Resources

Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

How to Enhance Data Loss Prevention in Office 365

Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the introduction of the new General Data Protection Regulation. Organisations need to be prepared!
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Guide

Critical Data Protection

Depending where you are in the world, there is a term for the loss of information from an organization – data loss, data leak, data theft, or even data spill.
Datasheet

Cross Domain Gateway Filters

Today there is a growing requirement for Cross Domain Solutions (CDS) across internal defence realms, between nations, and across the defence information supply chain. While custom hardware is frequently used in the form of a data diode to execute the actual transfer, there is a need to verify and validate the content prior to the transfer. Business Problem The need to share...
Datasheet

Clearswift Secure Web Gateway

The internet is now considered an extension of an enterprise’s own infrastructure. With the ever growing adoption of cloud-based services such as Salesforce.com and Microsoft 365, alongside employee use of the internet whilst at work, organizations need to ensure that the content and information that exists and is viewed online is both appropriate and permitted. Protecting...
Datasheet

Clearswift Secure Email Gateway

Powerful Email Security with Real-Time Protection Around the world, defense agencies, governments, and financial institutions rely on Clearswift’s award-winning, on-premise Secure Email Gateway (SEG) to provide the highest level of protection for email, transforming it from a high-risk communication channel to one that is safe and secure. With deep content inspection...
Datasheet

Clearswift and Secure File Transfer

Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection, combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration. Safely Share Information while keeping your Critical Information Protected Advanced Threat Protection and Adaptive Data...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of...
Blog

Data Security Best Practices Every CISO Should Know

The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch.