• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

Patch Management Archive

Prioritizing cybersecurity: Where to start?

Estimated reading time: 3 minutes

Cybersecurity encompasses a bigger picture and majority of c-suite IT executives are paying close attention to the existing threats and mitigation plans. While some companies are finding it hard to meet the demands related to digital transformation, there are...
Read More
March 20, 2018
  • 8
    Shares

Found new vulnerabilities: What’s next?

Estimated reading time: 2 minutes

A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...
Read More
March 14, 2018
  • 6
    Shares

How to manage patches in mixed OS environments

Estimated reading time: 3 minutes

The importance of patch management in today’s cybersecurity environment cannot be understated by organizations today. The world of cyber threats is a rapidly evolving and dynamic one. Hackers are hard at work at every hour and at every minute...
Read More
March 9, 2018

Minimize Cybersecurity Risk with IT Asset Management

Estimated reading time: 3 minutes

Cybersecurity has evolved as one of the top organizational areas of concern for both government organizations and commercial setups. Not a day goes by when we don’t come across organizations leveraging IT Asset Management in the form of a...
Read More
February 23, 2018

Cyber Vulnerability: Where do you stand?

Estimated reading time: 2 minutes

Cyber-attacks have become household commonplaces, and the threats are increasing at an uncontrollable pace. According to threat reports released by leading security service providers, there has been a massive rise in the frequency of zero-day threats with vulnerabilities almost...
Read More
January 25, 2018

How hackers name malware and vulnerabilities?

Estimated reading time: 3 minutes

Although there aren’t many predefined standards for naming malware and vulnerabilities, they are often segregated according to the genre, impact and even malicious functionalities. Moreover, giving unique names to the vulnerabilities is nearly impossible due to the expansive conglomerate...
Read More
December 7, 2017

Effective Patch Management requires a well-defined strategy

Patch Management

Estimated reading time: 3 minutes

Patch Management holds a lot of relevance in an organization’s cybersecurity plan. Most hackers are on a continuous look out for system vulnerabilities to barge into IT network. This in turn offers them an opportunity to steal intellectual property...
Read More
November 23, 2017

Seqrite EPS with Centralized Patch Management – Proven Security Approach for Ransomware Protection

Estimated reading time: 1 minute

Patch, patch and patch ! This has been the go-to mantra of security professionals and the recent WannaCry ransomware attack has highlighted its importance once again. A large number of PCs worldwide were not patched with the latest update...
Read More
May 22, 2017

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Estimated reading time: 2 minutes

Seqrite has launched Seqrite Endpoint Security (EPS) 7.2, a comprehensive solution securing endpoints and data that encompasses more competitive features with enhanced protection and powerful performance. Seqrite EPS 7.2 incorporates a host of new and improved features that provides SMEs...
Read More
May 16, 2017

Top Seqrite features and solutions that made a mark in 2016

Estimated reading time: 4 minutes

No business is too small to evade a cyber-attack or data breach. Enterprise security has moved beyond traditional antivirus solutions and it’s time that cybersecurity becomes an important aspect of any organization’s financial budget. If 2016 has been the...
Read More
December 31, 2016
1 2 Next →

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • Are we prepared against risks generating from the IoT revolution? Are we prepared against risks generating from the IoT revolution? January 15, 2021
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.