SlideShare a Scribd company logo
1 of 29
Presentation Title
          Subtitle


             Name
           Job Title
              Date
•   HQ in the United Kingdom
•   Offices in Australia, Germany, Japan, Spain
    and USA
•   200 Employees
•   4 Patents (3 more pending)
•   17000 customers
•   Network of distributors and channel
    partners
A history of award winning innovation




• 1982 - MS-DOS Email Client
• 1995 – Protected UK PM office
• 1997 – Image Scanning
• 2000 – Policy based Encryption
• 2002 – SOA based Enterprise products
• 2004 – Ajax based Enterprise products
• 2007 – User level message tracking
• 2007 – Production Ready Virtual Appliances
Technology Partners




Furthering Clearswift's mission to allow
people to be as productive as possible,
reduce cost and complexity we have key
partnerships and alliances with a select
group of complimentary IT technology
companies
Clearswift Customers




Our customers share a common
understanding of the value of their data
and the importance of being enabled to
get on with their business
Digital Evolution
The Clearswift Advantage



Inbound Threat Protection                Data Loss Prevention




                             Content
                            Inspection

                                             Compliance
   Bi-directional Email
Unifying Information Security




Clearswift is a security software company
that aims to simplify companies’ IT security to
better protect businesses’ intellectual
property and data. This in turn gives
businesses the confidence to adopt web,
email and collaboration technologies to
ultimately allow the business to innovate
and grow.
Any questions?
Clearswift Customers




Our customers share a common
understanding of the value of their data
and the importance of being enabled to
get on with their business
A New Approach to IT Security




                           54% of companies say that social media and Internet usage
                             are issues of concern identified at management level




  64% of companies think that a new approach to
 security is needed in this era of web collaboration

                                                            Research conducted or Clearswift by Loudhouse – February 2010
A New Approach to IT Security




 52% of companies think web collaboration is
 critical for the future success of the company




                                      68% of companies think it is important to maintain a
                                      balance between policing and empowering Internet
                                           usage in order to benefit the organisation


                                                             Research conducted or Clearswift by Loudhouse – February 2010
• Our content-aware solutions work in the background to scan
  all your digital information flows
• Not just a Firewall – an intrinsic part of your infrastructure
  and all browser based applications
• Monitoring for illegal use of data or non-compliant data
• Fully audited with a single point of control, reporting and
  management
Identifying the threats                                       Positive match




                          • Our CONTENTsafe works in the background to scan all your
                            digital information flows
                          • Not just a Firewall – CONTENTsafe is an intrinsic part of
                            your infrastructure and all browser based applications
                          • CONTENTsafe listens and looks for illegal use of even
                            fragments of the content from your information
                          • Fully audited with a single point of control, reporting and
                            management
[simplify]
[Protect]
[Innovate]
Customer Support




                   New Jersey   Theale   Sydney



                                                  22
Clearswift enables content to flow
through user managed channels
Customer Slides
In their own words
Industry Analysts




A private and independent bank, Banca del Sempione SA (BDS) was founded in 1960 in Switzerland where it has its head office. It
operates in all the world's major financial markets in the tradition of the Swiss banking industry and is synonymous with high quality
service and customer focus.


                           “Clearswift enhanced product feature set enable our employees to be more productive. The
                           polices we have defined mean employees can collaborate with colleagues inside and also outside
                           of the organisation, such as partners, in a safe and secure way with no risk of our information or
                           intellectual property getting into the wrong hands.”
                           Marco Fini, Security and Network Administrator, Banca del Sempione SA
Prospect Homes Group has been using Clearswift since 2003 and continue to use Clearswift as the
product is so effective and delivered flexibly. The easy to use flexible configuration and policy rules
mean that the team can adapt protocols on a very regular basis in order to protect users from the
high volumes of spam received by the organisation.



“Email is a key communication tool for us however around 96% of the mail traffic attempting to get to
our users is spam. For us that is around 30,000 messages a day. If we switched Clearswift off we just
wouldn’t be able to use email. That just isn’t an option.”
                                                                Lee Richardson, Systems Administrator, Prospect Homes
Existing customer City of Lincoln approached Clearswift in the hope they could help solve the challenge posed
by recent Government Connect* (GC) standards that require GC Mail to replace less efficient and less secure
methods of exchanging data between local authorities and government departments and yet still
communicate with thousands of constituents, partners etc that fall out side of the GC network.



"It is great that we have found such an easy and painless solution to the challenge Government
Connect presents all local authorities, I know some are still struggling. Clearswift have made it,
easy and cost effective for us to implement a workable service for City of Lincoln employees to
email within the GCSX network."
                                                             Dave Wormall, Principal IT Officer, City of Lincoln Council
The Deposit Insurance Agency was established in January 2004 and is governed by Federal Law. It was
set up to insure individual deposits in Russian banks; to ensure that compensation will be paid to
depositors. The Deposit Insurance Agency use a mail system based on open source software so they
found that the Clearswift solution easily integrated into their corporate environment.



"Email security at the Deposit Insurance Agency is now much stronger because of the antiviral tools in
Clearswift’s solution. The flexible policies and good quality of the mail filtration in a non-english
language environment allow us to achieve high levels of reliability and increase the efficiency of our
mail service."
                                      Igor Tolkunov, IT Department, State Corporation - Deposit Insurance Agency
Presentation Title
          Subtitle


             Name
           Job Title
              Date
Presentation Title
          Subtitle


             Name
           Job Title
              Date

More Related Content

What's hot

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Ulf Mattsson
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Microsoft
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 

What's hot (20)

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Case study
Case studyCase study
Case study
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 

Similar to Fy11 Clearswift Corporate Presentation

Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authenticationMint Group
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityVertex Holdings
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionCIO Look Magazine
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityPeopleWorks IN
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochureDan Smith
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxkoushikichakraborty3
 
Tech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber ThreatsTech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber Threatsyashakhandelwal2
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Ioannis Aligizakis, M.Sc.
 
Overview of opensky's IT services and solutions
 Overview of opensky's IT services and solutions Overview of opensky's IT services and solutions
Overview of opensky's IT services and solutionsopensky Data Systems
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room BrochureEthosData
 

Similar to Fy11 Clearswift Corporate Presentation (20)

Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Decode_Portfolio2016
Decode_Portfolio2016Decode_Portfolio2016
Decode_Portfolio2016
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data Security
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLPSecure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
 
Tech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber ThreatsTech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber Threats
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Overview of opensky's IT services and solutions
 Overview of opensky's IT services and solutions Overview of opensky's IT services and solutions
Overview of opensky's IT services and solutions
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 

