• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Encryption Archive

Snake Ransomware brings impending doom to enterprise networks

Snake Ransomware brings impending doom to enterprise networks

Estimated reading time: 4 minutes

New targeted ransomware called SNAKE or EKANS was found in early January. Malware is written in the Go language and it is heavily obfuscated and goes after ICS environments. Snake Ransomware seems to be distributed via a focused and...
Read Blog
July 10, 2020

Seqrite Encryption support for Windows 10 20H1

Seqrite Encryption support for Windows 10 20H1

Estimated reading time: 2 minutes

Microsoft is about to release a new update for its Windows 10 Operating System called Windows 10 May 2020 Update (also known as Version 2004). The company has codenamed it “20H1” and will likely make it available by the...
Read Blog
May 18, 2020

Seqrite Encryption Manager update guidelines before applying Windows Update (20H1)

Seqrite Encryption Manager update guidelines before applying Windows Update (20H1)

Estimated reading time: 4 minutes

Microsoft is about to release a new update for its Windows 10 Operating System called Windows 10 May 2020 Update (also known as Version 2004). The company has codenamed it “20H1” and will likely make it available by the...
Read Blog
May 18, 2020

Understanding five of the best algorithms leveraged to encrypt data

Understanding five of the best algorithms leveraged to encrypt data

Estimated reading time: 3 minutes

With the advent of data protection regulations like the GDPR in the European Union, the Data Protection Bill in India and the POPI Act in South Africa, enterprises are turning to robust algorithms that build encryption solutions to keep...
Read Blog
September 26, 2019

Protect sensitive information with Seqrite Encryption

Protect sensitive information with Seqrite Encryption

Estimated reading time: 3 minutes

Among the most important assets that an enterprise possesses, data is undoubtedly the most important. In today’s digital age, there are reams of data being processed, transmitted and disseminated every millisecond and much of the world’s economy runs on...
Read Blog
July 3, 2019

Seqrite Endpoint Encryption Solutions: Key Features

Seqrite Endpoint Encryption Solutions: Key Features

Estimated reading time: 3 minutes

It is becoming increasingly difficult for organizations to handle data complexities, courtesy the expansive proliferation of devices and the associated information sets. Moreover, with hackers opting for tech-intensive intrusion strategies, the number of data breaches encountered on a daily...
Read Blog
March 26, 2018
7
Shares

Encryption: Does your business need it?

Encryption: Does your business need it?

Estimated reading time: 3 minutes

Data comes across as the most valuable organizational asset with undeniable legal sensitivities associated with it. It is thus important to protect the same in the best possible manner. Data encryption is one such method which ensures the protection...
Read Blog
February 21, 2018

Seqrite launches Encryption solution for optimal security of business data

Seqrite launches Encryption solution for optimal security of business data

Estimated reading time: 2 minutes

Seqrite encryption solution protects corporate data residing on endpoints with a strong encryption algorithms such as AES, RC6, SERPENT and TWOFISH. Full disk encryption supports Microsoft Windows Desktops and Laptops and prevents data loss occurring from loss/theft of endpoint....
Read Blog
November 6, 2017
125
Shares
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies