/resources/cat/white-papers

White Papers

Learn more about the security solutions offered by Seqrite to enable safe business operations

Seqrite introduces the Roaming Client feature

Seqrite introduces the Roaming Client feature

Most cybersecurity companies provide threat protection to endpoints inside enterprise networks. However, the same endpoints become vulnerable to cyber threats outside business networks. This paper describes Seqrite’s unique solution to resolve this problem.

Looking through the Glass - Application Performance Testing

Looking through the Glass - Application Performance Testing

This whitepaper is an attempt to throw light on debugging common performance bottlenecks of Windows operating system using available Windows tools.

MongoDB's makeover uplifts Seqrite's award-winning Endpoint Security

MongoDB's makeover uplifts Seqrite's award-winning Endpoint Security

Seqrite Endpoint Security Cloud's latest release, version 1.3, comes with improved scalability that lets enterprises increase the number of endpoints from 20k to 50k with the same set of hardware configurations. This was achieved by applying myriad modifications to the existing setup. This paper specifically talks about optimizations done towards performance, at the application and MongoDB level.

Mac Malware - The Apple of virus developers eye

Mac Malware - The Apple of virus developers eye

This whitepaper addresses the most common misconceptions related to macOS security and why built in protections are not enough to protect Mac systems. Consequently, Apple Mac users should not be complacent about security and should take precautions in order to prevent their devices from being compromised.

Seven threats to corporate data on mobile devices

Seven threats to corporate data on mobile devices

This white paper describes potential threats to devices, which include malicious mobile apps, phishing scams, data leakage, spyware, and unsecure Wi-Fi networks. It also describes the measures taken to protect sensitive data stored on portable devices. This paper also guides you to prevent unauthorized users from accessing your mobile devices.

Advantages of Seqrite UEM

Advantages of Seqrite UEM

This whitepaper explains how the ever-changing world of technology demands a centralised, multi-tenant platform for offering security services at reduced cost, near-zero maintainability and how UEM, a cloud management platform offers a centralized, cost-effective and scalable endpoint security management solution for its customers.

Full Disk Encryption and its working

Full Disk Encryption and its working

This paper contains all the information that you need to know about the basic working of full disk encryption (FDE) product. You will also be able to identify the major factors affecting the working of FDE.

Advanced Volume Encryption Whitepaper

Advanced Volume Encryption Whitepaper

This white paper describes important set of functionalities in Seqrite volume encryption product, supported encryption algorithms and their advanced capabilities. Seqrite Encryption Manager (SEM) is a central management console for Seqrite Volume Encryption Client (SVE).

The Complete story of EMOTET

The Complete story of EMOTET

Emotet started as a banking trojan but this paper will shed light on how it has also become a "threat distributor". We will also discuss server-side and client-side activity and how it spreads.

How To Manage Software Patches

How To Manage Software Patches

This white paper will take you through the various aspects of managing the work-flow of patching your systems regularly and on time.

Seqrite UTM: Performance Improvements

Seqrite UTM: Performance Improvements

This whitepaper describes the performance improvements done in the latest version of UTM, which makes it a compelling solution to protect your network and businesses.

IDS/IPS - Key to Perimeter Defence

IDS/IPS - Key to Perimeter Defence

This paper will shed details on how a decade old security technology (IDS/IPS) is still a key component in securing the enterprise network.

Technical Paper : EternalBlue - A Prominent Threat Actor of 2017-2018

Technical Paper : EternalBlue - A Prominent Threat Actor of 2017-2018

This Technical paper outlines the usage of the Fuzzbunch exploit framework, details of MS17-010 patch, and insights into the EternalBlue exploit and DoublePulsar payload.

For more details, please click here

Controlled Access to Wireless Networks

Controlled Access to Wireless Networks

This white paper enlists multiple attacks that can exploit enterprise resources via wireless network and how controlled wireless network access helps in eliminating them.

Machine Learning in Digital Security

Machine Learning in Digital Security

This white paper will explain a few use cases of Machine Learning in today's digital world and how it is broadly utilized in data analysis.

Anatomy of a Data Breach

Anatomy of a Data Breach

This whitepaper explains different types of data breaches and how companies can adopt a proactive approach to protect themselves against advanced cyber threats.

Threats Posed by Portable Storage Devices

Threats Posed by Portable Storage Devices

This white paper will examine nature of threats faced by organizations due to portable devices and how to eliminate them.

Mobile Device Management (MDM)

Mobile Device Management (MDM)

This whitepaper will explain you the need of MDM for your organization and how to implement it as a good practice.

Unified Threat Management: A Modern Solution to a Modern Problem

Unified Threat Management: A Modern Solution to a Modern Problem

This whitepaper examines how to implement a UTM solution effectively.

Protecting Your Enterprise from Ransomware Attacks

Protecting Your Enterprise from Ransomware Attacks

This whitepaper explains the different types of prevalent ransomware, and steps enterprises can take to stay protected.