Resources

On-Demand Webinar

Spam Mechanisms in the Secure Email Gateway

This first webinar in a series of five spanning Best Practices for using Clearswift's Secure Gateways covered the more than 15 configurable spam mechanisms in the Secure Email Gateway (SEG) appliance with a choice of local or global policy. Listen as Dr. Steve Jeffery, Lead Solutions Engineer at Fortra, discusses the spam rules, where they get evaluated, URL detection, and...
Blog

How Fortra's Clearswift Secure Email Gateway Aligns to NCSC's Email Security Guidelines

Working in cybersecurity is one of the most challenging roles in the organisation. Not only are you tasked with keeping the business and its data safe and secure, but you must do so in the face of ever-increasing professionalism and sophistication on the part of cybercriminals. There are more threats than ever before, and the consequences of a data breach are more significant...
Guide

Protecting Your Organization From Advanced Threats

Today’s cyber attacks appear relentless, growing in frequency and intensity, and proliferating throughout all industries. There is no ‘normal’ and the impact of each attack is felt throughout organizations--from supply chain to customers, partners, and beyond. ...
Datasheet

Clearswift Endpoint DLP

Business Problem With over 3 billion records lost through data breaches in 2017 and new data protections law being enforced across the globe, organizations need to understand where their critical information resides and ensure it can’t be leaked through removable devices. We live in a data centric world. Businesses provide employees access to data in order for them to do...
Blog

Microsoft 365's Good. Clearswift's SEG Makes It More Secure.

Microsoft 365 has certainly become a mainstay. In order to stay safe and secure, Fortra's Clearswift Secure Email Gateway provides an additional needed layer to Microsoft 365.
Blog

Financials & Card Data Top Q3 Targets on the Dark Web

In Q3, credit unions nearly overtook national banks as the top targeted industry on the Dark Web, according to recent data from Fortra’s PhishLabs.
Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

Today’s Email Encryption Options. Which One is Right For You?

Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data breaches occurring.
Guide

Controlling Classified Information

This guide demonstrates how Clearswift’s Secure Email Gateway and Secure ICAP Gateway work together with classification tools, from vendors such as Janusnet or Titus, to provide a combined information classification and data loss prevention solution that’s both easy to use and secure.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Video

Shaping Cybersecurity Resilience in Financial Services

In this webinar we reveal the results of this survey, discuss the strategic implications the finance sector faces now and in the future, and consider how stronger cybersecurity resilience can be achieved.
Guide

The Unknown Threat Report

We surveyed 1,000 UK public sector employees to discover the current cybersecurity state-of-play, specifically within local and central government.
Blog

Moving on From Encryption – The Case for eDRM

Enterprise digital rights management (eDRM or Information Rights Management, IRM) has had a rocky start to life. While it’s been around for the last 20 years and is seen as the next step on from encryption, it just hasn’t made it into mainstream use.
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.
Blog

A Business World in the Clouds

Safeguarding Against the Security Pitfalls of Cloud-Based Platforms Majority of us are intimately familiar with the concept of ‘the Cloud’, the seemingly omnipresent information sharing and storage solution.  But how much do you know about the security systems that defend it?  Most of you may already be using cloud-based programs such as GoogleDocs, DropBox or, more commonly,...