Resources

Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in...
Demo

Request a Live Clearswift Secure ICAP Gateway with MFT Demo

Lessen the risk of sharing information in and out of your organization with the Clearswift Secure ICAP Gateway and Managed File Transfer (MFT). This seamless duo provides the management and security you need to keep your business going. Clearswift Secure ICAP Gateway + MFT: Centralized, enterprise-wide managed file transfer Automation and encryption Data redaction ...
Blog

How to Enhance Data Loss Prevention in Office 365

Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the introduction of the new General Data Protection Regulation. Organisations need to be prepared!
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new...
Blog

How to Prevent Data Exfiltration

To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.
Demo

Fortra's Clearswift Endpoint Data Loss Prevention Demo

Endpoint DLP allows for organizations to detect, inspect, and secure critical data on endpoints even when users are not connected to the network. It is important to ensure that critical data that resides on laptops, servers and in the Cloud services is only used by the correct people and for the appropriate purposes. Your live demo will include: Discussion around your...
Demo

Clearswift Secure Web Gateway Demo

Organizations need the ability to balance collaboration with customers, suppliers, and partners across the web yet protect from advanced threats and damaging data loss. The Secure Web Gateway enforces consistent internet security through flexible and granular policy management across web traffic, web-based applications, and cloud collaboration platforms. Your live demo will...
Blog

Public Sector Cybersecurity Priorities in 2021

The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?