Fy11 Clearswift Corporate Presentation

  • 1. Presentation Title Subtitle Name Job Title Date
  • 2. HQ in the United Kingdom • Offices in Australia, Germany, Japan, Spain and USA • 200 Employees • 4 Patents (3 more pending) • 17000 customers • Network of distributors and channel partners
  • 3. A history of award winning innovation • 1982 - MS-DOS Email Client • 1995 – Protected UK PM office • 1997 – Image Scanning • 2000 – Policy based Encryption • 2002 – SOA based Enterprise products • 2004 – Ajax based Enterprise products • 2007 – User level message tracking • 2007 – Production Ready Virtual Appliances
  • 4. Technology Partners Furthering Clearswift's mission to allow people to be as productive as possible, reduce cost and complexity we have key partnerships and alliances with a select group of complimentary IT technology companies
  • 5. Clearswift Customers Our customers share a common understanding of the value of their data and the importance of being enabled to get on with their business
  • 7.
  • 8. The Clearswift Advantage Inbound Threat Protection Data Loss Prevention Content Inspection Compliance Bi-directional Email
  • 9. Unifying Information Security Clearswift is a security software company that aims to simplify companies’ IT security to better protect businesses’ intellectual property and data. This in turn gives businesses the confidence to adopt web, email and collaboration technologies to ultimately allow the business to innovate and grow.
  • 11.
  • 12. Clearswift Customers Our customers share a common understanding of the value of their data and the importance of being enabled to get on with their business
  • 13. A New Approach to IT Security 54% of companies say that social media and Internet usage are issues of concern identified at management level 64% of companies think that a new approach to security is needed in this era of web collaboration Research conducted or Clearswift by Loudhouse – February 2010
  • 14. A New Approach to IT Security 52% of companies think web collaboration is critical for the future success of the company 68% of companies think it is important to maintain a balance between policing and empowering Internet usage in order to benefit the organisation Research conducted or Clearswift by Loudhouse – February 2010
  • 15. • Our content-aware solutions work in the background to scan all your digital information flows • Not just a Firewall – an intrinsic part of your infrastructure and all browser based applications • Monitoring for illegal use of data or non-compliant data • Fully audited with a single point of control, reporting and management
  • 16. Identifying the threats Positive match • Our CONTENTsafe works in the background to scan all your digital information flows • Not just a Firewall – CONTENTsafe is an intrinsic part of your infrastructure and all browser based applications • CONTENTsafe listens and looks for illegal use of even fragments of the content from your information • Fully audited with a single point of control, reporting and management
  • 20.
  • 21. Customer Support New Jersey Theale Sydney 22
  • 22. Clearswift enables content to flow through user managed channels
  • 24. Industry Analysts A private and independent bank, Banca del Sempione SA (BDS) was founded in 1960 in Switzerland where it has its head office. It operates in all the world's major financial markets in the tradition of the Swiss banking industry and is synonymous with high quality service and customer focus. “Clearswift enhanced product feature set enable our employees to be more productive. The polices we have defined mean employees can collaborate with colleagues inside and also outside of the organisation, such as partners, in a safe and secure way with no risk of our information or intellectual property getting into the wrong hands.” Marco Fini, Security and Network Administrator, Banca del Sempione SA
  • 25. Prospect Homes Group has been using Clearswift since 2003 and continue to use Clearswift as the product is so effective and delivered flexibly. The easy to use flexible configuration and policy rules mean that the team can adapt protocols on a very regular basis in order to protect users from the high volumes of spam received by the organisation. “Email is a key communication tool for us however around 96% of the mail traffic attempting to get to our users is spam. For us that is around 30,000 messages a day. If we switched Clearswift off we just wouldn’t be able to use email. That just isn’t an option.” Lee Richardson, Systems Administrator, Prospect Homes
  • 26. Existing customer City of Lincoln approached Clearswift in the hope they could help solve the challenge posed by recent Government Connect* (GC) standards that require GC Mail to replace less efficient and less secure methods of exchanging data between local authorities and government departments and yet still communicate with thousands of constituents, partners etc that fall out side of the GC network. "It is great that we have found such an easy and painless solution to the challenge Government Connect presents all local authorities, I know some are still struggling. Clearswift have made it, easy and cost effective for us to implement a workable service for City of Lincoln employees to email within the GCSX network." Dave Wormall, Principal IT Officer, City of Lincoln Council
  • 27. The Deposit Insurance Agency was established in January 2004 and is governed by Federal Law. It was set up to insure individual deposits in Russian banks; to ensure that compensation will be paid to depositors. The Deposit Insurance Agency use a mail system based on open source software so they found that the Clearswift solution easily integrated into their corporate environment. "Email security at the Deposit Insurance Agency is now much stronger because of the antiviral tools in Clearswift’s solution. The flexible policies and good quality of the mail filtration in a non-english language environment allow us to achieve high levels of reliability and increase the efficiency of our mail service." Igor Tolkunov, IT Department, State Corporation - Deposit Insurance Agency
  • 28. Presentation Title Subtitle Name Job Title Date
  • 29. Presentation Title Subtitle Name Job Title Date

