Resources

Datasheet

Protecting Information Across the Defence Supply Chain

Clearswift supports organisations to comply with the Defence Cyber Protection Partnership cyber risk control requirements that seek to protect UK military capability throughout the MOD supply chain. Business Problem In the face of cyberattacks being recognised as a Tier 1 threat within the National Security Strategy, the UK seeks to secure a truly competitive, sustainable, and globally successful...
Datasheet

Clearswift Professional Services: Adaptive Redaction Policy Definition

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Clearswift Professional Services: Policy Migration

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Clearswift Professional Services: Policy Definition

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Upgrade - Clearswift Professional Services

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Installation - Clearswift Professional Services

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Clearswift Adaptive Data Loss Prevention

Clearswift Adaptive Data Loss Prevention (A-DLP) is the data and people-centric solution to critical information protection. Unlike others, A-DLP is a non-disruptive solution which supports continuous collaboration, avoids business interruption and mitigates the risk of financial or reputational damage caused by the unauthorized disclosure of sensitive data wherever it lives – at the endpoint, on...
Datasheet

Cross Domain Gateway Filters

Today there is a growing requirement for Cross Domain Solutions (CDS) across internal defence realms, between nations, and across the defence information supply chain. While custom hardware is frequently used in the form of a data diode to execute the actual transfer, there is a need to verify and validate the content prior to the transfer. Business Problem The need to share information is growing...
Datasheet

Cross Domain Security Solutions for Defence

There remains an ongoing challenge with Cross Domain information sharing, as increasing cyber risk further exposes the danger of the wrong information being sent to the wrong place and the transferred material containing malicious content which can harm critical information systems. This challenge is increasing with the priority now given for effective information interoperability and the ongoing...
Datasheet

Clearswift Secure Web Gateway

The internet is now considered an extension of an enterprise’s own infrastructure. With the ever growing adoption of cloud-based services such as Salesforce.com and Microsoft 365 , alongside employee use of the internet whilst at work, organizations need to ensure that the content and information that exists and is viewed online is both appropriate and permitted. Protecting themselves from any...
Datasheet

Clearswift Optical Character Recognition

Business Problem Does your organization regularly convert Excel or Word documents to PDF file format? Do you have one of those multi-purpose photocopier / printer / scanners whereby hard documents are scanned, converted to PDF and stored or shared? Perhaps posted documents may need to have an electronic copy stored or shared so documents are scanned, converted to a PDF and emailed automatically...
Datasheet

Clearswift Malware Protection

The Clearswift Secure Gateways provide a number of ways to eliminate the risk of malware entering or proliferating around an organization.The primary methods of malware detection will be performed through the use of Sophos and Avira Anti-Virus (AV) software. In recent real-world testing conducted by AV-Test in May-June 2023, both anti-virus vendors scored perfect scores against zero-day malware...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of targets, looking for publically available information on the Internet and...
Datasheet

Anti-Steganography: Combating External Threats and Data Loss in Images

As cyber threats become more evasive, technology that protects organizations must have the capability to look deeper into the content flowing in and out of the network to ensure that the information being shared between users and recipients does not carry a harmful or sensitive payload. Increasingly, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or...
Datasheet

Adaptive Redaction: Structural and Document Sanitization

What is sanitization? Sanitization involves cleansing or purging files of dangerous hidden content. That content can be either active (for example, malware), or informational (such as hidden properties). An example of harmful code could be an invisible and malicious script on an otherwise legitimate web page or embedded into a document. Remediation for this requires structural sanitization. An...