Kojensi Resources

All Resources     |     Kojensi Resources     |     NC Protect Resources

White Paper: ITAR Compliance Checklist

White Paper: ITAR Compliance Checklist

A guide to compliance and information security requirements and best practices for achieving ITAR compliance.
eBook: Complying with Australia’s SLACIP Act & SONS Regulations for Critical Infrastructure

eBook: Complying with Australia’s SLACIP Act & SONS Regulations for Critical Infrastructure

Risk management and governance are critical to SLACIP and SoNS, however, enforcing these mandates is another matter. Explore who these regulations impact, what is required and how to quickly stand up secure and compliant information sharing in this eBook.
Datasheet: Kojensi Saas for the Defence Industry

Datasheet: Kojensi Saas for the Defence Industry

Discover how the Kojensi Federal government accredited SaaS platform enables the Defence Industry to securely share and collaborate on sensitive information up to PROTECTED with Defence and industry partners.
Datasheet: Kojensi for Government

Datasheet: Kojensi for Government

Explore how Kojensi provides a faster, more efficient process for Government to securely share and collaborate on sensitive or Protected information internally and with partners.
Datasheet: Kojensi for Multinational Coalitions

Datasheet: Kojensi for Multinational Coalitions

Learn how Kojensi empowers Multinational coalition partners to share and collaborate on highly classified information with different security models on a single platform.
Datasheet: Kojensi for University Defence Research

Datasheet: Kojensi for University Defence Research

Learn how to enable secure collaboration of sensitive and classified research between Universities, Government, Defence and Industry partners with Kojensi.
Datasheet: Kojensi for Critical Infrastructure

Datasheet: Kojensi for Critical Infrastructure

Discover how the Kojensi platform provides a cost-effective accredited platform to ensure the security of sensitive information for Critical Infrastructure to meet SOCI, SLACIP, and SoNS compliance requirements.
Datasheet: Kojensi for Intelligence Communities

Datasheet: Kojensi for Intelligence Communities

Discover how Kojensi enables local, national and global intelligence communities to easily and securely share and collaborate on highly classified information in real time.
Kojensi: Military-grade Sensitive & Classified Information Sharing Platform

Kojensi: Military-grade Sensitive & Classified Information Sharing Platform

See Kojensi's powerful ABAC powered policies in action in this platform capabilities overview video.
Case Study: SAP Secures Sensitive Government and Regulated Industry Data with Kojensi

Case Study: SAP Secures Sensitive Government and Regulated Industry Data with Kojensi

Learn how Kojensi uses attribute-based access control (ABAC) policies to ensure both internal users across SAP entities, their customers and other third parties only have access to information on a ‘need to know’ basis.
White Paper: Securing Multinational Coalition Collaboration with Data-Centric Security

White Paper: Securing Multinational Coalition Collaboration with Data-Centric Security

Learn about the advantages of dynamic ABAC secured information sharing for Multinational coalition collaboration in Mission Partner Environments (MPE).
Kojensi ITAR Datasheet

Kojensi ITAR Datasheet

Kojensi provides a cost-effective, ready to use solution using dynamic access and identity management to rapidly meet ITAR compliance requirements.
White Paper: Solving Sensitive/Classified Information Sharing & Collaboration Challenges with Kojensi

White Paper: Solving Sensitive/Classified Information Sharing & Collaboration Challenges with Kojensi

The archTIS Kojensi platform addresses the long-standing challenge of how to securely collaborate on and share sensitive and classified information within and between organisations. This white paper describes the business problem and use case that Kojensi addresses, and provides an overview of the technology and the security model.
Zero Trust A Data-Centric Strategy for Success

Zero Trust A Data-Centric Strategy for Success

This white paper examines the new information security paradigm of zero trust and how to ensure it extends beyond the perimeter and applications to more effectively protect what is most at risk - data.
Guiding and Managing the Implementation of Attribute Based Access Control

Guiding and Managing the Implementation of Attribute Based Access Control

Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.