Microsoft Information Security Solutions for Government & Defense Industry
Fine-grain attribute-based access control (ABAC) and data security for Microsoft 365, DoD365, GCC High and SharePoint Server to meet Government, Defense and Defense Industry needs

enhance ACCESS CONTROL & Data SEcurity in Microsoft 365, DoD365, GCC HIGH & Sharepoint server
data-centric zero trust access and information protection powered by ABAC
Empower your organization to take advantage of all the productivity and collaboration the Microsoft 365, DoD365 and GCC High offer while meeting information security and export controls regulations. archTIS’ zero trust attribute-based access control (ABAC) powered information security solutions for the government and defense enhance native security capabilities to empower secure collaboration within your agency with other agencies, defense, multinational coalitions and supply chain partners.
NC Protect from archTIS leverages Microsoft security investments to protect sensitive and classified information against data loss and insider threats. archTIS provides policy-based data-centric security powered by ABAC across Microsoft 365, DoD365 and GCC High applications, including SharePoint Online, Exchange, and Office, as well as SharePoint on-premises, Windows File Share and hybrid environments.
NC Protect is trusted by Government, Defense and the Defense Supply Chain to:
Apply attribute-based access control (ABAC) policies that use data and user attributes from Microsoft Purview, Entra ID and other identity sources to determine access and apply file protection in real time.
Control file access, usage and sharing based on user attributes, including security classification, clearance level, department, nationality, etc.
Classify sensitive data and dynamically apply access and security controls based on the classification in combination with other attributes.
Augment Microsoft Purview sensitivity labels with additional labels to support multi-label classification and meet complex taxonomy needs.
Gain unique security capabilities to enforce secure read-only access, hide files from unauthorized users, and apply dynamic user-based watermarks.
Apply visual markings, including headers, footer and CUI Designation Indicator labels.
Dynamically enforce Information Barriers and restrict guest access to country-specific sensitive information (e.g. ITAR for Defence supply chain).
Ensure Secure and Consistent Security and Compliance – Anywhere
On-Premises
Easily support your access, security and privacy requirements for SharePoint Server and Windows file share content with granular, ABAC-enabled access and data protection policies to ensure only the right users have access to the right information at the right time.
Hybrid
For agencies transitioning to the cloud or planning to support a long-term hybrid strategy, archTIS simplifies security and compliance with centralized policy management and tagging to ensure consistent protection across your collaboration tools no matter where they live – Cloud, hybrid or on-premises.
Cloud
Manage access to and protect M365, DoD365, and GCC High application data with granular ABAC policies to ensure secure collaboration of files, chats and messages. archTIS solutions enforce compliance with federal, state, or international regulations, including ITAR, CMMC, NIST and more.
Add Unique Capabilities for Fine-Grain Access Control & Data Security to augment Microsoft security capabilities
NC Protect delivers robust, data-centric zero trust access and collaboration for sensitive information, empowered by fine-grained attribute-based policies that offer unparalleled security and compliance.
- Scan and tag data or leverage Microsoft Purview (MPIP) sensitivity labels or other classifications (Jannuseal, Titus) in combination with other file and user attributes to dynamically adjust access and data protection.
- Augment Microsoft Purview sensitivity labels with additional labels to support multi-label classification and meet complex taxonomy needs.
- Control what users can see, how they can use and share information and with whom at the file, message and chat level using fine-grain Attribute-Based Access and Sharing Control (ABAC) policies.
- Get unique security capabilities to enforce secure read-only access, hide sensitive files from unauthorized users, and apply dynamic user-based watermarks.
- Add CUI Banners/Footers and CUI Designation Indicator label, including Owner Name, Controlled By, Category, Distribution/Limited Dissemination Control and POC into documents as a watermark for CMMC 2.0, DFARs and NIST compliance.
- Remove/redact sensitive or confidential information, such as keywords or phrases, in a document when viewed in its native application (Word, Excel, PowerPoint and PDF) or when the file is presented in the NC Protect secure reader for legal or security purposes.
- Dynamically encrypt files based on policies.
- Secure information exchange internally and with third parties using attributes, including security classification, clearance level, nationality, etc.
- Protect Word, Excel, PowerPoint, PDF, OCR, CAD files, images, text files and more.
- Integrate user activity and protection logs with Microsoft Sentinel for further analysis and downstream actions.
- Seamless integration across Microsoft 365 apps, GCC, GCC High, SharePoint on-premises, NetApp ONTAP, Nutanix Files and Windows file shares.
Ensure Compliance with Global Information Security & Export Control Requirements
NC Protect’s data-centric zero-trust approach to secure file access and sharing is trusted by leading defence agencies and supply chain partners across the globe to safeguard sensitive data in accordance with government policies.
NC Protect’s fine-grain, ABAC policies can be easily tailored to help ensure compliance with domestic and international information security requirements, including but not limited to:
- NIST 800-171
- NIST 800-53
- NIST 800-162
- CMMC
- Controlled Unclassified Information (CUI)
- Defense Federal Acquisition Regulation Supplement (DFARS)
- Defence Industry Security Program (DISP)
- Export Administration Regulations (EAR)
- FISMA
- Federal Contract Information (FCI)
- Global Privacy Acts (GDPR, Regional Privacy Acts)
- International Traffic in Arms Regulations (ITAR)
- NATO STANAG 4774 and 4778
- Other Export Control Regulations
Resources
NC Protect for Government & Defense Capabilities Overview
Australian Dept. of Defence Case Study
ITAR & CUI Defense Manufacturer Case Study
White Paper: CMMC 2.0 Compliance
NIST SP 800-162 ABAC Model
FedRamp Certification Statement
NC Protect provides Government & Defense Industry with secure zero trust collaboration and sharing
Contact us to discover how NC Protect’s unique capabilities can enhance data security across your Microsoft applications.