Resources

Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new...
Blog

Today’s Email Encryption Options. Which One is Right For You?

Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data breaches occurring.
Datasheet

Improving Control of Regulated ITAR Information

The United States Government has substantially increased action against organizations and individuals responsible for breaches of the International Traffic in Arms Regulation (ITAR). This poses challenges for global defense corporations as data related to specific technologies may need to be transferred over the Internet or stored locally outside of the United States, in order...
Guide

Email Encryption Best Practices

Email continues to be the lifeblood of organizations today. With changes to legislation and the increased attention on data breaches now is the time to revisit your email solution and policies to improve the security of the information that flows through it – both inbound and outbound.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Datasheet

Automating the Provision of Trust Certificates Using Clearswift’s Trust Manager

Email is still the preferred method of business collaboration in use. With the growth of sensitive content being shared legitimately between organizations and the pressures to ensure data is being sent in a secure fashion, the use of email encryption is almost essential. Multiple analysts show the email encryption market growing with a 20+% CAGR from 2018-2025. Encryption...
Datasheet

Clearswift Secure Exchange Gateway

The Clearswift Secure Exchange Gateway (SXG) helps to safeguard against inappropriate or critical information being distributed internally and subsequently leaving an organization.  Underpinning both policy and compliance requirements, the Clearswift SXG detects malware and inappropriate file types and identifies violations in conversations based on an easily defined policy...
Datasheet

Clearswift Secure Email Gateway

Powerful Email Security with Real-Time Protection Around the world, defense agencies, governments, and financial institutions rely on Clearswift’s award-winning, on-premise Secure Email Gateway (SEG) to provide the highest level of protection for email, transforming it from a high-risk communication channel to one that is safe and secure. With deep content inspection...
Datasheet

Clearswift Managed Email Security Service

Fortra's Clearswift offers an affordable and effective managed Email Security service that enables the highest level of protection, a reduction in day to day management overhead, but keeps you in control. Clearswift Managed Service customers are effectively offered all the benefits of an advance email security system with management, monitoring and logfile access, but without...
Datasheet

Clearswift Malware Protection

The Clearswift Secure Gateways provide a number of ways to eliminate the risk of malware entering or proliferating around an organization.The primary methods of malware detection will be performed through the use of Sophos and Avira Anti-Virus (AV) software. In recent real-world testing conducted by AV-Test in May-June 2023, both anti-virus vendors scored perfect scores...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of...
Datasheet

Adaptive Redaction: Structural and Document Sanitization

What is sanitization? Sanitization involves cleansing or purging files of dangerous hidden content. That content can be either active (for example, malware), or informational (such as hidden properties). An example of harmful code could be an invisible and malicious script on an otherwise legitimate web page or embedded into a document. Remediation for this requires structural...
Datasheet

Encryption for the Public Sector

Encryption for the Public Sector With an ever-growing need for secure business communication and collaboration methods, email remains the primary channel for information sharing. However, the challenge for many in the public sector, including Government departments, local government, government agencies and public bodies, is how to share and receive information securely with...
Datasheet

Clearswift Email Encryption

Fortra's Clearswift Secure Email Gateway appliance provides a number of options to secure email sent over the Internet through the use of encryption. Securing messages by encryption ensures that messages have: Confidentiality – generally messages can’t be read by the wrong person Integrity – the message is intact and can be shown to have not been modified by anyone from...