Kojensi Resources

All Resources     |     Kojensi Resources     |     NC Protect Resources

Infographic: Managing Information Security and Data Compliance in Nutanix Files

Infographic: Managing Information Security and Data Compliance in Nutanix Files

6 steps for effectively managing information security and compliance; from defining your strategy to using NC Protect to enforce compliance and apply dynamic security to data stored and shared in Nutanix Files 
White Paper: Understanding and Meeting DISP Information Security Requirements

White Paper: Understanding and Meeting DISP Information Security Requirements

Understanding the complexities of DISP can be daunting. This white paper helps outline information and cyber security requirements and provides strategies to quickly increase compliance and cyber resiliency.
Kojensi for DISP Information Security Compliance

Kojensi for DISP Information Security Compliance

Governance is critical to DISP accreditation, however, enforcing these guidelines is another matter. Built into the
Video: archTIS Company Overview

Video: archTIS Company Overview

Meet archTIS the company trusted with the world's most sensitive information. Get to know archTIS, what we do and the markets we serve in this quick company introduction.
Video: Kojensi

Video: Kojensi

Ensure your users and partners access, share and collaborate on sensitive, classified and top secret information—securely. Watch this video to see how Kojensi provides accredited classified information sharing and collaboration out-of-the-box.
Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Learn about the award-winning Security Architecture for the Australian Department of Defence (Defence) Single Information Environment Security Architecture (SIESA).
Case Study: Royal Australian Navy

Case Study: Royal Australian Navy

Learn how archTIS empowered the Navy to adopt a superior method of managing and collaborating on multiple sources of logistics and engineering data, supporting contracts and contract data.
archTIS Delivers Australian Sovereign Cloud computing to the edge of the battlespace

archTIS Delivers Australian Sovereign Cloud computing to the edge of the battlespace

Live from Land Forces 2021 archTIS CEO Daniel Lai discusses the company's partnership with Thales as part of the Nexium Defence Cloud Edge offering.
Whitepaper: Enabling Trusted Information Sharing

Whitepaper: Enabling Trusted Information Sharing

When it comes to data security, trust alone is not viable option to combat modern threats including hackers, malware, nation-state threats—even our ‘trusted insiders’. archTIS explores this issue and modern security approaches.
Kojensi Enterprise

Kojensi Enterprise

Learn about Kojensi Enterprise, a Multi-Level Security platform for Defence, Government and Industry to share and manage highly classified information.
Kojensi Field

Kojensi Field

Kojensi Field is a field deployable Multi-Level Security platform to share and manage highly classified information.
Kojensi Cloud Service

Kojensi Cloud Service

Learn about Kojensi Cloud Service, a government accredited cloud service for Government, Defence and their industry partners to share and manage PROTECTED information.
Guiding and Managing the Implementation of Attribute Based Access Control

Guiding and Managing the Implementation of Attribute Based Access Control

Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.
Maximising the Value of Classified Information

Maximising the Value of Classified Information

Download this white paper to learn more about building a secure, trusted information sharing framework for classified information.
Secure Collaboration: Bringing Business, Information Management and Security Together

Secure Collaboration: Bringing Business, Information Management and Security Together

The risks involved in sharing are often seen to outweigh the benefits: sensitive information could be exposed, financial data stolen, a competitive advantage or even a reputation lost. Discover how to ensure secure information sharing.