Resources

On-Demand Webinar

Spam Mechanisms in the Secure Email Gateway

This first webinar in a series of five spanning Best Practices for using Clearswift's Secure Gateways covered the more than 15 configurable spam mechanisms in the Secure Email Gateway (SEG) appliance with a choice of local or global policy. Listen as Dr. Steve Jeffery, Lead Solutions Engineer at Fortra, discusses the spam rules, where they get evaluated, URL detection, and message sanitisation...
Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Datasheet

Protecting Information Across the Defence Supply Chain

Clearswift supports organisations to comply with the Defence Cyber Protection Partnership cyber risk control requirements that seek to protect UK military capability throughout the MOD supply chain. Business Problem In the face of cyberattacks being recognised as a Tier 1 threat within the National Security Strategy, the UK seeks to secure a truly competitive, sustainable, and globally successful...
Video

What's New with Clearswift V5.4.3?

Learn about the V5.4.3 Clearswift updates, what's on the roadmap for Clearswift features, and how to voice your feature priorities.
Demo

Request a Live Clearswift Secure ICAP Gateway with MFT Demo

Lessen the risk of sharing information in and out of your organization with the Clearswift Secure ICAP Gateway and Managed File Transfer (MFT). This seamless duo provides the management and security you need to keep your business going. Clearswift Secure ICAP Gateway + MFT: Centralized, enterprise-wide managed file transfer Automation and encryption Data redaction Document and structural...
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Datasheet

Critical Information Protection for Application Availability with F5 & Clearswift

What Is the Solution? Available with the integration of unique Adaptive Redaction technology via the Clearswift Secure ICAP Gateway (SIG) with F5® BIG-IP® Local Traffic Manager™ (LTM®). As a member of the F5 Technology Alliance Program (TAP), together Clearswift and F5 provide a highly scalable Secure application delivery platform that takes full advantage of Clearswift’s unique Adaptive Redaction...
Datasheet

Secure File Sharing for Defence

With a priority to responding to tasks and building for the future, Defence organisations demand enhanced capabilities for secure information sharing as part of a drive for digital by default, to harness the transformative power of technology whilst avoiding the burdens of non-standard, bespoke, and ‘locked-in’ methods of exchanging data. Business Problem Throughout the defence sector, there is a...
Datasheet

Clearswift Adaptive Data Loss Prevention

Clearswift Adaptive Data Loss Prevention (A-DLP) is the data and people-centric solution to critical information protection. Unlike others, A-DLP is a non-disruptive solution which supports continuous collaboration, avoids business interruption and mitigates the risk of financial or reputational damage caused by the unauthorized disclosure of sensitive data wherever it lives – at the endpoint, on...
Datasheet

Cross Domain Gateway Filters

Today there is a growing requirement for Cross Domain Solutions (CDS) across internal defence realms, between nations, and across the defence information supply chain. While custom hardware is frequently used in the form of a data diode to execute the actual transfer, there is a need to verify and validate the content prior to the transfer. Business Problem The need to share information is growing...
Datasheet

Cross Domain Security Solutions for Defence

There remains an ongoing challenge with Cross Domain information sharing, as increasing cyber risk further exposes the danger of the wrong information being sent to the wrong place and the transferred material containing malicious content which can harm critical information systems. This challenge is increasing with the priority now given for effective information interoperability and the ongoing...
Datasheet

Clearswift Secure ICAP Gateway

As part of an all-encompassing data security strategy, organizations need to secure and protect content that is uploaded or downloaded from the web or shared via managed file transfer (MFT) solutions. The Secure ICAP Gateway complements existing web proxy infrastructures and MFT software to provide an added layer of data security. A deep content inspection engine detects sensitive or critical data...
Datasheet

Clearswift Optical Character Recognition

Business Problem Does your organization regularly convert Excel or Word documents to PDF file format? Do you have one of those multi-purpose photocopier / printer / scanners whereby hard documents are scanned, converted to PDF and stored or shared? Perhaps posted documents may need to have an electronic copy stored or shared so documents are scanned, converted to a PDF and emailed automatically...
Datasheet

Clearswift Malware Protection

The Clearswift Secure Gateways provide a number of ways to eliminate the risk of malware entering or proliferating around an organization.The primary methods of malware detection will be performed through the use of Sophos and Avira Anti-Virus (AV) software. In recent real-world testing conducted by AV-Test in May-June 2023, both anti-virus vendors scored perfect scores against zero-day malware...
Datasheet

Clearswift and Secure File Transfer

Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection , combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration. Safely Share Information while keeping your Critical Information Protected Advanced Threat Protection and Adaptive Data Loss Prevention for...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of targets, looking for publically available information on the Internet and...