archTIS
  • Products
    • Kojensi
    • NC Protect
      • NC Protect Overview
      • NC Protect for Microsoft 365
      • NC Protect for SharePoint On-premises
      • NC Protect for File Shares
      • NC Protect for Nutanix Files
      • NC Protect for NetApp ONTAP
      • Data Connector for Microsoft Sentinel
      • NC Protect for Government & Defense
      • NC Protect Integrations
    • NC Encrypt
    • Trusted Data Integration
  • Solutions
    • Kojensi Use Cases
      • Government
      • Australian Defence DISP/PSPF/ISM
      • US Defense ITAR/Export Controls
      • Intelligence
      • Multinational Coalition
      • Critical Infrastructure (SLACIP)
      • Universities
    • NC Protect Use Cases
      • Audit and Track Sensitive Data Access
      • CMMC & NIST Compliance
      • Data Encryption
      • Document Redaction
      • Email Encryption
      • File Integrity
      • Guest Access
      • Information Barriers
      • ITAR & EAR Compliance
      • Multi-label Classification for M365
      • Privacy Compliance
      • Restrict File Access
      • Secure Watermarks
  • Resources
    • Blog
    • Events
    • Resource Center
    • What is ABAC?
  • Support & Services
    • Support
    • Services
  • Company
    • About archTIS
    • Board of Directors
    • Executive Team
    • Careers
    • Newsroom
      • Press Releases
      • Media Coverage
    • Partners
  • Investors
  • Contact
Select Page
Brochure: NC Protect for Government & Defense

Brochure: NC Protect for Government & Defense

by Irena Mroz | Mar 9, 2022 | Datasheets

Empower your agency or Defense Industry Base (DIB) organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC and ITAR for information security.
The women of archTIS share their experience and wisdom as Women in Tech

The women of archTIS share their experience and wisdom as Women in Tech

by Irena Mroz | Mar 7, 2022 | Blog

In honor of International Women’s Day we once again asked the amazingly talented women of archTIS to share their insights as women in tech. This year our Finance and HR leads share their important roles in the company, experiences, and offer advice to young women...
Role Based Access Control vs Attribute Based Access Control: Addressing Common Misconceptions

Role Based Access Control vs Attribute Based Access Control: Addressing Common Misconceptions

by Rod Bernabe | Mar 7, 2022 | Blog

A dynamic, data-centric approach is key to securing sensitive information and achieving compliance in our modern world of hybrid IT solutions, but what are the differences between RBAC and ABAC, the two common access control approaches? Over the last two years,...
Next Entries »

Subscribe Now

Latest Blogs

  • Safeguarding Classified Information: How to Prevent Insider Data Breaches
  • How to Identify and Protect Personal Information
  • What is Sensitive Data? Sensitive Data Definitions, Types & Examples
  • Understanding the Proposed FAR CUI Rule

Latest Press Releases

  • archTIS Completes Asset Acquisition of Direktiv to Expand Market Innovation Across Data-centric Zero Trust Product Lines
  • archTIS Achieves JOSCAR-AU Registration to Streamline Defence and Aerospace Procurement Processes
  • Introducing the archTIS Trusted Data Integration Solution for Sensitive and Classified Structured Data
  • archTIS has been shortlisted for the 2024 Australian Cyber Security Awards and the Australian Defence Industry Awards
  • Follow
  • Follow
  • Follow
  • Follow

© 2025 archTIS Limited

Products & Services

  • Kojensi
  • NC Protect
  • NC Encrypt
  • Services
  • Support

Resources

  • Attribute Based Access Control
  • Blog
  • Events
  • Media Coverage
  • Press Releases
  • Resources

Company

  • About archTIS
  • Executive Team
  • Board of Directors
  • Our Partners
  • Careers
  • Privacy Policy

Contact

Contact Us

Investor Relations