Resources | Clearswift



How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new employees, healthcare...

How to Prevent Data Exfiltration

To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.

Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working

Although the benefits of homeworking are well-documented and recent events have proven that people can work just as effectively from home as they can from the office, many people will likely want at least a partial return to the workplace.

Maintaining Cybersecurity During Rapid Digital Transformation

Digital transformation is the process of using digital technologies to create new — or modify existing — business processes, culture, and customer experiences to meet changing business and market requirements.

Reflecting on RSA Conference 2014

The end of February. The RSA Conference 2014. Downtown San Francisco with 25,000+ other security professionals. It’s big... really, really big... 400 exhibitors, 500 speakers and tens of thousands of attendees. But what was hot? (Other than the Clearswift of course…)

Improving Control of Regulated ITAR Information

Business Problem As an important USA export control law, the International Traffic in Arms Regulations (ITAR) affects the manufacture, sale and distribution of technology in the defense sector. The goal of the legislation is to control access to specific types of technology and their associated data. Overall, the US Government is attempting to prevent the disclosure or transfer of sensitive...

Request a Live Demo

Whether information is flowing inbound or outbound, Fortra's Clearswift solutions protect and ensure compliance of data across email, web, and the cloud. Let’s discuss the solutions right for your organization. Your specific demo will include: Discussion of your cybersecurity requirements Detailed product demo Opportunity for questions Fill out the form to get started. Want to skip the form and...

Request a Quote

Thank you for your interest in Fortra's Clearswift. Our trusted solutions can provide you with consistent protection across email, web, cloud, file transfers and endpoints, allowing your teams to collaborate effectively and securely, while providing control and visibility over important sensitive data. For custom pricing, please complete the form and one of our team will be in touch to discuss...

Mitigating Information Security Risks in Microsoft 365

In this guide, we examine the cybersecurity functionality built into Microsoft 365 and where it falls short when considering the strength of security postures required to meet the increasing level of risk we face today.

PCI Compliance Best Practices

While the database issues and solutions are well known, the real challenge is around unstructured data, where credit card information finds its way into email and documents, these are then transferred around and outside the organization creating unnecessary risk.

Controlling Classified Information

This guide demonstrates how Clearswift’s Secure Email Gateway and Secure ICAP Gateway work together with classification tools, from vendors such as Janusnet or Titus, to provide a combined information classification and data loss prevention solution that’s both easy to use and secure.

Clearswift Endpoint DLP

Business Problem With over 3 billion records lost through data breaches in 2017 and new data protections law being enforced across the globe, organizations need to understand where their critical information resides and ensure it can’t be leaked through removable devices. We live in a data centric world. Businesses provide employees access to data in order for them to do their job; to collaborate...

Email Encryption and Secure File Transfer Best Practices

Email continues to be the lifeblood of organizations today. With changes to legislation and the increased attention on data breaches now is the time to revisit your email solution and policies to improve the security of the information that flows through it – both inbound and outbound.

The GDPR Divide: Board views vs Middle Management

Clearswift recently surveyed 600 business decision makers and 1,200 employees, across the UK, US, Germany and Australia, and found that board level respondents are more confident about having the necessary processes in place to be GDPR compliant than senior management are.

Customer Support Handbook

Clearswift is dedicated to optimising the success of our customers and to attaining the highest levels of customer satisfaction through the delivery of professional, efficient and high quality support across the Clearswift product portfolio.