• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

UTM Archive

Deploy a layered security model through Seqrite!

Deploy a layered security model through Seqrite!

Estimated reading time: 2 minutes

To understand the concept of layered security, it’s important to remember a key tenet of cybersecurity – no security solution is infallible. As security experts state, it’s not a question of how, but when. Cybercrooks are evolving everyday to...
Read More
September 17, 2020

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Estimated reading time: 6 minutes

As implied in the name itself, Man In The Middle Attack is a type of attack where a illegal person tries to intercept the communication between two parties. Either to secretly overhear or to steal the critical data being...
Read More
December 3, 2019

Hackers bypass UTM user credentials with simple Shell Scripts

Hackers bypass UTM user credentials with simple Shell Scripts

Estimated reading time: 2 minutes

Everyone loves shell scripts! No wonder then that in most of the Linux-based security products, shell scripts are heavily used. Most of the times, they are easy to develop as compared to C/C++ programs as there is no compilation...
Read More
November 5, 2019

Don’t put the network visibility of your enterprise at risk

Don’t put the network visibility of your enterprise at risk

Estimated reading time: 3 minutes

We live in a connected world – thanks to the rise of new trends and concepts like Internet of Things (IoT) or Bring Your Own Device (BYOD), enterprise networks can’t restrict themselves to a specific set of predefined devices....
Read More
July 30, 2019

Tracing the story of Emotet malware campaign

Tracing the story of Emotet malware campaign

Estimated reading time: 3 minutes

For any enterprise which has some sort of association with the financial sector, it is important to be familiar with the threat of Emotet. Yes, Emotet, a part of the banking Trojan family which is distributed through various different...
Read More
December 1, 2018
  • 15
    Shares

How to build a zero trust network

How to build a zero trust network

Estimated reading time: 3 minutes

Traditionally, any discussion about network security is focused on a specific model that organizations have largely internalized. This model is boundary or parameter-based model and assumes of a perimeter or a boundary outside a network. By this model, cybersecurity...
Read More
September 6, 2018
  • 114
    Shares

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Estimated reading time: 3 minutes

Seqrite’s range of world-class cybersecurity solutions are defined by innovation and simplicity. The solutions provided are a combination of intelligence, analysis of applications and state-of-the-art technology, and are designed to provide better protection for our customers. Backed by Quick...
Read More
September 5, 2018
  • 7
    Shares
1

What are exploits? Everything you need to know

What are exploits? Everything you need to know

Estimated reading time: 3 minutes

Cybersecurity experts are always cautious when they hear the word “exploits”, and for good reason. Exploits are often a preferred channel through which cybercriminals like to hit their targets. What makes it easier for these criminals is that exploits...
Read More
August 25, 2018
  • 16
    Shares

Importance of industry certifications for security products and what do they mean

Importance of industry certifications for security products and what do they mean

Estimated reading time: 3 minutes

The importance of cybersecurity has slowly seeped into the consciousness of enterprises. A cybercrime can undo years of work in an instant and enterprises are recognizing this and trying to find ways to stay safe. Hence, investment in security...
Read More
August 16, 2018
  • 3
    Shares

What India’s data protection law might mean for your business

What India’s data protection law might mean for your business

Estimated reading time: 3 minutes

India has taken a step forward towards laying down a proper policy for data protection. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge BN Srikrishna and appointed by the Indian government in August 2017...
Read More
August 6, 2018
  • 305
    Shares
1 2 … 4 Next →
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.