/resources/cat/white-papers

White Papers

Learn more about the security solutions offered by Seqrite to enable safe business operations

Quick Heal's Web Filtering Service

Quick Heal's Web Filtering Service

Quick Heal’s Web Filtering Service provide the most effective way to block access to unwanted content and protect users against web-based threats using real-time, Deep learning-based intelligence. Read our Whitepaper to know more.

Operation SideCopy

Operation SideCopy

Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistence threat (APT) against Indian defence forces. Explore an in-depth and interesting analysis of this attack through this paper.

Seqrite cybersecurity below the kernel

Seqrite cybersecurity below the kernel

Security of a computing endpoint is traditionally viewed concerning Firewall, HIPS, AV Products, etc. while missing out on the ‘Below Kernel’ aspects of cyber threats. This whitepaper comprehensively talks about the Security aspects of system architecture, BIOS, UEFI, Windows boot and different security arrangements below kernel space.

Seqrite Encryption Support for Windows 10 20H1

Seqrite Encryption Support for Windows 10 20H1

This document discusses the release of a new update for Seqrite Encryption Manager to work in tandem with the latest version of Windows 10, the 20H1.

Apache Kafka - Scaling server capabilities

Apache Kafka - Scaling server capabilities

Integrating Apache Kafka’s capabilities in Seqrite’s products has accelerated the latter, light years ahead of the competition. Discover how, through this paper.

Transparent Tribe Targeting Critical Indian Organizations

Transparent Tribe Targeting Critical Indian Organizations

Quick Heal has been tracking Advanced Persistent Threats (APTs) attacking the military since 2016, under the name operation m_project. Find out the modus operandi of attackers through this interesting paper.

Seqrite introduces the Roaming Client feature

Seqrite introduces the Roaming Client feature

Most cybersecurity companies provide threat protection to endpoints inside enterprise networks. However, the same endpoints become vulnerable to cyber threats outside business networks. This paper describes Seqrite’s unique solution to resolve this problem.

Looking through the Glass - Application Performance Testing

Looking through the Glass - Application Performance Testing

This whitepaper is an attempt to throw light on debugging common performance bottlenecks of Windows operating system using available Windows tools.

MongoDB's makeover uplifts Seqrite's award-winning Endpoint Security

MongoDB's makeover uplifts Seqrite's award-winning Endpoint Security

Seqrite Endpoint Security Cloud's latest release, version 1.3, comes with improved scalability that lets enterprises increase the number of endpoints from 20k to 50k with the same set of hardware configurations. This was achieved by applying myriad modifications to the existing setup. This paper specifically talks about optimizations done towards performance, at the application and MongoDB level.

Mac Malware - The Apple of virus developers eye

Mac Malware - The Apple of virus developers eye

This whitepaper addresses the most common misconceptions related to macOS security and why built in protections are not enough to protect Mac systems. Consequently, Apple Mac users should not be complacent about security and should take precautions in order to prevent their devices from being compromised.

Seven threats to corporate data on mobile devices

Seven threats to corporate data on mobile devices

This white paper describes potential threats to devices, which include malicious mobile apps, phishing scams, data leakage, spyware, and unsecure Wi-Fi networks. It also describes the measures taken to protect sensitive data stored on portable devices. This paper also guides you to prevent unauthorized users from accessing your mobile devices.

Advantages of Seqrite UEM

Advantages of Seqrite UEM

This whitepaper explains how the ever-changing world of technology demands a centralised, multi-tenant platform for offering security services at reduced cost, near-zero maintainability and how UEM, a cloud management platform offers a centralized, cost-effective and scalable endpoint security management solution for its customers.

Full Disk Encryption and its working

Full Disk Encryption and its working

This paper contains all the information that you need to know about the basic working of full disk encryption (FDE) product. You will also be able to identify the major factors affecting the working of FDE.

Advanced Volume Encryption Whitepaper

Advanced Volume Encryption Whitepaper

This white paper describes important set of functionalities in Seqrite volume encryption product, supported encryption algorithms and their advanced capabilities. Seqrite Encryption Manager (SEM) is a central management console for Seqrite Volume Encryption Client (SVE).

The Complete story of EMOTET

The Complete story of EMOTET

Emotet started as a banking trojan but this paper will shed light on how it has also become a "threat distributor". We will also discuss server-side and client-side activity and how it spreads.

How To Manage Software Patches

How To Manage Software Patches

This white paper will take you through the various aspects of managing the work-flow of patching your systems regularly and on time.

Anatomy of a Data Breach

Anatomy of a Data Breach

This whitepaper explains different types of data breaches and how companies can adopt a proactive approach to protect themselves against advanced cyber threats.

Seqrite UTM: Performance Improvements

Seqrite UTM: Performance Improvements

This whitepaper describes the performance improvements done in the latest version of UTM, which makes it a compelling solution to protect your network and businesses.

IDS/IPS - Key to Perimeter Defence

IDS/IPS - Key to Perimeter Defence

This paper will shed details on how a decade old security technology (IDS/IPS) is still a key component in securing the enterprise network.

Technical Paper : EternalBlue - A Prominent Threat Actor of 2017-2018

Technical Paper : EternalBlue - A Prominent Threat Actor of 2017-2018

This Technical paper outlines the usage of the Fuzzbunch exploit framework, details of MS17-010 patch, and insights into the EternalBlue exploit and DoublePulsar payload. 

For more details, please click here