Resources

Datasheet

Improving Control of Regulated ITAR Information

The United States Government has substantially increased action against organizations and individuals responsible for breaches of the International Traffic in Arms Regulation (ITAR). This poses challenges for global defense corporations as data related to specific technologies may need to be transferred over the Internet or stored locally outside of the United States, in order to make business...
Guide

Email Encryption Best Practices

Email continues to be the lifeblood of organizations today. With changes to legislation and the increased attention on data breaches now is the time to revisit your email solution and policies to improve the security of the information that flows through it – both inbound and outbound.
Datasheet

Clearswift Professional Services: Adaptive Redaction Policy Definition

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Clearswift Professional Services: Policy Migration

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Clearswift Professional Services: Policy Definition

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Upgrade - Clearswift Professional Services

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Installation - Clearswift Professional Services

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

eDRM for Email

Traditional encryption allows content to be securely delivered but after that, there is no control. eDRM technology enables full control of information even when it has left the organization. Business Problem As a business. there is a need to collaborate with third-party organizations such as customers, suppliers, partners, and regulators. While data can be sent securely using one of many...
Datasheet

Clearswift Adaptive Data Loss Prevention

Clearswift Adaptive Data Loss Prevention (A-DLP) is the data and people-centric solution to critical information protection. Unlike others, A-DLP is a non-disruptive solution which supports continuous collaboration, avoids business interruption and mitigates the risk of financial or reputational damage caused by the unauthorized disclosure of sensitive data wherever it lives – at the endpoint, on...
Datasheet

Automating the Provision of Trust Certificates Using Clearswift’s Trust Manager

Email is still the preferred method of business collaboration in use. With the growth of sensitive content being shared legitimately between organizations and the pressures to ensure data is being sent in a secure fashion, the use of email encryption is almost essential. Multiple analysts show the email encryption market growing with a 20+% CAGR from 2018-2025. Encryption Options There are a wide...
Datasheet

Cross Domain Security Solutions for Defence

There remains an ongoing challenge with Cross Domain information sharing, as increasing cyber risk further exposes the danger of the wrong information being sent to the wrong place and the transferred material containing malicious content which can harm critical information systems. This challenge is increasing with the priority now given for effective information interoperability and the ongoing...
Datasheet

Clearswift Secure Email Gateway

Powerful Email Security with Real-Time Protection Around the world, defense agencies, governments, and financial institutions rely on Clearswift’s award-winning, on-premise Secure Email Gateway (SEG) to provide the highest level of protection for email, transforming it from a high-risk communication channel to one that is safe and secure. With deep content inspection capability and powerful...
Datasheet

Clearswift PMM Client for iOS

Email remains the primary means for most organizations to do business. However, today the information needs to be better controlled than ever before. Depending on the organizational policy, messages are invariably going to be held for manual review to ensure that the content is acceptable. The PMM portal is a great tool for managing mail in the office, but when on the move it’s imperative to have...
Datasheet

Clearswift Optical Character Recognition

Business Problem Does your organization regularly convert Excel or Word documents to PDF file format? Do you have one of those multi-purpose photocopier / printer / scanners whereby hard documents are scanned, converted to PDF and stored or shared? Perhaps posted documents may need to have an electronic copy stored or shared so documents are scanned, converted to a PDF and emailed automatically...
Datasheet

Clearswift Managed Email Security Service

Fortra's Clearswift offers an affordable and effective managed Email Security service that enables the highest level of protection, a reduction in day to day management overhead, but keeps you in control. Clearswift Managed Service customers are effectively offered all the benefits of an advance email security system with management, monitoring and logfile access, but without the effort of hosting...
Datasheet

Clearswift Malware Protection

The Clearswift Secure Gateways provide a number of ways to eliminate the risk of malware entering or proliferating around an organization.The primary methods of malware detection will be performed through the use of Sophos and Avira Anti-Virus (AV) software. In recent real-world testing conducted by AV-Test in May-June 2023, both anti-virus vendors scored perfect scores against zero-day malware...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of targets, looking for publically available information on the Internet and...
Datasheet

Anti-Steganography: Combating External Threats and Data Loss in Images

As cyber threats become more evasive, technology that protects organizations must have the capability to look deeper into the content flowing in and out of the network to ensure that the information being shared between users and recipients does not carry a harmful or sensitive payload. Increasingly, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or...
Datasheet

Adaptive Redaction: Structural and Document Sanitization

What is sanitization? Sanitization involves cleansing or purging files of dangerous hidden content. That content can be either active (for example, malware), or informational (such as hidden properties). An example of harmful code could be an invisible and malicious script on an otherwise legitimate web page or embedded into a document. Remediation for this requires structural sanitization. An...