Resource Center

All Resources     |     Kojensi Resources     |     NC Protect Resources

Webinar: POPI Act Compliance 7 Best Practices to Protect Personal Data

Webinar: POPI Act Compliance 7 Best Practices to Protect Personal Data

Amid growing risk, the need to comply with the Protection of Personal Information Act (POPIA), and the emergence of a remote and hybrid workforce, organizations must find ways to achieve a balance between enabling collaboration and securing sensitive information. You will discover the seven best practices for compliance with privacy legislation, without sacrificing collaboration.
Webinar: Stop the Top 10 Data Loss Scenarios

Webinar: Stop the Top 10 Data Loss Scenarios

Since the onset of COVID-19, companies are reporting sharp increases in data loss spurred by remote and hybrid work. But, just how is all this data leaking with all the security measures enterprises have in place? View this webinar and explore our solutions to the different data loss scenarios that plague most companies.
White Paper: Building Dynamic Information Barriers in Microsoft 365

White Paper: Building Dynamic Information Barriers in Microsoft 365

This white paper examines the challenge of building information barriers using role based security and how to create more usable separation for more complex use cases using dynamic attribute-based access control (ABAC) policies.
NC Protect Data Connector for Azure Sentinel Datasheet

NC Protect Data Connector for Azure Sentinel Datasheet

Azure Sentinel is a cloud-native SIEM that you can use for intelligent security analytics across your entire enterprise. The NC Protect Data Connector for Azure Sentinel allows you to easily ingest user activity and protection logs and their associated “events” from NC Protect into Azure Sentinel.
Technology Brief: Meeting the US Presidential Executive Order for Zero Trust

Technology Brief: Meeting the US Presidential Executive Order for Zero Trust

The new U.S. Presidential Cybersecurity Executive Order for Zero Trust requires US Federal agencies to transition ...
Webinar: 5 Tips to Protect Your Sensitive Data in Nutanix Files

Webinar: 5 Tips to Protect Your Sensitive Data in Nutanix Files

With remote work comes new risks and concerns about how data is accessed and used in cloud sharing apps like ...
White Paper: Boost Your Information Security to Meet ITAR Compliance

White Paper: Boost Your Information Security to Meet ITAR Compliance

This whitepaper introduces the 5 essential checkpoints of ITAR and provides strategies to assist with compliance and cyber resilience.
Infographic: Managing Information Security and Data Compliance in Nutanix Files

Infographic: Managing Information Security and Data Compliance in Nutanix Files

6 steps for effectively managing information security and compliance; from defining your strategy to using NC Protect to enforce compliance and apply dynamic security to data stored and shared in Nutanix Files 
Webinar: Remote work is putting your data at risk.  Protect it with Zero Trust.

Webinar: Remote work is putting your data at risk. Protect it with Zero Trust.

The shift to remote work has organizations grappling with how to protect business-critical data.  This Webinar ...
Webinar: Securing SharePoint Data as You Transition to the Cloud

Webinar: Securing SharePoint Data as You Transition to the Cloud

This On-Demand webinar shares the challenges, best practices and most effective tools to migrating to a cloud ...
White Paper: Understanding and Meeting DISP Information Security Requirements

White Paper: Understanding and Meeting DISP Information Security Requirements

Understanding the complexities of DISP can be daunting. This white paper helps outline information and cyber security requirements and provides strategies to quickly increase compliance and cyber resiliency.
Kojensi for DISP Information Security Compliance

Kojensi for DISP Information Security Compliance

Governance is critical to DISP accreditation, however, enforcing these guidelines is another matter. Built into ...
Video: archTIS Company Overview

Video: archTIS Company Overview

Meet archTIS the company trusted with the world's most sensitive information. Get to know archTIS, what we do and the markets we serve in this quick company introduction.
Video: Kojensi

Video: Kojensi

Ensure your users and partners access, share and collaborate on sensitive, classified and top secret information—securely. Watch this video to see how Kojensi provides accredited classified information sharing and collaboration out-of-the-box.
Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Learn about the award-winning Security Architecture for the Australian Department of Defence (Defence) Single Information Environment Security Architecture (SIESA).
Case Study: Royal Australian Navy

Case Study: Royal Australian Navy

Learn how archTIS empowered the Navy to adopt a superior method of managing and collaborating on multiple sources of logistics and engineering data, supporting contracts and contract data.
NC Protect for Office 365 & SharePoint Datasheet

NC Protect for Office 365 & SharePoint Datasheet

With modern collaboration apps, users can access data from an alarming variety of locations. Between Azure, Office 365 and other cloud platforms, businesses are adopting new technologies faster than ever and data loss prevention methodology needs to keep up.
NC Protect and Microsoft Information Protection (MIP) Integration

NC Protect and Microsoft Information Protection (MIP) Integration

Microsoft Information Protection enables you to discover, classify and label, protect and monitor sensitive information across a variety of locations including apps, devices, cloud services and on-premises repositories.