• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

How to strike the correct balance between enterprise security and employee productivity?

How to strike the correct balance between enterprise security and employee productivity?

Estimated reading time: 3 minutes

When it comes to enterprise security, companies are always trying to hit the right spot. The problem is that enterprises require employees to be at their productive best – that is, after all, what they are hired for and...
Read Blog
July 23, 2019

Can a single solution secure enterprise endpoints?

Can a single solution secure enterprise endpoints?

Estimated reading time: 2 minutes

Endpoint security acts as the vanguard against an enterprise’s battle against cyber attacks. This is because every device that connects to a corporate network is in most cases the first point of penetration for threats and malware. For enterprises...
Read Blog
July 22, 2019

Email could be one of the simplest ways for hackers to breach your organization

Email could be one of the simplest ways for hackers to breach your organization

Estimated reading time: 3 minutes

What is common between Sarah Palin, George HW Bush, and John Podesta? Apart from being important political figures in the United States, there’s another fact that unites them – they’ve all been victims of messy email hacks. Sometimes, danger...
Read Blog
July 9, 2019

Protect sensitive information with Seqrite Encryption

Protect sensitive information with Seqrite Encryption

Estimated reading time: 3 minutes

Among the most important assets that an enterprise possesses, data is undoubtedly the most important. In today’s digital age, there are reams of data being processed, transmitted and disseminated every millisecond and much of the world’s economy runs on...
Read Blog
July 3, 2019

Key benefits of Seqrite Secure Web Gateway

Key benefits of Seqrite Secure Web Gateway

Estimated reading time: 2 minutes

Enterprises are recently waking up to the usefulness of having layered protection for their networks. This involves investing in various layers of protection such as anti-virus, anti-malware, anti-spyware and a firewall. However, firewalls while providing protection can often fall...
Read Blog
June 27, 2019

Make Seqrite UTM the first line of defense for your enterprise

Make Seqrite UTM the first line of defense for your enterprise

Estimated reading time: 2 minutes

Network security has traditionally been a number one priority for enterprises. As the reliance on the Internet has increased, enterprises have invested in traditional network security solutions which aim to protect trusted internal networks from external actors. For this...
Read Blog
June 20, 2019

Harnessing Machine Learning and Automation against Advanced Threats

Harnessing Machine Learning and Automation against Advanced Threats

Estimated reading time: 2 minutes

With the specter of advanced cybersecurity threats always on the horizon, enterprises are seriously considering harnessing the power of machine learning and automation to fight against these threats. For good reason too – a cybersecurity survey suggested that organizations...
Read Blog
June 12, 2019

How to build a strong cloud network security strategy

How to build a strong cloud network security strategy

Estimated reading time: 2 minutes

While enterprises often focus on building strong, robust cybersecurity interfaces for their in-house networks, cybersecurity for cloud networks is a whole different ballgame. Yet, enterprises cannot avoid the advantages of doing their business on the cloud – the sheer...
Read Blog
June 10, 2019

Rise of cyber-physical attacks

Rise of cyber-physical attacks

Estimated reading time: 3 minutes

It was back in 2012 when the then Defense Secretary of the United States warned of the possibility of the country facing a “cyber-Pearl Harbor”. He painted a bleak possibility – that extremist groups and enemy nations would use...
Read Blog
May 27, 2019

Seqrite Endpoint Security supports the Windows 10 May 2019 Update

Seqrite Endpoint Security supports the Windows 10 May 2019 Update

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. It’s called Windows 10 19H1 (Windows 10 May 2019 Update). This post lists down some of the highlights of...
Read Blog
May 23, 2019
← Previous 1 … 14 15 16 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (331) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (36) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies