Resources

Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new employees, healthcare...
Blog

How to Prevent Data Exfiltration

To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.
Blog

Today’s Email Encryption Options. Which One is Right For You?

Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data...
Datasheet

Improving Control of Regulated ITAR Information

The United States Government has substantially increased action against organizations and individuals responsible for breaches of the International Traffic in Arms Regulation (ITAR). This poses challenges for global defense corporations as data related to specific technologies may need to be transferred over the Internet or stored locally outside of the United States, in order to make business...
Guide

PCI Compliance Best Practices

While the database issues and solutions are well known, the real challenge is around unstructured data, where credit card information finds its way into email and documents, these are then transferred around and outside the organization creating unnecessary risk.
Guide

Controlling Classified Information

This guide demonstrates how Clearswift’s Secure Email Gateway and Secure ICAP Gateway work together with classification tools, from vendors such as Janusnet or Titus, to provide a combined information classification and data loss prevention solution that’s both easy to use and secure.
Guide

Email Encryption Best Practices

Email continues to be the lifeblood of organizations today. With changes to legislation and the increased attention on data breaches now is the time to revisit your email solution and policies to improve the security of the information that flows through it – both inbound and outbound.
Guide

The GDPR Divide: Board Views vs. Middle Management

Clearswift recently surveyed 600 business decision makers and 1,200 employees, across the UK, US, Germany and Australia, and found that board level respondents are more confident about having the necessary processes in place to be GDPR-compliant than senior management are.
Guide

Customer Support Handbook

Clearswift is dedicated to optimising the success of our customers and to attaining the highest levels of customer satisfaction through the delivery of professional, efficient and high quality support across the Clearswift product portfolio.
Guide

WannaCry Survey Infographic

Attitudes have changed in the wake of WannaCry. This infographic features survey results from a Clearswift commissioned survey.
Guide

Preparing for a Cyber-Breach

This guide will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.