What are Clearswift Solutions and How Do They Work?
Sharing information comes with inherent risks, including exposing the wrong content – whether sent by mistake or hidden in metadata – and opening your system to malware or threats hidden within file transfers. Clearswift offers a suite of data security solutions with award-winning data loss prevention (DLP) and threat protection across email, web, and endpoints to strengthen your data security.
Content Inspection & Adaptive Data Loss Prevention
Through a seamless MFT integration, the Clearswift ICAP gateway inspects content inside file transfers to ensure that sensitive data is not transmitted OR received. It provides an added layer of protection to ensure that compliance with industry regulations can be maintained.
- Replace sensitive text – including PII, PCI, and HIPAA – with asterisks.
- Detect and redact text contained even in scanned images.
- Text redaction allows for file transfers to continue, minus any offending content.
Minimize False Positives
The Clearswift security suite analyzes the content, including documents in a zip of encryption files, and easily distinguishes between the things that may look like PII, but aren't. As a result, it offers both a high detection rate and a low instance of false positives.
Vital to ensuring your file transfers are virus- and malware-free, Clearswift products give you the ability to inspect content for viruses and malware and remove them to make sure you’re not transmitting them alongside your sensitive data.
Regulatory Compliance & Information Governance
Allow select individuals to transmit PII and ensure you can review transfers with a robust auditing system.
Adding this to GoAnywhere MFT prevents files, messages, images or videos from being concealed within another file. This module works for both inbound (hiding malicious code) and outbound (hiding data exfiltration) files.
Optical Character Recognition
When OCR capability is added to GoAnywhere MFT, any text residing inside of images is flagged before it is sent. In addition, pictures of sensitive information can also be identified and withheld before sending.
Review the Datasheet