• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Viraj Talikotkar
About Viraj Talikotkar

Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on the lookout to discover and write about the latest innovations that safeguard enterprise data from cyber threats. He is a pseudo-intellectual, feline worshipper and biker in his free time.

AV-Test certifies Seqrite EPS as the top product for Windows, yet again!

Estimated reading time: 2 minutes

We are happy to announce that Seqrite’s Endpoint Security has yet again been tested and certified by the prestigious AV-Test Org as the best security product for Windows. The latter ran extensive tests on the existing capabilities of EPS...
Read More
August 7, 2020

EMM stakeholders warned to watch out for sophisticated Cerebrus spyware

Is your Enterprise Mobility Management suite equipped to tackle Cerebrus Spyware

Estimated reading time: 3 minutes

A new variant of the Cerebrus Android Trojan has been discovered with dangerous spyware capabilities. Enterprise Mobility Management (EMM) stakeholders are warned to remain vigilant and prevent being exploited by this Trojan. Cerebrus was detected last year and was...
Read More
May 25, 2020

Is the Coronavirus also indirectly endangering your enterprise data?

Is your remote workforce equipped to defend against cyberthreats

Estimated reading time: 6 minutes

The threat is real! The WHO has recently announced that the Coronavirus catastrophe has reached a a pandemic level. Amidst the global chaos, enterprises are in helter-skelter as well, thinking of the best possible ways to retain business continuity...
Read More
March 26, 2020

Quick Heal Technologies pledges to safeguard their enterprise customers in the testing times of the Novel Coronavirus

Estimated reading time: 2 minutes

As the novel Coronavirus continues to aggravate throughout the globe, we thought of taking the time out to diligently write to our customers and channel partners that our capabilities to protect you have stayed intact. The majority of our...
Read More
March 20, 2020

Anti-Ransomware software is not a data backup solution!

Do-anti-ransomware-products-backup-entire-business-data

Estimated reading time: 2 minutes

Over 30,000 customers across the globe rely on Seqrite’s cutting-edge Anti-Ransomware capabilities to protect businesses from being taken as hostages by hackers. Quick Heal, the parent company of enterprise cybersecurity brand Seqrite, had predicted ransomware to be the menace...
Read More
December 13, 2019

Pegasus like spyware could be snooping on you right now!!

You could be the next victim of a spyware attack!

Estimated reading time: 4 minutes

The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers an astonishing revelation on the kind of havoc such spyware can create. We covered the topic extensively, recently. The frequent media...
Read More
November 22, 2019

Cybersecurity to be the biggest threat to the enterprise for the next decade

Cybersecurity and the next decade

Estimated reading time: 3 minutes

Ernst & Young (EY) conducted a CEO imperative survey and gathered exclusive insights from 200 global CEOs and some of Forbes’ largest private players about what they thought will be the biggest problem for businesses in the coming years?...
Read More
September 5, 2019

Essential practices to strengthen your business’ cybersecurity

Simple ways to safeguard your business from cyber threats

Estimated reading time: 4 minutes

With enterprises being the centre of attention of an ever-evolving threat landscape, foolproof security of business assets has become the need of the hour. To counter the menace of cyberattacks, today we have businesses that specialize in the development...
Read More
August 16, 2019

How important is it to understand enterprise security management?

Estimated reading time: 3 minutes

Businesses increasingly face a wide array of ever-changing cyber risks as they adapt to the technologies and trends of today’s work environment. The world is in the throes of a digital revolution which has constituted a wide array of...
Read More
August 13, 2019

Hackers are breaking into the enterprise through content collaboration platforms CCPs

CCPs are becoming soft targets for enterprise malware attacks.

Estimated reading time: 4 minutes

Globally, as enterprises gather and integrate optimum avenues to secure their information technology infrastructure from cyber threats, somehow, hackers are still managing to find a way to break-in. Cybersecurity vigilance has driven business stakeholders to secure core networks with...
Read More
July 17, 2019

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.