Clearswift - Product - Solution Guide
Clearswift - Product - Solution Guide
Clearswift - Product - Solution Guide
www.clearswift.com
Table of Contents
Introduction 3
Summary 18
About Clearswift 19
2 www.clearswift.com
Introduction
Clearswift is trusted by organizations globally
to protect their critical information, giving them
the freedom to securely collaborate and drive
business growth. Our unique technology supports a
straightforward and ‘adaptive’ data loss prevention
solution, avoiding the risk of business interruption
and enabling organizations to have 100% visibility
of their critical information 100% of the time.
Our track record in innovation includes developing many of the
features the security industry now considers standard, including:
• Deep Content Inspection (DCI)
• Policy-based encryption
• Inbound and outbound content scanning across multiple
communication channels
• Internal content scanning for collaboration software
Clearswift continues to lead the IT security industry with the
deployment of production-ready appliances, virtual gateways,
hosted and managed Cloud deployments. Using powerful,
effective and tested content-aware policies, these solutions
protect our clients, employees and trusted third-parties.
As business practices change to adapt to the continued growth of
Cloud, big data and BYOD (Bring Your Own Device) coupled with
the increasing amount of collaboration organizations now face,
Clearswift continues to innovate and adapt our solutions.
3
An adaptive approach to securing your critical information
Securing business critical information from Common functionality & consistent policies
internal and external threats The Clearswift SECURE Gateways rely on shared core technology
With Web and Email traffic still being the primary point of exit to make them easy to deploy and manage as well as ensuring
for every organization’s information, and the entry point consistency across the different communication protocols. Clearswift
for collaborative content from trusted 3rd parties, it makes made its name with its innovative, world class Deep Content, and
sense to protect them with consistent and complementary it is this engine which lies at the heart of all the Gateways.
technologies. Whether you have an on-premise or cloud
based security strategy, a Clearswift solution can be used Deep Content Inspection
in multiple deployment modes to replace or augment your Deep Content Inspection identifies sensitive data during
existing technology. filtering of information through the Gateways. The Deep
Web and Email Gateways can be joined together so that they Content Inspection engine is responsible for:
can share policy items such as dictionaries, templates and rules, • True file type detection
and have policy defined via a single console.
• Text extraction
While security solutions can be notoriously difficult to use and
• Text scanning
manage, the Clearswift solution has been designed with the
administrator and the user in mind; focused on masking the • Data Modification
sophistication of the solution, making them both easy to use Clearswift has developed its own innovative extraction and
and easy to manage. scanning engine, enabling it to determine additional important
information. The ability to detect whether text is in a document’s
Easy to use, efficient to manage header, footer or main body, for example, becomes important
With installations on preconfigured hardware, on a customer’s when designing detection policies. Without this additional
preferred hardware supplier or with vSphere, Hyper-V, or Cloud intelligence, false positives can become unmanageable and the
deployments such as AWS or Azure, clients can be up and ready to solution ineffective. Deep understanding of document types and
configure a Gateway with their policies in less than 30 minutes. the information they contain has also enabled the development
of a new technology, Adaptive Redaction, which allows documents
Preconfigured and sample rulesets, including dictionaries for
to be modified and critical information that could cause a data
PCI and PII, coupled with an intuitive user interface is provided
leak to be removed.
for each configuration of client-specific policies. With a consistent
policy management framework and user interface style across Once the inspection has been carried out, policies can
products, system administrators can be easily cross-trained be applied. The most common policies are those around
between products, reducing training overhead. Data Loss Prevention.
4 www.clearswift.com
Data Loss Prevention
Data Loss Prevention (DLP) is built in as standard for the The key to an effective DLP solution is ease of policy definition
SECURE Gateways and relies upon the information being and flexibility in its use. A simple approach enables even the
passed from the Deep Content Inspection engine in order to smallest IT department to put effective policies together quickly
make decisions. DLP is direction agnostic, which is to say and efficiently.
that it can be used to prevent information from entering While traditional DLP solutions operate with a ‘stop and block’
an organization as well as leaking out. With the increase action on information which violates policy, the new Adaptive
in legislative requirements, DLP is becoming essential for Redaction technology offers further flexibility, leading to an
organizations of all sizes. Once thought to be only the preserve Adaptive Data Loss Prevention (A-DLP) approach; one that is
of global organizations, it can now be easily deployed by even better suited for today’s digital landscape and collaborative
the smallest. organization.
Scanning for textual items within messages and attachments
allows for the detection and redaction of sensitive information
before it leaves your Gateway, including:
5
Adaptive Redaction Threat protection
The Clearswift SECURE Gateways and ARgon for Email have While much is made in the press as to the effectiveness of threat
options for Adaptive Redaction to be included as part of the protection measures such as anti-virus (AV) solutions in today’s
A-DLP actions. Standard DLP relies on detecting business critical age of Advanced Persistent Threats (APTs) and other advanced
information and blocking it at the Gateway. However, Adaptive threats, AV is still an efficient method of dealing with the millions
Redaction provides the option to automatically remove the data of viruses and other malware which are present in email and
that violates policy and allow the remaining information to on the Internet. Clearswift offers different Cloud-assisted AV
continue to its destination. There are three common Adaptive solutions from Sophos or Kaspersky that offer heuristics and
Redaction options: behavioral scanning. AV definitions are updated automatically
by the Gateways to ensure that the infrastructure is always
1. Data redaction protected. Many organizations prefer the additional layer of
protection that running products from different AV vendors at the
This is the policy-based removal of words, phrases and tokens. In
Gateway and endpoint offers.
order to maintain document integrity, these are replaced with an
alternative character, for example ‘X’. For credit card tokens, there
is an option to replace everything but the last four digits. The importance of people
2. Document sanitization Understanding the information that is being sent is only part of the
story. Clearswift Gateways integrate with directory systems such as
Today’s electronic documents contain information other than that
Active Directory to provide additional context, enabling policies which
which can be seen - there is hidden meta-data, such as document
take both people and role based groups into account. This means
properties, ie name, subject, keywords, printers, windows version
that the CEO can have a different policy from an individual based in
etc. as well as revision history. This can all be automatically
finance, for example, or a group of engineers. This added dimension
removed to prevent accidental data leaks.
of policy definition ensures that the system remains flexible, easy
to deploy and simple to manage.
3. Structural sanitization
With the ever increasing risk of malware in the common file
formats (e.g. Microsoft Office documents, Adobe pdf, etc.), the
Gateways can detect and remove Active Content from files. The
sanitized document is delivered to the intended destination
without the associated security risks present.
Adaptive Redaction, like DLP, is direction agnostic, so it works in
both directions. As well as being used to prevent social security
from leaving the organization, for example, it can also prevent
them from being received. Web pages which contain javascript
can now be disabled from executing, ensuring a safe viewing
experience. Organizations who use social media sites can often
find employees unable to view a page due to offensive comments,
Adaptive Redaction ensures that this problem does not occur.
In the case of business proposals, it is not uncommon to base
them on an existing business proposal for a different client. This
has caused embarrassment in the past with the client able to look
at revision history or meta-data and see the original information.
Document sanitization ensures that this won’t happen.
6 www.clearswift.com
Reporting
Any security solution today needs to be intrinsic to an Information
Governance or compliance programme. The SECURE Gateways
offer extensive reporting facilities in support of these requirements,
enabling system administrators to rapidly create both management
and realtime reports. As reports are often required to be shared,
these can be created in different formats, whether that be HTML
or PDF as a textual representation, or whether the data be exported
to CSV for import into a spreadsheet.
For organizations with a Security Information and Event
Management (SIEM) solution, the Gateways are compatible
with various platforms, including:
• RSA Envision
• HP ArcSight
Easy to use policy definition:
• Splunk where policies are being applied and what they are looking for
Gateways can be monitored using SNMP/SCOM management
stations and they can also create SMTP and SNMP alarms to
alert administrators to issues more quickly. When an issue is
discovered, easy access to granular log files minimizes the
time to resolution.
All changes to system configurations are audited, and with role
based access control it is simple to delegate responsibilities and
detect whether personnel are attempting to circumvent policy.
7
Clearswift SECURE Email Gateway
Validate Sender
Bulk Detection
Spam Content
Anti-Spoof
Phishing
LDAP
BATV
DKIM
RBL
8 www.clearswift.com
Clearswift SECURE Exchange Gateway
Outlook or
OWA Client
9
ARgon for Email
ARgon uses unique Adaptive Redaction technology ARgon can be used in environments with no DLP solution or to
from Clearswift and tackles the problems caused augment an existing one. In both cases, ARgon removes next
by traditional Data Loss Prevention (DLP) solutions generation information threats from both inbound and outbound
email. For those with an existing DLP solution, ARgon reduces
by automatically removing only the content which
the false positives by automatically removing the content
breaks policy and then sending the rest of the
which would cause the DLP solution to ‘stop & block’ the
email and attachments onwards. This enables
communication, whilst still delivering the legitimate content.
continuous collaboration, safe in the knowledge
that critical information is protected. There are three key features within Adaptive Redaction
that ARgon for Email utilises are:
• Data Redaction
DLP effectiveness is determined by the accuracy and the
Removes visible content that breaks policy from
workflow of the product. Many DLP solutions are purchased
email and attachments.
and never deployed because they are too hard to configure or
they generate too many false positives, resulting in increased • Document Sanitization
operational overheads and decreased productivity through Removes document meta-data, revision history, etc.
disrupted communications. • Structural Sanitization
Removes active content embedded in inbound emails
and documents.
Deployment
ARgon is deployed between the email hygiene (and/or DLP)
service and the internal email server.
Internet Clearswift
Email Gateway/ ARgon for Email Email
Managed Service Server
10 www.clearswift.com
SECURE Web Gateway
11
Clearswift SECURE ICAP Gateway
12 www.clearswift.com
Clearswift Critical Information Protection
Management Server & Agent
By controlling where sensitive data resides and Context-aware Data in Use (DIU) policies
how it is used on endpoint devices, organizations Flexible policies and context-aware content inspection mean
can manage information security, governance and that you no longer have to choose between the productive use
compliance risks and identify control priorities. of removable media and unacceptable risk. A policy which is too
restrictive means that people either cannot work effectively, or they
The Clearswift Critical Information Protection will find ways to bypass their security policy. Rules can be created
(CIP) Management Server and Agent supports a that block all spreadsheets containing particular keyword terms
combination of security features – including device from being copied to external devices. Alternatively, these files can
control, deep content inspection, remediation be encrypted when transferred – which ensures that the contents of
actions, encryption and comprehensive auditing. a USB cannot be read if it was to be left behind in a taxi or in another
public place.
Deep content inspection
Clearswift CIP is a fully content-aware endpoint data loss prevention Discovering Data at Rest (DAR)
solution that provides complete visibility and control of data By using the Clearswift Deep Content Inspection Engine, critical data
transferred from the endpoint and stored on it. The transfer of can be discovered wherever it is stored on desktops, notebooks,
critical information can be logged, blocked or encrypted and the servers, shared networks or cloud collaboration apps e.g. Dropbox.
solution provides automated policy-based remediation. The Critical This enables organizations to audit and manage critical information
Information Protection Agent scans files for sensitive content and cleanup within data at rest. As with ‘data in use’ policies, built-in
based on a granular organizational policy it provides the necessary and customizable lexical expressions are included, which enables
flexibility to permit multiple behaviors, depending on the user and discovery of required critical information as detailed in the likes of
destination of file operations. Data Protection Acts of the Länder, Privacy Act, PCI, HIPAA and GLBA.
Running in the background, utilizing advanced throttling techniques,
Device control the agent silently discovers critical information without interrupting
The ability to control users connecting personal USBs or smart end user activity. This provides unprecedented insight into potential
devices to the corporate network has become a critical security data protection vulnerabilities that exist on your networks and systems.
requirement. Sensitive data can be lost and malicious applications
can be introduced to networks due to the uncontrolled use of Educate users
removable media. The CIP integrated device control provides
The key to an effective information security management policy is
granular management of removable media, permitting the
educated end users. The CIP can notify users of the risks involved
legitimate productivity-enhancing use of these devices whilst
when transferring critical information to unprotected devices,
reducing network risks and support costs – resulting in increased
allowing them to specify a reason for the activity before the file is
data security.
allowed to be transferred.
13
Protect critical information to comply with regulations with regulation, while facilitating the legitimate and productive
Staying within the bounds of a regulatory framework is paramount. use of removable media. Flexible policies can be built to enable
By encrypting files, organizations can ensure that they comply the transfer of non-sensitive data such as sales brochures, whilst
encrypting and protecting files that do contain critical information.
Integrated policy management The results are provided by Clearswift’s reporting function, which
The interface of the Critical Information Protection Management shows where critical information resides, who is using endpoint
Server is powerful, yet simple to use. With pre-defined lexical devices and what information is being transferred to unsecured
expressions, file name lists and media types, it’s easy to build devices. Reports will generate a detailed audit of discovered date,
policies, manage violations and report on trends and behavior. In devices connecting, and the information transferred to and from
this way, valuable insight is provided without consuming valuable the device by each user. The audit is unnoticeable to the end user,
admin resource. so that data and device details can be collected without the user
changing their behavior. This helps organizations to understand the
Integration with the award-winning Clearswift SECURE Email and usage patterns and business requirements for removable media.
