Resources

On-Demand Webinar

Spam Mechanisms in the Secure Email Gateway

This first webinar in a series of five spanning Best Practices for using Clearswift's Secure Gateways covered the more than 15 configurable spam mechanisms in the Secure Email Gateway (SEG) appliance with a choice of local or global policy. Listen as Dr. Steve Jeffery, Lead Solutions Engineer at Fortra, discusses the spam rules, where they get evaluated, URL detection, and message sanitisation...
Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Blog

Financials & Card Data Top Q3 Targets on the Dark Web

In Q3, credit unions nearly overtook national banks as the top targeted industry on the Dark Web, according to recent data from Fortra’s PhishLabs.
Video

What's New with Clearswift V5.4.3?

Learn about the V5.4.3 Clearswift updates, what's on the roadmap for Clearswift features, and how to voice your feature priorities.
Guide

Controlling Classified Information

This guide demonstrates how Clearswift’s Secure Email Gateway and Secure ICAP Gateway work together with classification tools, from vendors such as Janusnet or Titus, to provide a combined information classification and data loss prevention solution that’s both easy to use and secure.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Datasheet

Cross Domain Gateway Filters

Today there is a growing requirement for Cross Domain Solutions (CDS) across internal defence realms, between nations, and across the defence information supply chain. While custom hardware is frequently used in the form of a data diode to execute the actual transfer, there is a need to verify and validate the content prior to the transfer. Business Problem The need to share information is growing...
Video

Shaping Cybersecurity Resilience in Financial Services

In this webinar we reveal the results of this survey, discuss the strategic implications the finance sector faces now and in the future, and consider how stronger cybersecurity resilience can be achieved.
Guide

The Unknown Threat Report

We surveyed 1,000 UK public sector employees to discover the current cybersecurity state-of-play, specifically within local and central government.