Kojensi Resources

All Resources     |     Kojensi Resources     |     NC Protect Resources

Kojensi: Military-grade Sensitive & Classified Information Sharing Platform

Kojensi: Military-grade Sensitive & Classified Information Sharing Platform

See Kojensi's powerful ABAC powered policies in action in this platform capabilities overview video.
Case Study: SAP Secures Sensitive Government and Regulated Industry Data with Kojensi

Case Study: SAP Secures Sensitive Government and Regulated Industry Data with Kojensi

Learn how Kojensi uses attribute-based access control (ABAC) policies to ensure both internal users across SAP entities, their customers and other third parties only have access to information on a ‘need to know’ basis.
White Paper: Securing Multinational Coalition Collaboration with Data-Centric Security

White Paper: Securing Multinational Coalition Collaboration with Data-Centric Security

Learn about the advantages of dynamic ABAC secured information sharing for Multinational coalition collaboration in Mission Partner Environments (MPE).
Kojensi ITAR Datasheet

Kojensi ITAR Datasheet

Kojensi provides a cost-effective, ready to use solution using dynamic access and identity management to rapidly meet ITAR compliance requirements.
White Paper: Solving Sensitive/Classified Information Sharing & Collaboration Challenges with Kojensi

White Paper: Solving Sensitive/Classified Information Sharing & Collaboration Challenges with Kojensi

The archTIS Kojensi platform addresses the long-standing challenge of how to securely collaborate on and share sensitive and classified information within and between organisations. This white paper describes the business problem and use case that Kojensi addresses, and provides an overview of the technology and the security model.
Zero Trust A Data-Centric Strategy for Success

Zero Trust A Data-Centric Strategy for Success

This white paper examines the new information security paradigm of zero trust and how to ensure it extends beyond the perimeter and applications to more effectively protect what is most at risk - data.
Guiding and Managing the Implementation of Attribute Based Access Control

Guiding and Managing the Implementation of Attribute Based Access Control

Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.
Technology Brief: Meeting the US Presidential Executive Order for Zero Trust

Technology Brief: Meeting the US Presidential Executive Order for Zero Trust

The new U.S. Presidential Cybersecurity Executive Order for Zero Trust requires US Federal agencies to transition ...
White Paper: Understanding and Meeting DISP Information Security Requirements

White Paper: Understanding and Meeting DISP Information Security Requirements

Understanding the complexities of DISP can be daunting. This white paper helps outline information and cyber security requirements and provides strategies to quickly increase compliance and cyber resiliency.
Data Sheet: Kojensi for DISP Information Security Compliance

Data Sheet: Kojensi for DISP Information Security Compliance

Governance is critical to DISP accreditation, however, enforcing these guidelines is another matter. Built into ...
Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Learn about the award-winning Security Architecture for the Australian Department of Defence (Defence) Single Information Environment Security Architecture (SIESA).
Case Study: archTIS Implements Ship Maintenance Portal for Royal Australian Navy

Case Study: archTIS Implements Ship Maintenance Portal for Royal Australian Navy

Learn how archTIS empowered the Navy to adopt a superior method of managing and collaborating on multiple sources of logistics and engineering data, supporting contracts and contract data.
Video: Kojensi

Video: Kojensi

Ensure your users and partners access, share and collaborate on sensitive, classified and top secret information—securely. Watch this video to see how Kojensi provides accredited classified information sharing and collaboration out-of-the-box.
2021 State of Remote Work Security Report

2021 State of Remote Work Security Report

The 2021 State of Remote Work Security Report reveals additional insights into the status of organizations’ efforts to secure the new workforce, key challenges and unique security threats, technology gaps and investment priorities.
2019 Insider Threat Report

2019 Insider Threat Report

The 2019 Insider Threat Report from Cybersecurity Insiders reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders and preparing to better protect their critical data and IT infrastructure.