Resources

Guide

WannaCry Survey Infographic

Attitudes have changed in the wake of WannaCry. This infographic features survey results from a Clearswift commissioned survey.
Guide

Preparing for a Cyber-Breach

This guide will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Guide

Critical Data Protection in 2018

Data loss, data leak, data theft and even data spill, depending where you are in the world there is a term for the loss of information from an organization.
Datasheet

Critical Information Protection for Application Availability with F5 & Clearswift

What Is the Solution? Available with the integration of unique Adaptive Redaction technology via the Clearswift Secure ICAP Gateway (SIG) with F5® BIG-IP® Local Traffic Manager™ (LTM®). As a member of the F5 Technology Alliance Program (TAP), together Clearswift and F5 provide a highly scalable Secure application delivery platform that takes full advantage of Clearswift’s unique Adaptive Redaction...
Datasheet

Clearswift Professional Services: Adaptive Redaction Policy Definition

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Clearswift Professional Services: Policy Migration

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Clearswift Professional Services: Policy Definition

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Clearswift Support Services Health Check

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Upgrade - Clearswift Professional Services

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

Installation - Clearswift Professional Services

At Clearswift, we recognise that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of service packages we offer has been designed to ensure that you get the maximum value from your investment in...
Datasheet

eDRM for Email

Traditional encryption allows content to be securely delivered but after that, there is no control. eDRM technology enables full control of information even when it has left the organization. Business Problem As a business. there is a need to collaborate with third-party organizations such as customers, suppliers, partners, and regulators. While data can be sent securely using one of many...
Datasheet

Secure File Sharing for Defence

With a priority to responding to tasks and building for the future, Defence organisations demand enhanced capabilities for secure information sharing as part of a drive for digital by default, to harness the transformative power of technology whilst avoiding the burdens of non-standard, bespoke, and ‘locked-in’ methods of exchanging data. Business Problem Throughout the defence sector, there is a...
Datasheet

Clearswift Adaptive Data Loss Prevention

Clearswift Adaptive Data Loss Prevention (A-DLP) is the data and people-centric solution to critical information protection. Unlike others, A-DLP is a non-disruptive solution which supports continuous collaboration, avoids business interruption and mitigates the risk of financial or reputational damage caused by the unauthorized disclosure of sensitive data wherever it lives – at the endpoint, on...
Datasheet

Cross Domain Gateway Filters

Today there is a growing requirement for Cross Domain Solutions (CDS) across internal defence realms, between nations, and across the defence information supply chain. While custom hardware is frequently used in the form of a data diode to execute the actual transfer, there is a need to verify and validate the content prior to the transfer. Business Problem The need to share information is growing...
Datasheet

Automating the Provision of Trust Certificates Using Clearswift’s Trust Manager

Email is still the preferred method of business collaboration in use. With the growth of sensitive content being shared legitimately between organizations and the pressures to ensure data is being sent in a secure fashion, the use of email encryption is almost essential. Multiple analysts show the email encryption market growing with a 20+% CAGR from 2018-2025. Encryption Options There are a wide...
Datasheet

Cross Domain Security Solutions for Defence

There remains an ongoing challenge with Cross Domain information sharing, as increasing cyber risk further exposes the danger of the wrong information being sent to the wrong place and the transferred material containing malicious content which can harm critical information systems. This challenge is increasing with the priority now given for effective information interoperability and the ongoing...