• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Seqrite is a leading enterprise cybersecurity solutions provider. With a focus on simplifying cybersecurity, Seqrite delivers comprehensive solutions and services through our patented, AI/ML-powered tech stack to protect businesses against the latest threats by securing devices, applications, networks, cloud, data, and identity. Seqrite is the Enterprise arm of the global cybersecurity brand, Quick Heal Technologies Limited, the only listed cybersecurity products and solutions company in India. Today, 30,000+ enterprises in more than 70+ countries trust Seqrite with their cybersecurity needs.

Management of mobile devices in the digital classroom with Seqrite MDM

Management of mobile devices in the digital classroom with Seqrite MDM

Estimated reading time: 3 minutes

In an earlier era, schools and educational institutions mostly frowned upon the mobile/cell phone. These items of portability were banned from campuses with students facing repercussions for possessing and using them within the institution. This was a time when...
Read Blog
October 16, 2018

Encryption solution for educational institutes

Encryption solution for educational institutes

Estimated reading time: 3 minutes

When the discussion veers around topics like data security and breach, what are the kinds of organizations which, you think, are most likely at risk? The first answer that comes to your minds might be banks or big multinational...
Read Blog
October 11, 2018
11
Shares

Business Benefits of deploying Mobile Device Management

Business Benefits of deploying Mobile Device Management

Estimated reading time: 3 minutes

The mobile is literally everywhere. It has permeated almost everyone’s lives which mean the distinctions between the personal and the professional have narrowed. A personal cell phone is used for a lot of professional work by employees. Think of...
Read Blog
October 6, 2018
11
Shares

Seqrite Endpoint Security supports the Windows 10 October 2018 Update

Seqrite Endpoint Security supports the Windows 10 October 2018 Update

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. The name is Windows 10 October 2018 Update. This post lists down some of the highlights of Windows 10...
Read Blog
October 4, 2018
18
Shares

What is a Red Team Assessment and why does RBI endorse it?

What is a Red Team Assessment and why does RBI endorse it?

Estimated reading time: 3 minutes

When it comes to cybersecurity for enterprises, one sector that finds itself at a lot of risk is the banking sector. Banks conduct financial transactions which can be worth millions in value every single day which mean they present...
Read Blog
September 25, 2018
8
Shares
1

What is Business Email Compromise (BEC)?

What is Business Email Compromise (BEC)?

Estimated reading time: 3 minutes

Business Email Compromise (BEC), also known as “Man-In-The-Email” or “CEO Fraud”, is a sophisticated type of phishing attack, carried out through elaborate means and usually with devastating effect. The US’s Federal Bureau of Investigation (FBI) estimated that global business...
Read Blog
September 23, 2018
4
Shares

Rise of security risks on Mobile

Rise of security risks on Mobile

Estimated reading time: 3 minutes

According to a recent survey, the number of mobile phone users in the world is expected to pass 5 billion in 2019. That’s an incredible number of people using mobile phones. Truly, when we talk about a digital connected...
Read Blog
September 16, 2018
3
Shares

What is social engineering? How criminals take advantage of human behavior

What is social engineering? How criminals take advantage of human behavior

Estimated reading time: 3 minutes

For all the high-tech security that is employed, an organization’s biggest chink in its defense, when it comes to cybersecurity, can be its own employees. That is not to say that these employees are deliberately doing what they are,...
Read Blog
September 14, 2018
7
Shares

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Estimated reading time: 3 minutes

Seqrite’s range of world-class cybersecurity solutions are defined by innovation and simplicity. The solutions provided are a combination of intelligence, analysis of applications and state-of-the-art technology, and are designed to provide better protection for our customers. Backed by Quick...
Read Blog
September 5, 2018
7
Shares
1

Is your bank really safe from cyber threats? Conduct Red Team Assessment to know.

Is your bank really safe from cyber threats? Conduct Red Team Assessment to know.

Estimated reading time: 2 minutes

As cyber-attacks continue to affect businesses, it is banks that are the most lucrative target for cybercriminals. Beyond having their reputation at stake, banks also risk customer’s money and data, amplified regulatory attention and even litigation. The stakes are...
Read Blog
August 31, 2018
18
Shares
← Previous 1 … 19 20 21 … 43 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (13) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies