Cloud-based business

A business world in the Clouds

|
Language EnglishTags: <a href='/blog?tag='></a> <a href='/blog?tag='></a> <a href='/blog?tag='></a> <a href='/blog?tag='></a> Safeguarding against the security pitfalls of Cloud-Based Platforms Majority of us are intimately familiar with the concept of ‘the Cloud’, the seemingly omnipresent information sharing and storage solution. But how much do you know about the security systems that defend ... Read More
Multi-factor Identification

Authenticating with Authority: Can Multi-Factor Authentication Provide Total Protection?

|
Language EnglishTags: <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Cyber Security'>Cyber Security</a> <a href='/blog?tag=Advanced Threat Protection'>Advanced Threat Protection</a> The need for a stronger defense against security threats is greater than ever, as the threat of data-driven crimes such as identity theft and corporate espionage grow each year. The recent data breaches against ... Read More
RSA Conference Clearswift

See the latest Clearswift technology in action at RSA 2019

|
Language EnglishTags: <a href='/blog?tag=Events'>Events</a> It’s that time of year when information security professionals from organizations around the globe fly into San Francisco for one of the largest annual Security events – RSA. The agenda includes keynote presentations from today’s leading security experts, topical workshops, networking events and two Exhibition Halls ... Read More
Enhancing cyber threat protection in Microsoft Office 365

Enhancing cyber threat protection in Microsoft Office 365

|
Language EnglishTags: <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=Advanced Threat Protection'>Advanced Threat Protection</a> <a href='/blog?tag=Cloud'>Cloud</a> <a href='/blog?tag=Email Security'>Email Security</a> In our last blog, we explored the risk of receiving sensitive data unauthorized via email, the sharing sensitive information internally across departments, and the need for ... Read More
Enhancing Information Security in Microsoft Office 365

Advanced Information Security Features for Microsoft Office 365

|
Language EnglishTags: <a href='/blog?tag=Email Security'>Email Security</a> <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> In the last few years, Microsoft Office 365 (MO365) has eclipsed all other cloud providers to emerge as the most widely used enterprise cloud service and the latest survey data shows that adoption of ... Read More
Computing Security Excellence Awards 2018

Clearswift Wins DLP Award at Computer Security Excellence Awards!

|
Language EnglishTags: <a href='/blog?tag=Awards'>Awards</a> <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> The Clearswift team is delighted to announce our 2018 Computer Security Excellence Award Win for Data Loss Prevention (email and web). The awards dinner was held on November 22nd at the London Marriott Hotel in London ... Read More
Social Media

Like, share and destroy: How to protect your business from the social media threat

|
Language EnglishTags: <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Social Collaboration'>Social Collaboration</a> <a href='/blog?tag=Web Security'>Web Security</a> Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any website and ... Read More
Managed File Transfers

Managing critical file transfers across email

|
Language EnglishTags: <a href='/blog?tag=Cloud'>Cloud</a> <a href='/blog?tag=Email Security'>Email Security</a> <a href='/blog?tag=Advanced Threat Protection'>Advanced Threat Protection</a> <a href='/blog?tag=Malware'>Malware</a> While methods for digital collaboration are increasing, such as Instant Messaging, Social Media and a multitude of cloud applications, email remains a universal business communication tool for businesses. For those wanting to collaborate on ... Read More
‘Discovering’ Critical Data Stored On The Endpoint

‘Discovering’ Critical Data Stored On The Endpoint

|
Language EnglishTags: <a href='/blog?tag=Compliance'>Compliance</a> <a href='/blog?tag=Internal Threats'>Internal Threats</a> <a href='/blog?tag=Information Governance'>Information Governance</a> Ever wondered exactly how much data you have stored on your laptop? It doesn’t take long to amass a gazillion files, some are ones you have authored, some have been sent by email, some are from the Intranet, ... Read More
Clearswift Endpoint Data Loss Prevention

Clearswift Endpoint Data Loss Prevention

|
Language EnglishTags: <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=Information Governance'>Information Governance</a> <a href='/blog?tag=Internal Threats'>Internal Threats</a> <a href='/blog?tag=Technology'>Technology</a> There are multiple places within your IT infrastructure where critical information is stored. These include email Inboxes, file servers, collaboration servers (some of which might be ‘in the cloud’) and endpoint devices ... Read More

Secure Guardrails