/resources/cat/white-papers

White Papers

Learn more about the security solutions offered by Seqrite to enable safe business operations

Operation SideCopy

Operation SideCopy

Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistence threat (APT) against Indian defence forces. Explore an in-depth and interesting analysis of this attack through this paper.

Seqrite cybersecurity below the kernel

Seqrite cybersecurity below the kernel

Security of a computing endpoint is traditionally viewed concerning Firewall, HIPS, AV Products, etc. while missing out on the ‘Below Kernel’ aspects of cyber threats. This whitepaper comprehensively talks about the Security aspects of system architecture, BIOS, UEFI, Windows boot and different security arrangements below kernel space.

Seqrite Encryption Support for Windows 10 20H1

Seqrite Encryption Support for Windows 10 20H1

This document discusses the release of a new update for Seqrite Encryption Manager to work in tandem with the latest version of Windows 10, the 20H1.

Apache Kafka - Scaling server capabilities

Apache Kafka - Scaling server capabilities

Integrating Apache Kafka’s capabilities in Seqrite’s products has accelerated the latter, light years ahead of the competition. Discover how, through this paper.

Transparent Tribe Targeting Critical Indian Organizations

Transparent Tribe Targeting Critical Indian Organizations

Quick Heal has been tracking Advanced Persistent Threats (APTs) attacking the military since 2016, under the name operation m_project. Find out the modus operandi of attackers through this interesting paper.

Research Paper : EternalBlue - A Prominent Threat Actor of 2017-2018

Research Paper : EternalBlue - A Prominent Threat Actor of 2017-2018

This Technical paper outlines the usage of the Fuzzbunch exploit framework, details of MS17-010 patch, and insights into the EternalBlue exploit and DoublePulsar payload. 

For more details, please click here

TERMINATOR UTM: Content Filtering Employee Productivity with Enhanced Security

TERMINATOR UTM: Content Filtering Employee Productivity with Enhanced Security

Learn more about Data Cloud URL Filtering in Seqrite TERMINATOR (UTM), its advantages and benefits.

TERMINATOR UTM: VPN  Enterprise Security Nirvana

TERMINATOR UTM: VPN Enterprise Security Nirvana

Study about VPN-a key feature of Unified Threat Management and the need for it in all organizations

TERMINATOR UTM: Maintain Safe Business Operations with the power of secured Load Balancing

TERMINATOR UTM: Maintain Safe Business Operations with the power of secured Load Balancing

The importance of Load Balancing and Auto Link Failover as key requirements for business expansion.

Data Loss Prevention (DLP): The Best Practices to Avoid Data Loss and Safeguard Your Critical Information

Data Loss Prevention (DLP): The Best Practices to Avoid Data Loss and Safeguard Your Critical Information

Data Loss Prevention (DLP) technology and how your enterprise can benefit from its implementation.