Newsroom | Clearswift

Newsroom

Guide

Securing Government Data

Government agencies need to stay on top of the latest cyber threats and understanding the data that flows in, out, out and even within the organization. This guide takes a look at how the data travels and the solutions for keeping the data protected where ever it flows.
Blog

September Was Insider Threat Awareness Month

Insider threats may not get as much attention as the outsider threats. Outsider threats are overwhelmingly malicious in intent. Organizations must protect their data with a strong barrier, because the “bad guys” are on the outside. However, inside the walls of an organization can be a disgruntled employee wanting to cause harm or an employee incentivized from outside the organization. Then of...
Video

Email Security Best Practices: How to Protect Against Advanced Threats

Unfortunately, the bad news about data breaches, cybersecurity scams, and email attacks is constant and the numbers are more staggering with each year. Learn which steps to take now to protect your organization’s email ecosystem, such as collecting threat intelligence, mitigating against brand impersonation, and training your employees on security awareness, all while maintaining compliance. That...
press_release

Fortra Acquires Outflank, Further Empowering Customers to Thwart Cyberattacks with Advanced Adversary Simulation Services, Offensive Security Tooling, and Training Services

MINNEAPOLIS (September 1, 2022)—Fortra announced today the acquisition of Outflank, a well-regarded IT security leader with deep expertise in adversary simulation; specialist cyber security trainings; and a unique cloud-based software offering for red teams, Outflank Security Tooling (OST). Based in Amsterdam, the team of experts works with prominent financial institutions, multinational firms and...
Video

Top Mistakes You Could be Making in Email Security

Gain the insights that you may not have been aware of, so that you can better protect your organization from everyday errors that cause big consequences.
Blog

Are You Ready for PCI DSS 4.0?

PCI DSS 4.0 is here. If your organization handles PII data, you will need to be compliant with the new updates. We take a look at the new version and what it takes to stay compliant.
Blog

The Not-So-Hidden Dangers of Hidden Data

Sometimes sensitive data exposure can come from routine practices within an organization. Everyday habits such as sending a document without removing hidden data like revision history and author details can expose sensitive data and even break compliance regulations.
Video

What's New with Clearswift V5.4.3?

Learn about the V5.4.3 Clearswift updates, what's on the roadmap for Clearswift features, and how to voice your feature priorities.
Press Release

Intelligent CIO: Ciaran Rafferty, Managing Director of Email Security, Fortra

Fortra employee, Ciaran Rafferty shares his thoughts on everything from cybersecurity trends to the future of email security in this interview with Intelligent CIO. Originally posted on Intelligent CIO. Excerpt: "Simplification is really what customers want and they want to know that they have a trusted advisor that can help them with that. I think what you'll see over the period of the next 2-3...
video

Clearswift Secure Email Gateway Animated Overview

The Secure Email Gateway from Clearswift transforms email from a high-risk communication channel to one that’s safe and secure. It does not stop and block emails from reaching their destinations, instead, it intelligently inspects, detects, and modifies messages in real time, removing only the elements that can cause disruptive cyber-attacks and unwanted data breaches, to keep emails flowing and...
Blog

Photo Security: Why a Picture Is Worth a Thousand Files

Communication through photos and short videos have now become commonplace with applications like Instagram and TikTok. While this popular use of imagery feels safe, many may not realize that photos can also be used to inconspicuously share data or carry out a ransomware cyberattack. Explore the threats of steganography and why ignoring it can be a significant email security mistake.
Video

How to Keep Sensitive Data Safe and Compliant

It’s no secret that most day-to-day business is performed digitally, and digital means data. All this data needs to be kept protected and compliant including sensitive data like personal identifiable information. Watch to learn how Fortra Email Security Solutions can keep you secure and compliant.
cta_page

Email Security Toolkit

Protecting against inbound and outbound email threats Email security is paramount to a strong cybersecurity solution for any organization. There can be many angles to consider when understanding where cyberattacks may lurk. Our expertise and award-winning solutions help many organizations maintain strong email security. Here you will find email security tools and resources to gain the knowledge...
Blog

One Big Threat Protection Problem, One Simple Email Security Solution

Microsoft 365 remains a popular tool worldwide, and It also remains a popular target for cyberattacks. Utilizing the email security solutions from Microsoft may seem the most convenient option, but the reality is, it comes with big gaps and workarounds for cybercriminal activity. Learn how Clearswift's Secure Email Gateway can work alongside Microsoft 365 to create an email security powerhouse.
cta_page

Fortra's Email Security Premium Services

Expert Guidance for Optimal Email Security Protection You have the tools and protection you need, but what if you have questions or simply want to know if everything is working as it should? Fortra offers a 12-month Email Security Premium Services program which provides you personalized, high-value service through a dedicated Technical Account Manager for your organization. To discuss our Premium...
Video

Securing Cyberattack Vulnerabilities from Your Vendors

Email threats lurk everywhere, including those from trusted outside partners. Discover how organizations can identify supply chain vulnerabilities and where Fortra can mitigate risks while allowing legitimate communication to continue.