• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: UTM

New Product Launch: Seqrite Secure Web Gateway

New Product Launch: Seqrite Secure Web Gateway

Estimated reading time: 3 minutes

More and more organizations are opting for a secure web gateway solution as the next step up from conventional security solutions. Secure web gateways prevent unsecured traffic from entering an organization’s internal network and prevent employees/users from accessing or...
Read Blog
July 18, 2018
1

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares

How to protect your server against ransomware attacks?

How to protect your server against ransomware attacks?

Estimated reading time: 3 minutes

There is one big reason why ransomware has suddenly become the hot new topic in cybersecurity: its ease of use. The proponents of ransomware have realized that it provides an easy, anonymous way to terrorize corporates and get easy...
Read Blog
May 16, 2018

Poor network visibility: Don’t put your enterprise’s security at risk

Poor network visibility: Don’t put your enterprise’s security at risk

Estimated reading time: 3 minutes

This is a world that is connected. Whether is the Internet of Things (IoT) or BYOD (Bring Your Own Device), enterprise networks do not exist in silos anymore. The number of devices that connect to enterprise networks is exponentially...
Read Blog
May 9, 2018
5
Shares

Spotted unusual activity on network: Here’s what to do next

Spotted unusual activity on network: Here’s what to do next

Estimated reading time: 3 minutes

Efficient cybersecurity relies on one major commandment: prevention. Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an...
Read Blog
April 27, 2018
2
Shares

Hackers love organizations of all sizes

Hackers love organizations of all sizes

Estimated reading time: 3 minutes

Hacking is the unauthorized entry into a computer or network with the individuals engaged in these activities referred to as hackers. Hackers alter system or security software and/or hardware of the computer or network to accomplish a goal that...
Read Blog
March 15, 2018
14
Shares

Three key verticals for securing your network

Three key verticals for securing your network

Estimated reading time: 3 minutes

Increase in the number of organized and targeted attacks and the ever-expanding attack surface for cyber threats have made security a major discussion point across the IT landscape in recent years. With technological advancements like the cloud, IoT, and...
Read Blog
March 1, 2018

Benefits of having Intrusion Prevention/Detection System in your enterprise

Benefits of having Intrusion Prevention/Detection System in your enterprise

Estimated reading time: 3 minutes

Networks have been in existence for a very long time and are indeed a boon as it has brought people and the world closer to each other. With the networks, the threat of intrusion of these networks became a...
Read Blog
February 15, 2018

Multi-Factor Authentication: Everything you need to Know

Multi-Factor Authentication: Everything you need to Know

Estimated reading time: 3 minutes

It wouldn’t be wrong to assume that login credentials and other confidential user-specific insights are the most frequently compromised data sets, extensively targeted by the malicious parties. Since 2017 witnessed hackers breaching 711 million users records; thereby accessing around...
Read Blog
February 5, 2018
5
Shares

How to defend your network against DDoS attacks?

How to defend your network against DDoS attacks?

Estimated reading time: 3 minutes

When it comes to enlisting the most unrecognizable forms of cyber-attacks, Distributed Denial of Service (DDoS) features on top of the pecking order. While DDoS attacks started off as simple and volumetric threats for creating disruptions, they have amplified...
Read Blog
January 31, 2018
← Previous 1 2 3 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies