Blog

Stay up to date on industry trends, security advice, product news and more.

UK Security Policy Framework and Government Security Classifications Compliance

UK Security Policy Framework and Government Security Classifications Compliance

Understanding UK Government Security Classifications (GSC) data classification and marking requirements. Plus, how to automate compliance with data-centric information protection.
Australia’s Defence Strategic Review and Data Centric Security

Australia’s Defence Strategic Review and Data Centric Security

Explore Australia’s new Defence Strategic Review (DSR) requirements and their impact on Defence and Defence industry security practices.
Achieving NATO STANAG 4774 and 4778 Compliance

Achieving NATO STANAG 4774 and 4778 Compliance

Understanding NATO STANAG 4774 and 4778 classification requirements. Plus tips for automating the classification process and implementing access control to meet compliance.
Data Encryption At Rest vs In Motion in Microsoft 365

Data Encryption At Rest vs In Motion in Microsoft 365

Encryption is an essential tool for enterprise data security. Understand the differences between data at rest vs in motion and the types of encryption available.
Protecting Intellectual Property (IP) in the Supply Chain

Protecting Intellectual Property (IP) in the Supply Chain

Data security policies target insider threats and external attackers, but your distributors can equally put IP protection at risk. Discover how to protect IP with dynamic watermarks.
At RSAC? Visit the Microsoft booth on Wednesday from 3-4pm to see how NC Protect enhances security in M365

At RSAC? Visit the Microsoft booth on Wednesday from 3-4pm to see how NC Protect enhances security in M365

Stop by the Microsoft booth on April 26 from 3-4pm to see firsthand the benefits of pairing MPIP and Sentinel with NC Protect.
A Guide to Controlled Unclassified Information (CUI) Markings

A Guide to Controlled Unclassified Information (CUI) Markings

CUI must be marked accordingly to inform recipients/users that it is present and of any limited dissemination controls. Learn how to automate this process in Microsoft applications.
Securing Multinational Coalition Collaboration with Data-Centric Security

Securing Multinational Coalition Collaboration with Data-Centric Security

In today’s digital age, responding to multi-national threats, peacekeeping missions, and combat operations requires the twin challenges of data security and information sharing to be confronted and successfully addressed. Explore new technologies for safeguarding sensitive mission data to enable secure multinational coalition collaboration.
archTIS NC Encrypt Integrates with Thales CipherTrust Manager to Secure Business Critical Content in Microsoft Applications

archTIS NC Encrypt Integrates with Thales CipherTrust Manager to Secure Business Critical Content in Microsoft Applications

Recently, archTIS worked with fellow Microsoft Intelligent Security Association (MISA) member, Thales to integrate ...
archTIS Celebrates International Women’s Day 2023

archTIS Celebrates International Women’s Day 2023

Meet the talented women of archTIS sharing their insights and wisdom with others seeking a career as ‘Women in Tech’.
archTIS is a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist

archTIS is a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist

archTIS is proud to announce we have been recognized as a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer
6 Steps to Prepare Data Before SharePoint Migration to Microsoft 365

6 Steps to Prepare Data Before SharePoint Migration to Microsoft 365

How to prepare your on-premises data to ensure a smooth SharePoint migration to M365 and SharePoint Online.
5 Top Microsoft Teams Security Concerns

5 Top Microsoft Teams Security Concerns

We’ve identified the top 5 Microsoft Teams security concerns and what you can do to empower users to collaborate freely without risking sensitive data shared on the platform.
Managing Administrator Privileges for Australia’s Essential Eight Cybersecurity Compliance

Managing Administrator Privileges for Australia’s Essential Eight Cybersecurity Compliance

Using ABAC to manage administrator access to meet Essential Eight compliance requirements and protect sensitive data.
[Webinar] Protecting IP with Microsoft Purview Information Protection and ABAC Policies

[Webinar] Protecting IP with Microsoft Purview Information Protection and ABAC Policies

archTIS’ Dave Matthews, Product Manager Governance and Compliance, and Microsoft's Director, Compliance and Privacy Ecosystem, Hammad Rajjoub, present a recorded webinar on how to enhance Microsoft Purview Information Protection with dynamic ABAC policies to prevent accidental and malicious data loss.
BYOD Security: Using ABAC to Manage Access to Sensitive Data

BYOD Security: Using ABAC to Manage Access to Sensitive Data

BYOD benefits also come with security risks that require mitigation. Learn how ABAC helps secure sensitive data to improve BYOD security.
Understanding Australia’s SLACIP and SoNS Requirements for Critical Infrastructure

Understanding Australia’s SLACIP and SoNS Requirements for Critical Infrastructure

Understanding CI-SoNS reform under the SLACIP Act for Critical Infrastructure protection in Australia and the requirements for secure data management.
Preventing the Theft of IP and Military Secrets

Preventing the Theft of IP and Military Secrets

How to balance the need for access with data-centric controls once access is granted to prevent IP and military secret theft.