Guide
Critical Data Protection
Depending where you are in the world, there is a term for the loss of information from an organization – data loss, data leak, data theft, or even data spill.
Datasheet
Clearswift Secure Web Gateway
The internet is now considered an extension of an enterprise’s own infrastructure. With the ever growing adoption of cloud-based services such as Salesforce.com and Microsoft 365, alongside employee use of the internet whilst at work, organizations need to ensure that the content and information that exists and is viewed online is both appropriate and permitted. Protecting themselves from any...
Datasheet
Clearswift Secure Email Gateway
Powerful Email Security with Real-Time Protection
Around the world, defense agencies, governments, and financial institutions rely on Clearswift’s award-winning, on-premise Secure Email Gateway (SEG) to provide the highest level of protection for email, transforming it from a high-risk communication channel to one that is safe and secure.
With deep content inspection capability and powerful...
Datasheet
Clearswift and Secure File Transfer
Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection, combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration.
Safely Share Information while keeping your Critical Information Protected
Advanced Threat Protection and Adaptive Data Loss Prevention for...
Blog
Data Security Best Practices Every CISO Should Know
Thu, 04/29/2021
The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch.
Blog
10 Tips to Protect Your Company’s Data in 2021
Thu, 01/21/2021
When thinking about data security strategies in 2021, here are 10 tips to keep in mind.
Blog
Clearswift Wins DLP Award at Computing Security Excellence Awards
Mon, 11/25/2019
Today, we are thrilled to announce our 2019 Computing Security Excellence Award win for Data Loss Prevention (email and web) – the second consecutive win for us at the awards! The Computing Security Excellence Awards celebrate the highest quality cybersecurity products, so it’s fantastic to see our Adaptive Data Loss Prevention (DLP) solution recognized for its market-leading offering.
Big...
Blog
5 Cyber Security Threats You Didn’t Know You Should Be Threatened By
Mon, 10/21/2019
High profile hacks over the last few months have put large organizations front and center of a media frenzy that highlights the dangers of inadequate data protection.
Blog
Defense in Focus: With New Technology Comes New Risk
Fri, 09/06/2019
In any industry, the strive for digital transformation brings with it risk as well as opportunity. This is no more apparent than in the defense sector where several high-profile incidents have exposed vulnerabilities in areas such as email applications and other connected IoT devices.
Blog
Capital One Data Breach: A Reminder to Lock Your Back Door
Tue, 08/13/2019
In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.”
This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Blog
The Top 3 Emerging Technologies Posing a Cyber-Threat to our Critical National Infrastructure
Wed, 07/17/2019
It is vital that security measures match that of the technology introduced such as AI, 5G, and the Internet of Things.
Blog
Next Generation Cyber Threats: Images
Fri, 05/31/2019
Traditional Data Loss Prevention (DLP) technology provides protection against the traditional threat of someone trying to send a file to an unauthorized individual, but it required a step change to enable Adaptive Data Loss Prevention with Deep Content Inspection (DCI) to address threats such as ransomware that is delivered embedded in innocuous-looking documents. Clearswift delivered our first version of Adaptive Redaction in 2013 and have continuously improved the technology in every release since then.
Blog
From Pesky to Dangerous - Image-based Spam
Tue, 05/21/2019
Those of you that can remember back to 2006 may recall that High School Musical was the highest selling album of the year. “We’re all in this together” was one of the most popular songs played at the time and, some would say, a pesky tune that would stick in your head.
It also happened to be the same time when image-based spam was at its peak, another pesky occurrence that was hammering our...
Blog
The Top 5 Cyber Threats that Brexit Brings
Tue, 05/14/2019
Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.
Blog
Fighting the War at Home: How Your Employees are Your Greatest Asset in the Battle Against Data Loss
Tue, 04/02/2019
Sun Tzu once stated that: “The supreme art of war is to subdue the enemy without fighting” and two and a half thousand years later his rhetoric stands the test of time, as today we are seeing this ancient ideal applied in the most modern of battlegrounds: the fight against cyber-crime.
To tackle both the malicious and accidental data loss threat, organizations need to have preventative technology...
Blog
A Business World in the Clouds
Fri, 03/22/2019
Safeguarding Against the Security Pitfalls of Cloud-Based Platforms
Majority of us are intimately familiar with the concept of ‘the Cloud’, the seemingly omnipresent information sharing and storage solution. But how much do you know about the security systems that defend it? Most of you may already be using cloud-based programs such as GoogleDocs, DropBox or, more commonly, Microsoft 365 – the...
Blog
Authenticating with Authority: Can Multi-Factor Authentication Provide Total Protection?
Mon, 03/04/2019
The recent data breaches emphasize the danger facing data-storing companies and emphasizes the need for a more comprehensive attitude towards data security.
Blog
Cutting Out the ‘False Positive’ with Lexical Expression Qualifiers
Thu, 12/20/2018
When it comes to traditional Data Loss Prevention (DLP) solutions, the ‘false positive’ is frequently the downfall. This is where an event is triggered by a policy in error. For example, a 16-digit number could be a credit card number, or it could be a reference number. If one is mistaken for the other, then this gives rise to a false positive.
All DLP events need to be investigated, so the...
Blog
5 Data Breaches That Could Have Been Avoided in 2018
Wed, 12/19/2018
Many cyber threats can be prevented. In 2018 the world saw many avoidable cybersecurity threats, and we will discuss the top five incidents.