• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Android Archive

The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

Estimated reading time: 2 minutes

It might be difficult to find a software engineer who does not know ‘Make’ utility. ‘GNU Make’ is a tool which controls the generation of executables and other stuff related to the application code building. Capabilities of ‘Make’ are...
Read Blog
October 1, 2020

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Estimated reading time: 4 minutes

Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to mine them. New coins are generated and brought into the market through the process of mining. Mining of cryptocurrency is a...
Read Blog
January 18, 2018
6
Shares

Mobile Device Management: How to manage security of your mobile devices

Mobile Device Management: How to manage security of your mobile devices

Estimated reading time: 3 minutes

Smartphones have made way into our personal and professional life. Apart from always being connected to the world, there are many business functions that users, today, perform with their smartphones. Business emails, document reviews, editing, and video conferencing are just...
Read Blog
September 20, 2017

Mobile Device Management: The necessity to secure your enterprise

Mobile Device Management: The necessity to secure your enterprise

Estimated reading time: 3 minutes

In today’s day and age, mobile devices are the most omnipresent and utilized creations on Earth and have permeated both professional and personal lives of individuals. This increasing presence has led organizations to further their employees’ productivity and ease of...
Read Blog
June 22, 2017

Top Seqrite features and solutions that made a mark in 2016

Top Seqrite features and solutions that made a mark in 2016

Estimated reading time: 4 minutes

No business is too small to evade a cyber-attack or data breach. Enterprise security has moved beyond traditional antivirus solutions and it’s time that cybersecurity becomes an important aspect of any organization’s financial budget. If 2016 has been the...
Read Blog
December 31, 2016

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Estimated reading time: 3 minutes

Whether your organization is into manufacturing steel or designing apps for smartphones, employee work flexibility is becoming more of a requirement than a privilege for every organization. Start-ups and SMBs are seeing real gains by encouraging Bring-Your-Own-Device (BYOD) at...
Read Blog
August 1, 2016
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies