• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Seqrite EPS

Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.

Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.

Estimated reading time: 3 minutes

Most of the organizations have already moved on to SSL (Secure Sockets Layer) to protect their data in motion. We like to believe that once SSL protocol is implemented our data is safe from the hackers. However, the hackers too have learned to take...
Read Blog
October 2, 2017

How cyber criminals attract users by launching interesting phishing email subject lines?

How cyber criminals attract users by launching interesting phishing email subject lines?

Estimated reading time: 3 minutes

Email is one of the favorite mediums of attack for cyber criminals. They launch spyware, ransomware, viruses and other kinds of malware and phishing attacks using emails. The user only needs to click the link in the email or open the...
Read Blog
August 24, 2017

Setting up a business? Secure it with Seqrite EPS

Setting up a business? Secure it with Seqrite EPS

Estimated reading time: 3 minutes

Starting a new business is an exciting and stressful period in anyone’s life.  The systems, the processes, the people- everything is new, and getting it all to work together can be really a nerve-wracking experience. Further, a startup always...
Read Blog
August 22, 2017

Are retailers doing enough to protect consumers’ data?

Are retailers doing enough to protect consumers’ data?

Estimated reading time: 3 minutes

The retail industry has been traditionally perceived to be a happy hunting ground for hackers and other cyber attackers. There are card based and card-not-present transactions done with POS, and online retail purchases and both of these are prone...
Read Blog
August 16, 2017

How cyber crime has become the greatest threat to companies across the world?

How cyber crime has become the greatest threat to companies across the world?

Estimated reading time: 3 minutes

Data in today’s world is a powerful tool which when used correctly can boost businesses to reach new heights. While data offers competitive advantage to organizations, cyber crime has slowly evolved into a worthy antagonist – shaping up as...
Read Blog
August 15, 2017

What is Endpoint Encryption?

What is Endpoint Encryption?

Estimated reading time: 3 minutes

Endpoint devices like PCs, Smartphones and USB drives usually have a lot of sensitive data stored within. Organizations with truckloads of corporate information and other confidential details need to ensure that unauthorized access to these data sets is negated....
Read Blog
August 9, 2017

Why choose Seqrite EPS against Ransomware?

Why choose Seqrite EPS against Ransomware?

Estimated reading time: 3 minutes

Ransomware, by now, has become as common a term, in the cyber security eco-system. With multiple massive ransomware attacks across the globe in recent times, almost everyone, including individual customers and organizations, have become aware of the threat that...
Read Blog
August 8, 2017

How Seqrite Endpoint security solution can help you in setting up a secure business?

How Seqrite Endpoint security solution can help you in setting up a secure business?

Estimated reading time: 3 minutes

Enterprises, big or small, across all sectors are facing unprecedented cyber threats. Viruses, malware, DDoS and other kinds of attacks are increasing by the day. Additionally, the regulation for data security and other compliance requirements are also on the...
Read Blog
July 12, 2017

Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab

Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab

Estimated reading time: < 1 minute

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In April...
Read Blog
June 26, 2017

Latest AV-TEST report rates Seqrite EPS as ‘Top Product’ again

Latest AV-TEST report rates Seqrite EPS as ‘Top Product’ again

Estimated reading time: 2 minutes

In January and February 2017, AV-TEST tested 13 security products. AV-TEST considered only realistic test scenarios and tested the products against current threats. The products had to prove their abilities by using all functions and protection levels. Seqrite EPS received...
Read Blog
March 30, 2017
← Previous 1 2 3 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies