Resources

Blog

Microsoft's Defender for Identity – Is it Enough?

In early 2023, Microsoft launched Defender for Identity which aims to offer visibility by helping to identify threats and provide actionable reports on attacks. But M365 security is not completely adequate for the modern enterprise and must be augmented by other data security solutions.
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new...
Datasheet

Clearswift and Secure File Transfer

Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection, combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration. Safely Share Information while keeping your Critical Information Protected Advanced Threat Protection and Adaptive Data...
Blog

Public Sector Cybersecurity Priorities in 2021

The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?
Video

Managing Supply Chain Cybersecurity Risk

Discover how Clearswift mitigates the risks associated with an organization’s supply chain while keeping business communications progressing.
Video

Manage, Sanitize and Secure Your File Transfers

Join our cybersecurity experts to learn how Fortra can help you mount a triple-defense of managing, sanitizing, and securing your file transfers.
Guide

Secure Managed File Transfer Ultimate Buyer's Guide

In this Ultimate Buyer's Guide, you'll find all the information you need to help you successfully evaluate different managed file transfer solutions (MFT) and find the right solution for your organization.
blog

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners, customers, suppliers, and many other stakeholders on a wide variety of projects. Furthermore, technology has emerged that makes such collaboration easy. It is as straightforward to...
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card...
Blog

Preparing for the Inevitable: A Guide to Handling a Data Breach

Cyber-attacks and data breaches are now so widespread that it isn’t a matter of ‘if’ but ‘when’ your organization gets hit. According to the UK Government’s latest Cyber Security Breaches Survey, nearly seven in ten large businesses identified a breach or attack in the past year. When taking into consideration all sizes of businesses in the UK, nearly half had suffered a breach...
Blog

WannaCry Fallout: What the Ransomware Epidemic Means for the Future of Business

Cyber security is now an agenda item in the boardroom, not just the IT department, in the wake of May’s Ransomware attack and the countdown to GDPR compliance well underway. In May, multiple organizations including the NHS, Spain’s Telefónica and Deutsche Bahn were struck with what is arguably the world’s most publicized cyber-attack. Within a day, the ransomware cryptoworm...
Blog

New Email-Embedded Malware Getting Through Major AV Scans

Clearswift has recently been approached by a number of top cybersecurity teams and organizations to help them address an increasing threat of ongoing attempts to deliver embedded malware hidden in email attachments that is automatically activated by malicious scripting code. The sophistication and continuous morphing of delivery methods have made it so these new malware variants go undetected and pass right by major AV scanning solutions.