Resources

Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Datasheet

Protecting Information Across the Defence Supply Chain

Clearswift supports organisations to comply with the Defence Cyber Protection Partnership cyber risk control requirements that seek to protect UK military capability throughout the MOD supply chain. Business Problem In the face of cyberattacks being recognised as a Tier 1 threat within the National Security Strategy, the UK seeks to secure a truly competitive, sustainable, and globally successful...
Blog

Microsoft's Defender for Identity – Is it Enough?

In early 2023, Microsoft launched Defender for Identity which aims to offer visibility by helping to identify threats and provide actionable reports on attacks. But M365 security is not completely adequate for the modern enterprise and must be augmented by other data security solutions.
Datasheet

Clearswift Information Governance Server

In today’s global information age, there is a need to protect information. Not all information is created equal, so rather than trying to protect everything, critical information needs to be singled out. In order to protect the information, there is a need to be able to track it and then to apply the appropriate protection. The Information Governance Server (IGS) sits in the heart of the network...
Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new employees, healthcare...
Datasheet

Clearswift Adaptive Data Loss Prevention

Clearswift Adaptive Data Loss Prevention (A-DLP) is the data and people-centric solution to critical information protection. Unlike others, A-DLP is a non-disruptive solution which supports continuous collaboration, avoids business interruption and mitigates the risk of financial or reputational damage caused by the unauthorized disclosure of sensitive data wherever it lives – at the endpoint, on...
Datasheet

Cross Domain Security Solutions for Defence

There remains an ongoing challenge with Cross Domain information sharing, as increasing cyber risk further exposes the danger of the wrong information being sent to the wrong place and the transferred material containing malicious content which can harm critical information systems. This challenge is increasing with the priority now given for effective information interoperability and the ongoing...
Datasheet

Clearswift and Secure File Transfer

Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection , combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration. Safely Share Information while keeping your Critical Information Protected Advanced Threat Protection and Adaptive Data Loss Prevention for...
Blog

Public Sector Cybersecurity Priorities in 2021

The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?
Blog

Clearswift and GoAnywhere Demonstrate Award-Winning File Transfer Technology at RSA

The RSA Conference (RSAC) has long been regarded as one of the information security industry’s biggest and most high-profile gatherings and this year’s event in San Francisco’s Moscone Center from 24 to 28 February 2020, promises to be no different. The delegate and exhibitor lists read like a ‘who’s who’ of information security, with the great and good of the sector in attendance to listen to...
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.