• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Products Archive

CertLock Trojan can disable your antivirus software

CertLock Trojan can disable your antivirus software

Estimated reading time: 2 minutes

An antivirus software keeps your computer safe from malware, viruses, online threats, and suspicious or harmful elements. Although bypassing this protective guard is a difficult task for attackers, they never stop trying to do so. Recently, we came across...
Read Blog
June 13, 2017

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Estimated reading time: 2 minutes

Seqrite has launched Seqrite Endpoint Security (EPS) 7.2, a comprehensive solution securing endpoints and data that encompasses more competitive features with enhanced protection and powerful performance. Seqrite EPS 7.2 incorporates a host of new and improved features that provides SMEs...
Read Blog
May 16, 2017

Spear Phishing: What is it and how it can affect your business security

Spear Phishing: What is it and how it can affect your business security

Estimated reading time: 3 minutes

What is Spear Phishing? Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. The agenda of these mails like any other cyber...
Read Blog
January 16, 2017

Top Seqrite features and solutions that made a mark in 2016

Top Seqrite features and solutions that made a mark in 2016

Estimated reading time: 4 minutes

No business is too small to evade a cyber-attack or data breach. Enterprise security has moved beyond traditional antivirus solutions and it’s time that cybersecurity becomes an important aspect of any organization’s financial budget. If 2016 has been the...
Read Blog
December 31, 2016

Here’s why your startup might be the perfect target for hackers

Here’s why your startup might be the perfect target for hackers

Estimated reading time: 3 minutes

So you’re a ‘new kid on the block’ in the big business world. Just getting started with the setting up of your infrastructure and organizing the systems and processes? Of course cybersecurity is the least of your concerns at...
Read Blog
December 14, 2016

Seqrite Endpoint Security (EPS) rated ‘Top Product’ by AV TEST Institute

Seqrite Endpoint Security (EPS) rated ‘Top Product’ by AV TEST Institute

Estimated reading time: 2 minutes

In December 2016, AV-TEST Product Review and Certification Report for Sep-Oct 2016 recognized Seqrite EPS for its superior protection, usability and performance. AV-TEST carries out several individual and comparative tests per year and performs extensive certification procedures in which...
Read Blog
December 12, 2016

Seqrite Endpoint Security (EPS) version 7.1 released: All the key features explained

Seqrite Endpoint Security (EPS) version 7.1 released: All the key features explained

Estimated reading time: 3 minutes

We have just released Endpoint Security (EPS) version 7.1 with some new enhancements and improved compliance features. This blog is a comprehensive guide to all you need to know about EPS 7.1. The new version is a refinement and...
Read Blog
December 5, 2016
1

EPS Enterprise Suite earns AVLab Award for real-time ransomware protection

EPS Enterprise Suite earns AVLab Award for real-time ransomware protection

Estimated reading time: 3 minutes

In October 2016, AVLab protection test against ransomware threats gave a 100% effectiveness score to Seqrite Endpoint Security (EPS) Enterprise Suite Edition. 28 malicious software files of crypto-ransomware were used to test the effectiveness of the solution in terms...
Read Blog
November 22, 2016

Seqrite Endpoint Security v.7.0 Released

Seqrite Endpoint Security v.7.0 Released

Estimated reading time: 2 minutes

Seqrite Endpoint Security (SEPS) v.7.0 has been released with new product variants, features, and enhancements. The new version comes with competitive features for each SEPS product variant and upgraded to support businesses of all sizes. Enterprise Suite Endpoint Security...
Read Blog
August 23, 2016

How Seqrite’s Device Control Upholds Security Compliance

How Seqrite’s Device Control Upholds Security Compliance

Estimated reading time: 2 minutes

Business enterprises today have a catalog of security threats to be aware of, and none more so than the risks associated with the multiple device types that are plugged in to company systems. Employees regularly plug in devices such...
Read Blog
March 16, 2016
← Previous 1 … 4 5
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies