Resources

Datasheet

Anti-Steganography: Combating External Threats and Data Loss in Images

As cyber threats become more evasive, technology that protects organizations must have the capability to look deeper into the content flowing in and out of the network to ensure that the information being shared between users and recipients does not carry a harmful or sensitive payload. Increasingly, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or...
Datasheet

Adaptive Redaction: Structural and Document Sanitization

What is sanitization? Sanitization involves cleansing or purging files of dangerous hidden content. That content can be either active (for example, malware), or informational (such as hidden properties). An example of harmful code could be an invisible and malicious script on an otherwise legitimate web page or embedded into a document. Remediation for this requires structural sanitization. An...
Datasheet

Adaptive Redaction: Data Redaction

In today's cyber threat landscape, businesses need to ensure they have the right security measures in place to prevent data leaks or theft. However, many email gateway security solutions can slow down productivity with their 'stop and block' approach to content leaving the organization. Clearswift provides a solution that prevents data loss while allowing collaboration and productivity to continue...
Datasheet

Clearswift On-Premise Encryption Portal

Today's businesses run on information and collaboration, but with collaboration and fast communication channels like email, there is a new challenge. How do organizations enable collaboration without compromising the security of their information? Encryption is a widely accepted solution for protecting information within emails. However, when organizations are communicating with non-technical...
Datasheet

Clearswift Hosted Encryption Portal

With an ever growing need for secure business communication and collaboration methods, email still remains the primary means for most organizations to do business. However, the challenge for some organizations is how to communicate securely to their customers. Business Problem Today’s business run on information and collaboration. Collaboration which used to be internal is now just as likely to...
Datasheet

Clearswift and Echoworx: Encryption Portal

There are a variety of Email Encryption options available on the market today, but a number of these solutions can be too complicated for people to use and adoption of encryption technology is often hindered for this reason. Clearswift, in conjunction with Echoworx, provides an intelligent, automated encryption solution to ensure that email messages are delivered securely, and critical information...
Demo

Clearswift ARgon for Email Demo

With ARgon for Email, any organization can add advanced Data Loss Prevention (DLP) capabilities to any email gateway. All while improving the security against cyber-threats and reducing the risk of data loss. Your live demo will include: Discussion around your unique challenges and requirements A walkthrough of the software in action An overview of the ARgon for Email benefits and features Plenty...
Demo

Clearswift Secure Exchange Gateway Demo

The Clearswift Secure Exchange Gateway helps to safeguard against critical information from being distributed internally and subsequently leaving an organization. With deep content inspection capability and powerful adaptive redaction features, it removes evasive cyber-threats and prevents unwanted data breaches in real-time. Your live demo will include: Discussion around your unique challenges...
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn...
Blog

Has Your Multifunction Printer Become A Data Loss Risk? Consider DLP For Images.

Optical Character Recognition (OCR) as a technology has been around for a long time. It inspects images for text and then decodes them. While the human eye is fantastic at recognizing text, be it upside down or at an angle, it is computationally intensive to do this by machine on a regular basis. However, new algorithms now exist to deal with skew (angled text) as well as being able to handle...
Blog

Preparing for the Inevitable: A Guide to Handling a Data Breach

Cyber-attacks and data breaches are now so widespread that it isn’t a matter of ‘if’ but ‘when’ your organization gets hit. According to the UK Government’s latest Cyber Security Breaches Survey , nearly seven in ten large businesses identified a breach or attack in the past year. When taking into consideration all sizes of businesses in the UK, nearly half had suffered a breach or attack. The...
Blog

Microsoft Deal Is a Start, But More Needs to be Done to Protect the NHS from Cyber Threats

Following the recent WannaCry attack that affected so many organizations, both public and private, across the globe, many firms are now taking steps to protect themselves from potential threats in the future. One establishment in the UK that the WannaCry attack had ramifications for was the NHS. The incident meant multiple hospitals across England and Scotland had to cancel procedures after vital...
Blog

WannaCry Fallout: What the Ransomware Epidemic Means for the Future of Business

Cyber security is now an agenda item in the boardroom, not just the IT department, in the wake of May’s Ransomware attack and the countdown to GDPR compliance well underway. In May, multiple organizations including the NHS, Spain’s Telefónica and Deutsche Bahn were struck with what is arguably the world’s most publicized cyber-attack. Within a day, the ransomware cryptoworm known as WannaCry...
Blog

Security vs. Productivity: The Office Macro Dilemma

There is no doubt that macros are being increasingly used to execute malicious code around the world and we have all know what impact it can have on an organization when they strike. But sometimes team members just need to run macros to get their work done. So, what do you do? As a security professional, you want to prevent macros from running because it's safer and you don’t have to work until 3...