archTIS Delivers Australian Sovereign Cloud computing to the edge of the battlespace
Live from Land Forces 2021 archTIS CEO Daniel Lai discusses the company's partnership with Thales as part of the Nexium Defence Cloud Edge offering.
Achieving CMMC Level 3 and Beyond to Mitigate Insider Threats in Government and Defense
How extending a Zero Trust approach used for system and application access to file access and sharing ensures compliance with CMMC standards for collaboration of FCI and CUI.
2021 State of Remote Work Security Report
The 2021 State of Remote Work Security Report reveals additional insights into the status of organizations’ efforts to secure the new workforce, key challenges and unique security threats, technology gaps and investment priorities.
Whitepaper: Enabling Trusted Information Sharing
When it comes to data security, trust alone is not viable option to combat modern threats including hackers, malware, nation-state threats—even our ‘trusted insiders’. archTIS explores this issue and modern security approaches.
Learn about Kojensi Enterprise, a Multi-Level Security platform for Defence, Government and Industry to share and manage highly classified information.
Kojensi Field is a field deployable Multi-Level Security platform to share and manage highly classified information.
Kojensi Cloud Service
Learn about Kojensi Cloud Service, a government accredited cloud service for Government, Defence and their industry partners to share and manage PROTECTED information.
Case Study: Royal Australian Navy
Learn how archTIS empowered the Navy to adopt a superior method of managing and collaborating on multiple sources of logistics and engineering data, supporting contracts and contract data.
Case Study: Architecting a Single Information Environment Security Architecture (SIESA)
Learn about the award-winning Security Architecture for the Australian Department of Defence (Defence) Single Information Environment Security Architecture (SIESA).
Guiding and Managing the Implementation of Attribute Based Access Control
Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.
Maximising the Value of Classified Information
Download this white paper to learn more about building a secure, trusted information sharing framework for classified information.
Trusted Information Sharing: It’s a Business Problem
The risks involved in sharing are often seen to outweigh the benefits: sensitive information could be exposed, financial data stolen, a competitive advantage or even a reputation lost. Discover how to ensure secure information sharing.