Resources

Datasheet

Clearswift Malware Protection

The Clearswift Secure Gateways provide a number of ways to eliminate the risk of malware entering or proliferating around an organization.The primary methods of malware detection will be performed through the use of Sophos and Avira Anti-Virus (AV) software. In recent real-world testing conducted by AV-Test in May-June 2023, both anti-virus vendors scored perfect scores against zero-day malware...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of targets, looking for publically available information on the Internet and...
Datasheet

Anti-Steganography: Combating External Threats and Data Loss in Images

As cyber threats become more evasive, technology that protects organizations must have the capability to look deeper into the content flowing in and out of the network to ensure that the information being shared between users and recipients does not carry a harmful or sensitive payload. Increasingly, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or...
Datasheet

Adaptive Redaction: Structural and Document Sanitization

What is sanitization? Sanitization involves cleansing or purging files of dangerous hidden content. That content can be either active (for example, malware), or informational (such as hidden properties). An example of harmful code could be an invisible and malicious script on an otherwise legitimate web page or embedded into a document. Remediation for this requires structural sanitization. An...
Demo

Clearswift Secure Exchange Gateway Demo

The Clearswift Secure Exchange Gateway helps to safeguard against critical information from being distributed internally and subsequently leaving an organization. With deep content inspection capability and powerful adaptive redaction features, it removes evasive cyber-threats and prevents unwanted data breaches in real-time. Your live demo will include: Discussion around your unique challenges...
Blog

Data Security Best Practices Every CISO Should Know

The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch.
Video

How to Enhance Data Loss Prevention in Office 365

In this webinar, Nick Hogg, Director of Technical Training, talks through the data risk challenges with Office 365 and looks at ways you can further protect your critical data and secure your installation from cyber threats.
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn...
Blog

Has Your Multifunction Printer Become A Data Loss Risk? Consider DLP For Images.

Optical Character Recognition (OCR) as a technology has been around for a long time. It inspects images for text and then decodes them. While the human eye is fantastic at recognizing text, be it upside down or at an angle, it is computationally intensive to do this by machine on a regular basis. However, new algorithms now exist to deal with skew (angled text) as well as being able to handle...
Blog

Tips to Protect the Potential Next Target of the Financial Sector – Trading Apps

The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to various security issues, with increased security around detecting fraudulent use, trading apps from smaller businesses have flown under the radar and missed out on improved security. Although cyber...
Blog

Silicon Review Accolade for Clearswift!

Clearswift is honored to have been named as one of the Top 10 Fastest Growing Cyber Security companies in 2017 by Silicon Review magazine. The US-based publication was particularly impressed by Clearswift’s technology portfolio in the areas of data loss prevention and deep content inspection. Silicon Review also referenced Clearswift’s collaborative approach to Adaptive Data Loss Prevention (DLP)...