Resource Center

All Resources     |     Kojensi Resources     |     NC Protect Resources

White Paper: Boost Your Information Security to Meet ITAR Compliance

White Paper: Boost Your Information Security to Meet ITAR Compliance

This whitepaper introduces the 5 essential checkpoints of ITAR and provides strategies to assist with compliance and cyber resilience.
Infographic: Managing Information Security and Data Compliance in Nutanix Files

Infographic: Managing Information Security and Data Compliance in Nutanix Files

6 steps for effectively managing information security and compliance; from defining your strategy to using NC Protect to enforce compliance and apply dynamic security to data stored and shared in Nutanix Files 
Webinar: Remote work is putting your data at risk.  Protect it with Zero Trust.

Webinar: Remote work is putting your data at risk. Protect it with Zero Trust.

The shift to remote work has organizations grappling with how to protect business-critical data.  This Webinar ...
Webinar: Securing SharePoint Data as You Transition to the Cloud

Webinar: Securing SharePoint Data as You Transition to the Cloud

This On-Demand webinar shares the challenges, best practices and most effective tools to migrating to a cloud ...
White Paper: Understanding and Meeting DISP Information Security Requirements

White Paper: Understanding and Meeting DISP Information Security Requirements

Understanding the complexities of DISP can be daunting. This white paper helps outline information and cyber security requirements and provides strategies to quickly increase compliance and cyber resiliency.
Kojensi for DISP Information Security Compliance

Kojensi for DISP Information Security Compliance

Governance is critical to DISP accreditation, however, enforcing these guidelines is another matter. Built into the
Video: archTIS Company Overview

Video: archTIS Company Overview

Meet archTIS the company trusted with the world's most sensitive information. Get to know archTIS, what we do and the markets we serve in this quick company introduction.
Video: Kojensi

Video: Kojensi

Ensure your users and partners access, share and collaborate on sensitive, classified and top secret information—securely. Watch this video to see how Kojensi provides accredited classified information sharing and collaboration out-of-the-box.
Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Learn about the award-winning Security Architecture for the Australian Department of Defence (Defence) Single Information Environment Security Architecture (SIESA).
Case Study: Royal Australian Navy

Case Study: Royal Australian Navy

Learn how archTIS empowered the Navy to adopt a superior method of managing and collaborating on multiple sources of logistics and engineering data, supporting contracts and contract data.
NC Protect for Office 365 & SharePoint Datasheet

NC Protect for Office 365 & SharePoint Datasheet

With modern collaboration apps, users can access data from an alarming variety of locations. Between Azure, Office 365 and other cloud platforms, businesses are adopting new technologies faster than ever and data loss prevention methodology needs to keep up.
NC Protect and Microsoft Information Protection (MIP) Integration

NC Protect and Microsoft Information Protection (MIP) Integration

Microsoft Information Protection enables you to discover, classify and label, protect and monitor sensitive information across a variety of locations including apps, devices, cloud services and on-premises repositories.
NC Protect for Microsoft Teams Data Sheet

NC Protect for Microsoft Teams Data Sheet

With over 115M users, the ability to quickly share information via built-in chat and file sharing capabilities has rapidly made Microsoft Teams a key collaboration app for organizations.
NC Protect for Yammer Data Sheet

NC Protect for Yammer Data Sheet

The nature of collaboration is changing. With social collaboration tools like Yammer we can now improve engagement across our entire organization making it easier than every before to communicate with a wide audience, and share and collaborate on files.
NC Protect for Dropbox Data Sheet

NC Protect for Dropbox Data Sheet

The nature of collaboration is changing. Cloud collaboration tools like dropbox make it easier than ever before to store files for easy access across all devices, and share and collaborate with both internal and external users.
NC Protect for File Shares Data Sheet

NC Protect for File Shares Data Sheet

The numbers tell the story, 90 percent of data generated today is unstructured (customer purchase history, call center logs, email, spreadsheets, documents, web content, blogs, wikis, etc.). And information velocity is not slowing down with quintillions of bytes of data being created every day.
NC Protect for Nutanix Data Sheet

NC Protect for Nutanix Data Sheet

Organizations rely on file storage platforms like Nutanix Files to store and collaborate on unstructured content. And that content is growing quickly.
NC Protect Technical Specifications

NC Protect Technical Specifications

The following technical requirements represent the minimum recommended configuration for installing NC Protect version 8. Nucleus Cyber recognizes that each deployment is different and can advise on how your specific environment should be configured to ensure optimal performance.