Resources

Guide

WannaCry Survey Infographic

Attitudes have changed in the wake of WannaCry. This infographic features survey results from a Clearswift commissioned survey.
Guide

Preparing for a Cyber-Breach

This guide will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Video

Get the Most from Your Secure Email Gateway

In this webinar, Alyn Hockey, VP Product Management, shows you how to get the most from your Clearswift investment by demonstrating the capabilities of the Secure Gateway.
Video

How to Enhance Data Loss Prevention in Office 365

In this webinar, Nick Hogg, Director of Technical Training, talks through the data risk challenges with Office 365 and looks at ways you can further protect your critical data and secure your installation from cyber threats.
Video

Manage, Sanitize and Secure Your File Transfers

Join our cybersecurity experts to learn how Fortra can help you mount a triple-defense of managing, sanitizing, and securing your file transfers.
Guide

Six Steps to Email Security Best Practice

To help IT Teams define a robust email security policy and determine what’s required from an Email Security solution, we’ve put together a simple six-step guide to email security best practices.
Video

Introduction to the Clearswift Secure Email Gateway

Email remains a strong target for cyber-attacks. This webinar provides insight into Clearswift’s Secure Email Gateway which provides powerful protection against advanced threats and data loss.
Guide

The Unknown Threat Report

We surveyed 1,000 UK public sector employees to discover the current cybersecurity state-of-play, specifically within local and central government.