Editor's Notes

  1. Market Development slide (will feature new icons)Network centric- User Centric and nowData centricWill show email, access to internet and web 2.0Will add in a lot of info from the IDC meetings today
  2. At the heart of Clearswift’s solutions is a deep understanding of the way people work, organise and communicate. The sharing of data or information is becoming more and more diverse.Clearswift assists customers in identifying risks in the flow of this information. Risks that could damage reputations.Often these risks are accidental rather than malicious, but Clearswift caters for every type and cause.The Clearswift solutions include detailed analysis, interrogation, actions nad reporting modules that allow customers to define their business communications through the creation of policies.These policies are completely customisable to suit every type of file, channel of information flow, gateway, group and user.
  3. At the heart of Clearswift’s solutions is a deep understanding of the way people work, organise and communicate. The sharing of data or information is becoming more and more diverse.Clearswift assists customers in identifying risks in the flow of this information. Risks that could damage reputations.Often these risks are accidental rather than malicious, but Clearswift caters for every type and cause.The Clearswift solutions include detailed analysis, interrogation, actions nad reporting modules that allow customers to define their business communications through the creation of policies.These policies are completely customisable to suit every type of file, channel of information flow, gateway, group and user.
  4. At the heart of Clearswift’s solutions is a deep understanding of the way people work, organise and communicate. The sharing of data or information is becoming more and more diverse.Clearswift assists customers in identifying risks in the flow of this information. Risks that could damage reputations.Often these risks are accidental rather than malicious, but Clearswift caters for every type and cause.The Clearswift solutions include detailed analysis, interrogation, actions nad reporting modules that allow customers to define their business communications through the creation of policies.These policies are completely customisable to suit every type of file, channel of information flow, gateway, group and user.
  5. So - How do Clearswift approach the issues faced by our customers?Our deep knowledge of content goes beyond the ability to look for key words and phrases.
  6. Our CONTENTsafe technology can take a ‘digital fingerprint’ of the important information and use this to watch for illegal use. You are I am sure familiar with programmes like CSI – much in the same way that CSI can recover a full identity from just a fragment, Clearswift can look for fragments of data ‘cut and pasted’ or saved into other documents. This ability to look for the content even through it may be hidden or broken up allows us to really keep a track on your sensitive information. Like in our other Appliances time can be used to address policies eg all information regarding a companies M&A activity could be protected and embargoes until a the market announcement has gone out. Once the urgent time restriction has been removed then all data can move freely that was previous monitored.
  7. Simplify Message
  8. Simplify Message
  9. At the heart of Clearswift’s solutions is a deep understanding of the way people work, organise and communicate. The sharing of data or information is becoming more and more diverse.Clearswift assists customers in identifying risks in the flow of this information. Risks that could damage reputations.Often these risks are accidental rather than malicious, but Clearswift caters for every type and cause.The Clearswift solutions include detailed analysis, interrogation, actions nad reporting modules that allow customers to define their business communications through the creation of policies.These policies are completely customisable to suit every type of file, channel of information flow, gateway, group and user.
  10. Structure3 strategically located support centres (Sydney / Reading / New Jersey) 24 * 5 Direct support as standard support offeringLanguage support provided in Japanese, German, Dutch, French and Spanish. ~5% of work is now handled outside of the traditional region – allow great internal resource efficiencies, as well as out of hours coverage for customers.
  11. But, what do we really do?We enable the flow of content through user managed channelsThis means that the flow of communication, through the physical copying of data, web and email channels as well as Web2.0 technologies such as social networking and instant messaging - are all controlled and managed by our customers own criteria - supported by Clearswift technologies, guidance and experience.
  12. Sample Slide Only
  13. Sample Slide Only
  14. Sample Slide Only
  15. Sample Slide Only