Web gateways enables teams to share policy elements, which
ensure the consistent application of content rules and compliance
Flexible deployment options
with regulations.
You decide how you want to buy and deploy the Critical Information
Protection Management Server. It’s supplied either as a
The Critical Information Protection Agent enforces
pre-installed hardware appliance, as a software image that
flexible, content-aware policies and can carry out
can be loaded on a choice of hardware platforms – or virtualized
different actions depending on the content policy. in a VMware environment.
Encrypt
Notify
Audit Move
Notify
14 www.clearswift.com
Clearswift Information
Governance Server
SECURE ICAP
Gateway
IG SERVER
SECURE Exchange
Gateway
FILE SERVER
15
Gateway deployment options Hosting & Cloud options
Clearswift offers a straightforward, secure and cost-effective
The Clearswift security solutions are available with hosted solution to protect your organization; allowing
a range of deployment options to fit your existing organizations to have complete control over a dedicated system
IT infrastructure and reduce the time and costs whilst reducing their on-site footprint; including hardware, power,
associated with deployment. rack space and maintenance costs.
Our hosted solution supports today’s collaboration model, whilst
For the quickest return on investment, and to reap efficiency
bringing award winning security to critical information allowing
savings, simple deployment is essential. Clearswift’s options
organizations to achieve their desired operational efficiencies
give you total web and email security that works how you do.
safe in the knowledge that communications remain safe and
compliant in the Cloud.
Hardware deployment options
Customers who embrace public cloud deployments such as AWS
The Clearswift SECURE Web and Email Gateways are available
will be pleased to know that the Clearswift Gateways are also
as pre-configured appliances ready for immediate hardware
deployment at your network perimeter. A range of hardware supported within this environment.
performance profiles allow you to select the correct unit for your
filtering needs and provide scope for future growth. Hardware Virtualization deployment options
deployment options from Clearswift are also backed by ‘Next The Clearswift SECURE solutions also support virtualization using
Business Day’ or ‘Four-hour’ onsite service options. VMware and Hyper-V for email filtering, allowing the creation of
private cloud security systems for greater network management
Software deployment options flexibility. Your deployments can then be assembled from a
combination of physical and virtualization servers according to
The Clearswift SECURE solutions are also available for
your specific business needs and environment.
deployment on your own server hardware, allowing you to
maintain consistency in your environment using systems from
your preferred vendor. The SECURE Gateways operate on a
Peered Gateways
hardened Linux distribution, offering ultimate flexibility for your If more than one Clearswift Gateway is deployed, or more than
own hardware deployment choices. one type of Gateway (e.g. Web and Email) is deployed, then
integration occurs at all points. Peered Gateways share common
policy and system settings, ensuring that, should one Gateway
fail, the remaining Gateway will be able to pick up the load. With
more than one Gateway deployed, administrators can use a
single interface to enforce a consistent policy across multiple
communication protocols.
16 www.clearswift.com
”
World class products,
24/7 support and
professional services
Support and
organization
”
Professional Services
The development of world class products
is complemented with a 24/7 support and
professional services organization.
17
Summary
Clearswift offers a straightforward, manageable Offering protection from both inbound and outbound threats,
approach to adaptive data loss prevention, suitable Clearswift takes a proactive approach to data loss negating
for organizations of all sizes, bringing award today’s threats such as the insider threat, and malicious cyber
winning technology to secure and support your attacker activity. With a Clearswift solution in place, you can be
rest assured that your organization remains secure at the same
organization today. And tomorrow.
time as business activity and collaboration remains consistent
and agile.
Anti-virus * *
Encryption*
Text Redaction*
Document Sanitization*
Structural Sanitization*
Standard / Advanced* /
Premium* Support
Message Sanitization
Professional Services*
18 www.clearswift.com
Notes
19
Clearswift is trusted by organizations globally to protect their critical
information, giving them the freedom to securely collaborate and drive
business growth. Our unique technology supports a straightforward and
‘adaptive’ data loss prevention solution, avoiding the risk of business
interruption and enabling organizations to have 100% visibility of their
critical information 100% of the time.