyone’s life.  The systems, the processes, the people- everything is new, and getting it all to work together can be really a nerve-wracking experience. Further, a startup always...
Read Blog
August 22, 2017

Seqrite AntiVirus for Linux: Comprehensive antivirus solution for Linux networks

Seqrite AntiVirus for Linux: Comprehensive antivirus solution for Linux networks

Estimated reading time: < 1 minute

Seqrite AntiVirus for Linux is designed to simplify security configurations and synchronize control on Linux networks across all levels of the organization. Seqrite AntiVirus for Linux shields Linux systems against malware. It offers On-demand and Schedule scanning, Samba Share...
Read Blog
August 14, 2017
50
Shares

Seqrite Data Loss Prevention (DLP) -A Multi-Layered Approach to Data Security

Seqrite Data Loss Prevention (DLP) -A Multi-Layered Approach to Data Security

Estimated reading time: 3 minutes

An increasing volume of business information assets are distributed digitally today and has been growing exponentially every year. Confidential and sensitive business information is no longer restricted to physical boundaries of business enterprises. With the implementation of policies like...
Read Blog
August 1, 2017
2

Data Loss Prevention (DLP): Comprehensive control over business data

Data Loss Prevention (DLP): Comprehensive control over business data

Estimated reading time: 2 minutes

Data loss prevention (DLP) as the name suggests, protects the loss, misuse or unauthorized access of the sensitive data of your business. DLP software or products categorize and protect business data based on their confidentiality. It further prevents users...
Read Blog
July 28, 2017

A single infected computer can cost your business millions of dollars, know how to save

A single infected computer can cost your business millions of dollars, know how to save

Estimated reading time: 4 minutes

It was August 5th, 2012, when a massive cyber-attack crippled operations of one of the world’s leading petroleum and natural gas company, Saudi Aramco. A Virus named ‘Shamoon’ wiped out data from 35,000 computers bringing most of their operations...
Read Blog
July 11, 2017

Rise of Ransomware: How Seqrite can help your business stay protected

Rise of Ransomware: How Seqrite can help your business stay protected

Estimated reading time: 3 minutes

A ransomware attack can paralyze the functioning of an enterprise if they are unprepared. Over the years ransomware has become the most malicious attack faced by enterprises. In this attack, hackers hold your data hostage and demand a ransom...
Read Blog
July 4, 2017
← Previous 1 … 3 4 5 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies