• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

Products Archive

Seqrite Endpoint Encryption: The encryption that your business needs

encryption

Estimated reading time: 3 minutes

With data becoming an organization’s most valuable asset, the need of the hour for businesses is encryption, to protect their sensitive data, keep up with legal considerations, abide by global compliance policies and safeguard customer interests. Encryption is hence...
Read More
July 16, 2018
  • 23
    Shares

5 Cybersecurity Myths for Linux Users

Estimated reading time: 3 minutes

When we talk about operating systems, the immediate names that come to mind are Microsoft Windows and Apple Macintosh. Yet, while they may be two of the most well-known operating systems around, there is also quite a portion of...
Read More
May 8, 2018
  • 7
    Shares

Seqrite AntiVirus for Linux: Protect your Linux against malware

Seqrite Antivirus for Linux

Estimated reading time: 3 minutes

In the age of multi-OS platforms, it is not always easy to find the perfect cybersecurity solution for your software. Many of the common antivirus platforms today are designed for the purpose of the most popular ones, Windows and...
Read More
April 5, 2018
  • 8
    Shares

Antivirus for Server: A comprehensive solution for complex networks

Estimated reading time: 3 minutes

When it comes to large corporate networks with complex servers, one of the biggest headaches for network administrators is how to properly secure it from cybersecurity threats. In that respect, Seqrite’s Antivirus for Server offers a convenient, powerful solution: it...
Read More
April 2, 2018
  • 19
    Shares

Does your enterprise need Mobile Device Management (MDM)?

Estimated reading time: 3 minutes

When we say the world is getting increasingly connected, we just refer to the small, handheld device that we carry around everywhere. It would be an understatement to state that the mobile phone is everywhere – it has, in fact,...
Read More
March 27, 2018
  • 14
    Shares

Cybersecurity: How to approach a broader perspective at the board level

Estimated reading time: 3 minutes

The dangers that cyber threats pose have never been as apparent as now. High-profile organizations have been at the receiving end, there has been both reputational and financial damage and brand equity has been hit. One thing is clear:...
Read More
January 30, 2018
  • 9
    Shares

Become a leader in creating cyber trust with Seqrite Endpoint Security

Estimated reading time: 3 minutes

Enterprises, big and small, all over the world, are waking up to the importance of garnering cyber trust. In a digital age where technology only breaches new frontiers, cyber trust has become a key differentiator. Security breaches are not...
Read More
January 24, 2018
  • 17
    Shares

Seqrite is compatible with Microsoft’s Jan 3 update for Meltdown and Spectre

Estimated reading time: 2 minutes

This is an important advisory for our readers about the recently discovered CPU exploits called Meltdown and Spectre. As per the recent disclosure of Meltdown and Spectre vulnerability in popular CPUs, successful exploitation of these vulnerabilities will potentially allow...
Read More
January 10, 2018
  • 3
    Shares

Multi-layered approach is the key towards cybersecurity

Multi-Layered Cybersecurity Strategy

Estimated reading time: 3 minutes

With the cybersecurity threat-landscape evolving with each passing day, it becomes important that organizations opt for newer and safer strategies for staying functional without worrying about cyber-threats. Moreover, organizations must readily focus on cybersecurity while keeping a track of...
Read More
January 9, 2018
  • 5
    Shares

Lessons security professionals should learn from the year 2017

Estimated reading time: 4 minutes

2017 has been a year of several high-profile cyber-attacks with an excruciatingly large number of breaches originating from third-party software modules and compromised accounts. With hackers constantly trying to gain access to confidential data sets, it is important to...
Read More
December 20, 2017
← Previous 1 2 3 … 5 Next →

Popular Posts

  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • This is how hackers can invade your system without installing malware This is how hackers can invade your system without installing malware February 1, 2019

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Ankita Ashesh
    Ankita Ashesh

    Ankita is a Communications Strategist at Quick Heal with a passion for covering...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • GandCrab Riding Emotet’s Bus!

    GandCrab Riding Emotet’s Bus!

    February 15, 2019
  • Increase in threats to mobile devices

    Increase in threats to mobile devices

    February 14, 2019
  • Biometric authentication data at risk

    Biometric authentication data at risk

    February 12, 2019
Tweets by @Seqrite

Join our Newsletter

Sign up for our Newsletter and get regular cybersecurity round-ups delivered to your inbox.

Follow Us On

Topics

Antivirus For Linux (9) Antivirus For Server (9) Bitcoin (6) Cryptocurrency (7) Cyber-attack (29) cyber-attacks (54) Cybersecurity (165) cyber security (24) Cyber threat (28) cyber threats (44) data breach (48) data breaches (27) data loss (28) data loss prevention (33) data protection (20) data security (13) DLP (49) Encryption (11) endpoint security (94) Enterprise security (12) Exploit (12) firewall (8) GDPR (7) hackers (7) incident response plan (9) malware (24) malware attack (20) malware attacks (12) MDM (18) mobile device management (9) Network security (16) Patch Management (12) phishing (15) Ransomware (43) ransomware attack (29) ransomware attacks (29) ransomware protection (12) Seqrite (15) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Unified Threat Management (7) UTM (30) Vulnerability (9) WannaCry (7)

Products

  • End Point Security (EPS)
  • Seqrite Encryption
  • Seqrite Endpoint Security Cloud
  • Mobile Device Management (MDM)
  • Cloud Security
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2018 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.