Resources

Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Blog

Data Privacy Day - Education and Inspiration

Dependency on the internet for communications and business are at an all time high, and so are cyberattacks. We discuss how you can protect your organization's sensitive information.
Datasheet

Secure Email Gateway Cloud Sandbox

Upgrade your existing Fortra's Clearswift Secure Email Gateway (SEG) appliance with the next-gen Cloud Sandbox from Sophos. This network sandbox offers state-of-the-art machine learning to provide an additional layer of security against ransomware and targeted attacks, but without any more systems to manage. Enterprise-grade protection that’s deployable in minutes with seamless integration into...
Datasheet

Using Fortra's Clearswift Secure Email Gateway Appliance to Enhance Data Security in Microsoft 365

For many organizations, Microsoft 365 is the ideal collaboration tool, providing a convenient platform for employees to share information and communicate daily. Microsoft offers different tiered packages to suit a variety of customer requirements. Its Microsoft 365 E5 package provides platforms for mid- and larger-sized enterprises, with the lower-tiered packages (e.g., E1 and E3) offering fewer...
Datasheet

Clearswift URL Filtering

General Features Categorizing 99.9% of the active web, enabled by a Global Feedback Network of hundreds of millions of users worldwide More than 55 million sites categorized with 10 million new sites added and 10 million dead sites removed each year Coverage representing billions of web pages from around the world Over 100 categories using automated categorization technology (machine learning)...
Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

How to Enhance Data Loss Prevention in Office 365

Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

Reflecting on RSA Conference 2014

The end of February. The RSA Conference 2014. Downtown San Francisco with 25,000+ other security professionals. It’s big... really, really big... 400 exhibitors, 500 speakers and tens of thousands of attendees. But what was hot? (Other than the Clearswift of course…)
Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new employees, healthcare...
Blog

How to Prevent Data Exfiltration

To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.