Resources

Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new employees, healthcare...
Guide

Healthcare Cybersecurity Infographic

We surveyed senior IT decision makers working in the industry to find out the current cybersecurity state-of-play and identity the risks that present the greatest threats. The following infographic illustrates the survey’s key findings.
Datasheet

Improving Control of Regulated ITAR Information

The United States Government has substantially increased action against organizations and individuals responsible for breaches of the International Traffic in Arms Regulation (ITAR). This poses challenges for global defense corporations as data related to specific technologies may need to be transferred over the Internet or stored locally outside of the United States, in order to make business...
Guide

BEC: Why This Basic Threat Is Difficult to Detect

Business Email Compromise (BEC) is “one of the most financially damaging online crimes” according to the FBI1. It is a cunning form of email impersonation that, when combined with human error, can be incredibly disruptive and damaging.
Guide

PCI Compliance Best Practices

While the database issues and solutions are well known, the real challenge is around unstructured data, where credit card information finds its way into email and documents, these are then transferred around and outside the organization creating unnecessary risk.
Guide

Controlling Classified Information

This guide demonstrates how Clearswift’s Secure Email Gateway and Secure ICAP Gateway work together with classification tools, from vendors such as Janusnet or Titus, to provide a combined information classification and data loss prevention solution that’s both easy to use and secure.
Guide

Email Encryption Best Practices

Email continues to be the lifeblood of organizations today. With changes to legislation and the increased attention on data breaches now is the time to revisit your email solution and policies to improve the security of the information that flows through it – both inbound and outbound.
Guide

The GDPR Divide: Board Views vs. Middle Management

Clearswift recently surveyed 600 business decision makers and 1,200 employees, across the UK, US, Germany and Australia, and found that board level respondents are more confident about having the necessary processes in place to be GDPR-compliant than senior management are.
Guide

Customer Support Handbook

Clearswift is dedicated to optimising the success of our customers and to attaining the highest levels of customer satisfaction through the delivery of professional, efficient and high quality support across the Clearswift product portfolio.
Guide

Preparing for a Cyber-Breach

This guide will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.
Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Datasheet

Critical Information Protection for Application Availability with F5 & Clearswift

What Is the Solution?Available with the integration of unique Adaptive Redaction technology via the Clearswift Secure ICAP Gateway (SIG) with F5® BIG-IP® Local Traffic Manager™ (LTM®).As a member of the F5 Technology Alliance Program (TAP), together Clearswift and F5 provide a highly scalable Secure application delivery platform that takes full advantage of Clearswift’s unique Adaptive Redaction...
Datasheet

Clearswift Support Services Health Check

We recognize that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of services we offer has been designed to ensure that you get the maximum value from your investment in Clearswift solutions,...
Datasheet

Clearswift Professional Services Upgrade

We recognize that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of services we offer has been designed to ensure that you get the maximum value from your investment in Clearswift solutions,...
Datasheet

Clearswift Professional Services Installation

We recognize that there will be times when you want expert knowledge to help with the deployment, upgrade, or migration of our products. We can also conduct periodic health checks, or provide consultation around business process change in existing solutions. The range of services we offer has been designed to ensure that you get the maximum value from your investment in Clearswift solutions,...
Datasheet

Secure File Sharing for Defense

With a priority to responding to tasks and building for the future, Defense organisations demand enhanced capabilities for secure information sharing as part of a drive for digital by default, to harness the transformative power of technology whilst avoiding the burdens of non-standard, bespoke, and ‘locked-in’ methods of exchanging data.Business ProblemThroughout the defense sector, there is a...
Datasheet

Clearswift Adaptive Data Loss Prevention

Clearswift Adaptive Data Loss Prevention (A-DLP) is the data and people-centric solution to critical information protection. Unlike others, A-DLP is a non-disruptive solution which supports continuous collaboration, avoids business interruption and mitigates the risk of financial or reputational damage caused by the unauthorized disclosure of sensitive data wherever it lives – at the endpoint, on...
Datasheet

Cross Domain Gateway Filters

Today there is a growing requirement for Cross Domain Solutions (CDS) across internal defense realms, between nations, and across the defense information supply chain. While custom hardware is frequently used in the form of a data diode to execute the actual transfer, there is a need to verify and validate the content prior to the transfer.Business ProblemThe need to share information is growing...