Resources

On-Demand Webinar

Spam Mechanisms in the Secure Email Gateway

This first webinar in a series of five spanning Best Practices for using Clearswift's Secure Gateways covered the more than 15 configurable spam mechanisms in the Secure Email Gateway (SEG) appliance with a choice of local or global policy. Listen as Dr. Steve Jeffery, Lead Solutions Engineer at Fortra, discusses the spam rules, where they get evaluated, URL detection, and message sanitisation...
Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Video

What's New with Clearswift V5.4.3?

Learn about the V5.4.3 Clearswift updates, what's on the roadmap for Clearswift features, and how to voice your feature priorities.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Blog

Inside Out, Outside in, Inside in...

Threats from outside the organization are still happening, but it's the threats from within which are causing a greater challenge. Not just employees but third parties who have access to internal systems and information.