Resources | Clearswift

Resources

Datasheet

Secure Email Gateway Sandbox

Upgrade your existing Clearswift Secure Email Gateway (SEG) with the next-gen Cloud-Sandbox from Sophos. This network sandbox offers state of the art machine learning to provide an additional layer of security against ransomware and targeted attacks, but without any more systems to manage.
Datasheet

Using Clearswift Secure Email Gateway to Enhance Data Security in Microsoft Office 365

For many organizations, Office 365 is the ideal collaboration tool, providing a convenient platform for employees to share information and communicate daily. Microsoft offers different tiered packages to suit a variety of customer requirements. Its Office 365 Enterprise E5 and Microsoft 365 E5 packages provide platforms for mid and larger sized enterprises, with lower tiered products offering...
Datasheet

Clearswift URL Filtering

General Features Categorizing 99.9% of the active web, enabled by a Global Feedback Network of hundreds of millions of users worldwide More than 55 million sites categorized with 10 million new sites added and 10 million dead sites removed each year Coverage representing billions of web pages from around the world Over 100 categories using automated categorization technology (machine learning)...
Blog

How Clearswift’s Secure Email Gateway aligns to NCSC Email Security Guidelines

Working in cybersecurity is one of the most challenging roles in the organization. Not only are you tasked with keeping the business and its data safe and secure, but you must do so in the face of ever-increasing professionalism and sophistication on the part of cyber-criminals. There are more threats than ever before, and the consequences of a data breach are more significant too. In recent...
Blog

Are Cybersecurity and Data Protection Now Integral to Business Success?

Organizations have had to increase the cybersecurity measures they put in place to keep data safe and secure. Consequently, cybersecurity solutions are more widely deployed, and data protection measures are prioritized more than ever.
Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Blog

Today’s Email Encryption Options. Which One is Right For You?

Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data...
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.