Resources

Blog

Photo Security: Why a Picture Is Worth a Thousand Files

Communication through photos and short videos have now become commonplace with applications like Instagram and TikTok. While this popular use of imagery feels safe, many may not realize that photos can also be used to inconspicuously share data or carry out a ransomware cyberattack. Explore the threats of steganography and why ignoring it can be a significant email security mistake.
Demo

Request a Live Clearswift Secure ICAP Gateway with MFT Demo

Lessen the risk of sharing information in and out of your organization with the Clearswift Secure ICAP Gateway and Managed File Transfer (MFT). This seamless duo provides the management and security you need to keep your business going. Clearswift Secure ICAP Gateway + MFT: Centralized, enterprise-wide managed file transfer Automation and encryption Data redaction ...
Blog

Data Privacy Day - Education and Inspiration

Dependency on the internet for communications and business are at an all time high, and so are cyberattacks. We discuss how you can protect your organization's sensitive information.
Datasheet

Secure Email Gateway Cloud Sandbox

Upgrade your existing Fortra's Clearswift Secure Email Gateway (SEG) appliance with the next-gen Cloud Sandbox from Sophos. This network sandbox offers state-of-the-art machine learning to provide an additional layer of security against ransomware and targeted attacks, but without any more systems to manage. Enterprise-grade protection that’s deployable in minutes with...
Datasheet

Using Fortra's Clearswift Secure Email Gateway Appliance to Enhance Data Security in Microsoft 365

For many organizations, Microsoft 365 is the ideal collaboration tool, providing a convenient platform for employees to share information and communicate daily. Microsoft offers different tiered packages to suit a variety of customer requirements. Its Microsoft 365 E5 package provides platforms for mid- and larger-sized enterprises, with the lower-tiered packages (e.g., E1 and...
Blog

How to Enhance Data Loss Prevention in Office 365

Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the introduction of the new General Data Protection Regulation. Organisations need to be prepared!
Datasheet

Improving Control of Regulated ITAR Information

The United States Government has substantially increased action against organizations and individuals responsible for breaches of the International Traffic in Arms Regulation (ITAR). This poses challenges for global defense corporations as data related to specific technologies may need to be transferred over the Internet or stored locally outside of the United States, in order...
Datasheet

Critical Information Protection for Application Availability with F5 & Clearswift

What Is the Solution? Available with the integration of unique Adaptive Redaction technology via the Clearswift Secure ICAP Gateway (SIG) with F5® BIG-IP® Local Traffic Manager™ (LTM®). As a member of the F5 Technology Alliance Program (TAP), together Clearswift and F5 provide a highly scalable Secure application delivery platform that takes full advantage of Clearswift’s...
Datasheet

Clearswift Professional Services: Adaptive Redaction Policy Definition

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from...
Datasheet

Clearswift Professional Services: Policy Migration

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from...
Datasheet

Clearswift Professional Services: Policy Definition

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from...
Datasheet

Upgrade - Clearswift Professional Services

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from...
Datasheet

Installation - Clearswift Professional Services

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from...
Datasheet

eDRM for Email

Traditional encryption allows content to be securely delivered but after that, there is no control. eDRM technology enables full control of information even when it has left the organization. Business Problem As a business. there is a need to collaborate with third-party organizations such as customers, suppliers, partners, and regulators. While data can be sent securely...
Datasheet

Secure File Sharing for Defence

With a priority to responding to tasks and building for the future, Defence organisations demand enhanced capabilities for secure information sharing as part of a drive for digital by default, to harness the transformative power of technology whilst avoiding the burdens of non-standard, bespoke, and ‘locked-in’ methods of exchanging data. Business Problem Throughout the...