Resource Center

All Resources     |     Kojensi Resources     |     NC Protect Resources

archTIS Defense & DIB Cybersecurity Summit

archTIS Defense & DIB Cybersecurity Summit

Access the recording of this live event featuring government and industry cybersecurity experts as they share insights and best practices for addressing evolving information security challenges and requirements in Defense and the Defense Industrial Base (DIB).
Zero Trust A Data-Centric Strategy for Success

Zero Trust A Data-Centric Strategy for Success

This white paper examines the new information security paradigm of zero trust and how to ensure it extends beyond the perimeter and applications to more effectively protect what is most at risk - data.
Presentation: Using Zero Trust to Protect Intellectual Property in Media and Entertainment

Presentation: Using Zero Trust to Protect Intellectual Property in Media and Entertainment

Intellectual property (IP) protection is vital to your bottom line. A leaked script, clip or game design can be disastrous to the success of any project. While today’s collaboration tools have made it easier than ever to exchange ideas and information. Learn how applying a Zero trust methodology to data access and sharing can help safeguard your most vital assets.
NC Protect FedRAMP Statement

NC Protect FedRAMP Statement

archTIS has confirmed with the FedRAMP Program Management Office (PMO) that our NC Protect product capabilities do not require FedRAMP certification as the product is not a cloud service. Learn more.
Webinar: CMMC 2.0 – Jumpstart FCI & CUI Protection in Microsoft 365 with Data-centric Zero Trust

Webinar: CMMC 2.0 – Jumpstart FCI & CUI Protection in Microsoft 365 with Data-centric Zero Trust

Watch this on demand webinar to discover the challenges of implementing mandated best practices for the handling of FCI and CUI to meet CMMC, NIST, and the Zero Trust mandate guidelines, and how to tackle them using data-centric security techniques.
Webinar: Myth Busting ABAC vs RBAC for Effective Data Security

Webinar: Myth Busting ABAC vs RBAC for Effective Data Security

Watch this webinar as we bust some of the common myths about ABAC and RBAC security methods to help you determine the right approach to your data security.
Guiding and Managing the Implementation of Attribute Based Access Control

Guiding and Managing the Implementation of Attribute Based Access Control

Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.
Industry Report eBook: Optimize M365 for Controlled Content Services

Industry Report eBook: Optimize M365 for Controlled Content Services

Microsoft 365 enterprise presence is becoming ubiquitous. According to AIIM research, 93% of organizations ...
Brochure: NC Protect for Public Sector

Brochure: NC Protect for Public Sector

Empower your agency or Defense Industry Base (DIB) organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC and ITAR for information security.
Webinar: Tips for Secure Collaboration and Guest Access in Microsoft Teams

Webinar: Tips for Secure Collaboration and Guest Access in Microsoft Teams

When Microsoft Teams is not managed properly it can lead to issues that damage the business value it delivers and leaves the company exposed to risk from data misuse. If this sounds too familiar or has you worried about adopting Teams, there is hope. It is possible to reap the vast benefits of Teams collaboration without governance and security headaches.
NC Protect Seamlessly Manages CUI in SharePoint at this Defense Supply Chain Manufacturer

NC Protect Seamlessly Manages CUI in SharePoint at this Defense Supply Chain Manufacturer

Learn how this Defense manufacturer uses NC Protect to identify and restrict access to content containing Controlled Unclassified Information (CUI) in their SharePoint on-premises environment for ITAR compliance.
Data Sheet: NC Protect for SharePoint Server On-Premises

Data Sheet: NC Protect for SharePoint Server On-Premises

NC Protect provides advanced data-centric security for SharePoint Server 2010, 2013, 2016 and 2019 on-premises deployments, delivering enhanced information protection for on-premises environments that can be extended to hybrid and cloud M365 deployments should you migrate in the future.
Demo: NC Protect Demo for Microsoft Teams

Demo: NC Protect Demo for Microsoft Teams

See NC Protect’s unique data protection features to ensure secure collaboration, sharing and info barriers in Teams.
Demo: NC Protect Automates Classification & Compliance

Demo: NC Protect Automates Classification & Compliance

See how NC Protect’s dynamic classification and protection capabilities ensure compliance and secure sharing.
Demo: NC Protect for M365 and SharePoint

Demo: NC Protect for M365 and SharePoint

See NC Protect’s dynamic and unique data protection features to ensure secure collaboration, sharing and info barriers across M365 apps.
White Paper: CMMC 2.0 – Jumpstart FCI & CUI Protection with Data-Centric Zero Trust

White Paper: CMMC 2.0 – Jumpstart FCI & CUI Protection with Data-Centric Zero Trust

How extending a Zero Trust approach used for system and application access to file access and sharing ensures compliance with CMMC 2.0 standards for collaboration of FCI and CUI.
Webinar: POPI Act Compliance 7 Best Practices to Protect Personal Data

Webinar: POPI Act Compliance 7 Best Practices to Protect Personal Data

Amid growing risk, the need to comply with the Protection of Personal Information Act (POPIA), and the emergence of a remote and hybrid workforce, organizations must find ways to achieve a balance between enabling collaboration and securing sensitive information. You will discover the seven best practices for compliance with privacy legislation, without sacrificing collaboration.
Webinar: Stop the Top 10 Data Loss Scenarios

Webinar: Stop the Top 10 Data Loss Scenarios

Since the onset of COVID-19, companies are reporting sharp increases in data loss spurred by remote and hybrid work. But, just how is all this data leaking with all the security measures enterprises have in place? View this webinar and explore our solutions to the different data loss scenarios that plague most companies.