Resource Center

Filter by

All Resources     |     Kojensi Resources     |     NC Protect Resources

eBook: Dynamic Data Defense Made Simple

eBook: Dynamic Data Defense Made Simple

Combat data loss, stop insider threats, and meet compliance requirements with archTIS and Microsoft. By combining Microsoft Purview Information Protection sensitivity labels with NC Protect’s dynamic attribute-based policies, gain expanded protection and control over information access, collaboration, and sharing.
Kojensi ITAR Datasheet

Kojensi ITAR Datasheet

Kojensi provides a cost-effective, ready to use solution using dynamic access and identity management to rapidly meet ITAR compliance requirements.
White Paper: SharePoint Governance Guide and Template

White Paper: SharePoint Governance Guide and Template

This whitepaper is designed to help organizations improve their governance and security management aspects in SharePoint.
Technology Brief: GDPR Compliance for Microsoft SharePoint Data

Technology Brief: GDPR Compliance for Microsoft SharePoint Data

Since the introduction of the general data protection regulation (GDPR) in May 2018, organisations have been frantically developing plans to manage copious amounts of structured and unstructured data. Read this Technology Brief to understand how NC Protect can protect your sensitive data in SharePoint and keep you in compliance with GDPR.
Case Study: Australian Dept of Defence – Securing mission critical collaboration in SharePoint  Dynamically with ABAC

Case Study: Australian Dept of Defence – Securing mission critical collaboration in SharePoint Dynamically with ABAC

Learn how the Australian Department of Defence secures the collaboration and sharing of files and prevents accidental data loss while maintaining need to know principles and controlling the releasability of files in SharePoint using NC Protect.
White Paper: Data Classification Guide

White Paper: Data Classification Guide

This template will help you define the core structure of your data classification policies. It offers a comprehensive overview of what is required from general information about the responsibilities and the terms used, to the detailed explanation of different impact levels and how each level is capable of affecting the organization in question.
KuppingerCole Market Compass Report: Secure Collaboration

KuppingerCole Market Compass Report: Secure Collaboration

Get a copy of the KuppingerCole Market Compass on Secure Collaboration review of NC Protect, which was awarded high marks across every category of the Report for its ability to enable data-centric security to facilitate virtual collaboration in Microsoft cloud, on-premises and hybrid collaboration applications and file shares. 
Video: NC Protect – Advanced Data Protection for Government, Defense and Supply Chain Across Microsoft Applications

Video: NC Protect – Advanced Data Protection for Government, Defense and Supply Chain Across Microsoft Applications

Empower your organization to take advantage of all the productivity and collaboration capabilities the Microsoft 365, Teams and SharePoint Server have to offer with zero trust ABAC powered information security from NC Protect.
White Paper: Solving Sensitive/Classified Information Sharing & Collaboration Challenges with Kojensi

White Paper: Solving Sensitive/Classified Information Sharing & Collaboration Challenges with Kojensi

The archTIS Kojensi platform addresses the long-standing challenge of how to securely collaborate on and share sensitive and classified information within and between organisations. This white paper describes the business problem and use case that Kojensi addresses, and provides an overview of the technology and the security model.
archTIS Defense & DIB Cybersecurity Summit

archTIS Defense & DIB Cybersecurity Summit

Access the recording of this live event featuring government and industry cybersecurity experts as they share insights and best practices for addressing evolving information security challenges and requirements in Defense and the Defense Industrial Base (DIB).
Zero Trust A Data-Centric Strategy for Success

Zero Trust A Data-Centric Strategy for Success

This white paper examines the new information security paradigm of zero trust and how to ensure it extends beyond the perimeter and applications to more effectively protect what is most at risk - data.
Presentation: Using Zero Trust to Protect Intellectual Property in Media and Entertainment

Presentation: Using Zero Trust to Protect Intellectual Property in Media and Entertainment

Intellectual property (IP) protection is vital to your bottom line. A leaked script, clip or game design can be disastrous to the success of any project. While today’s collaboration tools have made it easier than ever to exchange ideas and information. Learn how applying a Zero trust methodology to data access and sharing can help safeguard your most vital assets.
NC Protect FedRAMP Statement

NC Protect FedRAMP Statement

archTIS has confirmed with the FedRAMP Program Management Office (PMO) that our NC Protect product capabilities do not require FedRAMP certification as the product is not a cloud service. Learn more.
Webinar: CMMC 2.0 – Jumpstart FCI & CUI Protection in Microsoft 365 with Data-centric Zero Trust

Webinar: CMMC 2.0 – Jumpstart FCI & CUI Protection in Microsoft 365 with Data-centric Zero Trust

Watch this on demand webinar to discover the challenges of implementing mandated best practices for the handling of FCI and CUI to meet CMMC, NIST, and the Zero Trust mandate guidelines, and how to tackle them using data-centric security techniques.
Webinar: Myth Busting ABAC vs RBAC for Effective Data Security

Webinar: Myth Busting ABAC vs RBAC for Effective Data Security

Watch this webinar as we bust some of the common myths about ABAC and RBAC security methods to help you determine the right approach to your data security.
Guiding and Managing the Implementation of Attribute Based Access Control

Guiding and Managing the Implementation of Attribute Based Access Control

Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.
Industry Report eBook: Optimize M365 for Controlled Content Services

Industry Report eBook: Optimize M365 for Controlled Content Services

Microsoft 365 enterprise presence is becoming ubiquitous. According to AIIM research, 93% of organizations ...
Brochure: NC Protect for Government & Defense

Brochure: NC Protect for Government & Defense

Empower your agency or Defense Industry Base (DIB) organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC and ITAR for information security.