Resources

Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Datasheet

Using Fortra's Clearswift Secure Email Gateway Appliance to Enhance Data Security in Microsoft 365

For many organizations, Microsoft 365 is the ideal collaboration tool, providing a convenient platform for employees to share information and communicate daily. Microsoft offers different tiered packages to suit a variety of customer requirements. Its Microsoft 365 E5 package provides platforms for mid- and larger-sized enterprises, with the lower-tiered packages (e.g., E1 and E3) offering fewer...
Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

How to Prevent Data Exfiltration

To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.
Guide

WannaCry Survey Infographic

Attitudes have changed in the wake of WannaCry. This infographic features survey results from a Clearswift commissioned survey.
Guide

Preparing for a Cyber-Breach

This guide will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Datasheet

Clearswift Secure Web Gateway

The internet is now considered an extension of an enterprise’s own infrastructure. With the ever growing adoption of cloud-based services such as Salesforce.com and Microsoft 365 , alongside employee use of the internet whilst at work, organizations need to ensure that the content and information that exists and is viewed online is both appropriate and permitted. Protecting themselves from any...
Datasheet

Clearswift Malware Protection

The Clearswift Secure Gateways provide a number of ways to eliminate the risk of malware entering or proliferating around an organization.The primary methods of malware detection will be performed through the use of Sophos and Avira Anti-Virus (AV) software. In recent real-world testing conducted by AV-Test in May-June 2023, both anti-virus vendors scored perfect scores against zero-day malware...
Datasheet

Clearswift and Secure File Transfer

Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection , combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration. Safely Share Information while keeping your Critical Information Protected Advanced Threat Protection and Adaptive Data Loss Prevention for...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of targets, looking for publically available information on the Internet and...