Resources

Datasheet

Improving Control of Regulated ITAR Information

The United States Government has substantially increased action against organizations and individuals responsible for breaches of the International Traffic in Arms Regulation (ITAR). This poses challenges for global defense corporations as data related to specific technologies may need to be transferred over the Internet or stored locally outside of the United States, in order to make business...
Guide

Email Encryption Best Practices

Email continues to be the lifeblood of organizations today. With changes to legislation and the increased attention on data breaches now is the time to revisit your email solution and policies to improve the security of the information that flows through it – both inbound and outbound.
Guide

WannaCry Survey Infographic

Attitudes have changed in the wake of WannaCry. This infographic features survey results from a Clearswift commissioned survey.
Guide

Preparing for a Cyber-Breach

This guide will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Datasheet

Automating the Provision of Trust Certificates Using Clearswift’s Trust Manager

Email is still the preferred method of business collaboration in use. With the growth of sensitive content being shared legitimately between organizations and the pressures to ensure data is being sent in a secure fashion, the use of email encryption is almost essential. Multiple analysts show the email encryption market growing with a 20+% CAGR from 2018-2025. Encryption Options There are a wide...
Datasheet

Clearswift Secure Exchange Gateway

The Clearswift Secure Exchange Gateway (SXG) helps to safeguard against inappropriate or critical information being distributed internally and subsequently leaving an organization. Underpinning both policy and compliance requirements, the Clearswift SXG detects malware and inappropriate file types and identifies violations in conversations based on an easily defined policy based rules. Data Loss...
Datasheet

Clearswift Secure Email Gateway

Powerful Email Security with Real-Time Protection Around the world, defense agencies, governments, and financial institutions rely on Clearswift’s award-winning, on-premise Secure Email Gateway (SEG) to provide the highest level of protection for email, transforming it from a high-risk communication channel to one that is safe and secure. With deep content inspection capability and powerful...
Datasheet

Clearswift Managed Email Security Service

Fortra's Clearswift offers an affordable and effective managed Email Security service that enables the highest level of protection, a reduction in day to day management overhead, but keeps you in control. Clearswift Managed Service customers are effectively offered all the benefits of an advance email security system with management, monitoring and logfile access, but without the effort of hosting...
Datasheet

Clearswift Malware Protection

The Clearswift Secure Gateways provide a number of ways to eliminate the risk of malware entering or proliferating around an organization.The primary methods of malware detection will be performed through the use of Sophos and Avira Anti-Virus (AV) software. In recent real-world testing conducted by AV-Test in May-June 2023, both anti-virus vendors scored perfect scores against zero-day malware...
Datasheet

Clearswift and Secure File Transfer

Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection , combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration. Safely Share Information while keeping your Critical Information Protected Advanced Threat Protection and Adaptive Data Loss Prevention for...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of targets, looking for publically available information on the Internet and...
Datasheet

Adaptive Redaction: Structural and Document Sanitization

What is sanitization? Sanitization involves cleansing or purging files of dangerous hidden content. That content can be either active (for example, malware), or informational (such as hidden properties). An example of harmful code could be an invisible and malicious script on an otherwise legitimate web page or embedded into a document. Remediation for this requires structural sanitization. An...
Datasheet

Encryption for the Public Sector

Encryption for the Public Sector With an ever-growing need for secure business communication and collaboration methods, email remains the primary channel for information sharing. However, the challenge for many in the public sector, including Government departments, local government, government agencies and public bodies, is how to share and receive information securely with each other, third...
Datasheet

Clearswift Email Encryption

Fortra's Clearswift Secure Email Gateway appliance provides a number of options to secure email sent over the Internet through the use of encryption. Securing messages by encryption ensures that messages have: Confidentiality – generally messages can’t be read by the wrong person Integrity – the message is intact and can be shown to have not been modified by anyone from sender to recipient Non...