• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: MDM

Key Vulnerabilities in SMBs: Devices and People

Key Vulnerabilities in SMBs: Devices and People

Estimated reading time: 3 minutes

Small and medium-sized businesses (SMB) have to walk a tightrope when it comes to cybersecurity. On one hand, unlike the big business enterprises, they may not always have the financial heft to really invest in cybersecurity solutions, which often...
Read Blog
April 19, 2018
5
Shares

Mobile Device Management: How to manage security of your mobile devices

Mobile Device Management: How to manage security of your mobile devices

Estimated reading time: 3 minutes

Smartphones have made way into our personal and professional life. Apart from always being connected to the world, there are many business functions that users, today, perform with their smartphones. Business emails, document reviews, editing, and video conferencing are just...
Read Blog
September 20, 2017

Security Challenges in BYOD

Security Challenges in BYOD

Estimated reading time: 4 minutes

BYOD (Bring Your Own Device) refers to employees using their own devices including phones, tablets, and laptops to connect to the office network and perform their official duties. BYOD is the preferred policy of many employers these days, for...
Read Blog
July 25, 2017

Mobile Device Management: The necessity to secure your enterprise

Mobile Device Management: The necessity to secure your enterprise

Estimated reading time: 3 minutes

In today’s day and age, mobile devices are the most omnipresent and utilized creations on Earth and have permeated both professional and personal lives of individuals. This increasing presence has led organizations to further their employees’ productivity and ease of...
Read Blog
June 22, 2017

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Estimated reading time: 3 minutes

Whether your organization is into manufacturing steel or designing apps for smartphones, employee work flexibility is becoming more of a requirement than a privilege for every organization. Start-ups and SMBs are seeing real gains by encouraging Bring-Your-Own-Device (BYOD) at...
Read Blog
August 1, 2016
← Previous 1 2 3
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies