Resources

Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Blog

Data Privacy Day - Education and Inspiration

Dependency on the internet for communications and business are at an all time high, and so are cyberattacks. We discuss how you can protect your organization's sensitive information.
Quote

Clearswift Secure Email Gateway Pricing

The Clearswift Secure Email Gateway appliance provides the highest level of protection for email, transforming it from a high-risk communication channel to one that is safe and secure. With deep content inspection capability and powerful adaptive redaction features, it removes evasive cyber threats and prevents unwanted data breaches in real time. Please fill out the form and one of our experts...
Datasheet

Secure Email Gateway Cloud Sandbox

Upgrade your existing Fortra's Clearswift Secure Email Gateway (SEG) appliance with the next-gen Cloud Sandbox from Sophos. This network sandbox offers state-of-the-art machine learning to provide an additional layer of security against ransomware and targeted attacks, but without any more systems to manage. Enterprise-grade protection that’s deployable in minutes with seamless integration into...
Datasheet

Using Fortra's Clearswift Secure Email Gateway Appliance to Enhance Data Security in Microsoft 365

For many organizations, Microsoft 365 is the ideal collaboration tool, providing a convenient platform for employees to share information and communicate daily. Microsoft offers different tiered packages to suit a variety of customer requirements. Its Microsoft 365 E5 package provides platforms for mid- and larger-sized enterprises, with the lower-tiered packages (e.g., E1 and E3) offering fewer...
Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

How to Enhance Data Loss Prevention in Office 365

Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Datasheet

Improving Control of Regulated ITAR Information

The United States Government has substantially increased action against organizations and individuals responsible for breaches of the International Traffic in Arms Regulation (ITAR). This poses challenges for global defense corporations as data related to specific technologies may need to be transferred over the Internet or stored locally outside of the United States, in order to make business...