Resources

On-Demand Webinar

Spam Mechanisms in the Secure Email Gateway

This first webinar in a series of five spanning Best Practices for using Clearswift's Secure Gateways covered the more than 15 configurable spam mechanisms in the Secure Email Gateway (SEG) appliance with a choice of local or global policy. Listen as Dr. Steve Jeffery, Lead Solutions Engineer at Fortra, discusses the spam rules, where they get evaluated, URL detection, and message sanitisation...
Datasheet

Clearswift Endpoint DLP

Business Problem With over 3 billion records lost through data breaches in 2017 and new data protections law being enforced across the globe, organizations need to understand where their critical information resides and ensure it can’t be leaked through removable devices. We live in a data centric world. Businesses provide employees access to data in order for them to do their job; to collaborate...
Blog

Financials & Card Data Top Q3 Targets on the Dark Web

In Q3, credit unions nearly overtook national banks as the top targeted industry on the Dark Web, according to recent data from Fortra’s PhishLabs.
Guide

Controlling Classified Information

This guide demonstrates how Clearswift’s Secure Email Gateway and Secure ICAP Gateway work together with classification tools, from vendors such as Janusnet or Titus, to provide a combined information classification and data loss prevention solution that’s both easy to use and secure.
Video

Shaping Cybersecurity Resilience in Financial Services

In this webinar we reveal the results of this survey, discuss the strategic implications the finance sector faces now and in the future, and consider how stronger cybersecurity resilience can be achieved.
Guide

The Unknown Threat Report

We surveyed 1,000 UK public sector employees to discover the current cybersecurity state-of-play, specifically within local and central government.
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.
Blog

Your Holiday Security Checklist

Are you ready for the holidays? As everyone wraps up for their holiday break, have you ensured that your organization is set to handle anything and everything when it comes to security while you’re out of the office? Stay ahead of the game by following our quick holiday security checklist. And don’t forget to check it twice!
Blog

Next Generation Organization Agility... Are You Ready?

The blurring of work and life boundaries that exist on devices, both with the changes to the law on flexible working and the general rise of BYOD, means that it’s far too easy to send information to the wrong person via email – and then be penalised for it.
Blog

Why Access Information?

Blog by Kevin Bailey, Head of Market Strategy. One of the easiest ways to stop attacks on information is to close down the shutters, build impenetrable firewalls, stop all access and return to the world of the chalk and blackboard.
Blog

Quit While You’re Ahead...?

Last week saw The Open Group conference take place in London. In conjunction with this was The Jericho Forum’s announcement that after ten years they were declaring success and sunsetting.
Blog

The Pitfalls of Handling Credit Card Details

Credit card fraud in 2012 cost $5.55 billion worldwide. But there are other problems - is the way you handle credit card information sufficient?