Resource Center

Filter by

All Resources     |     Kojensi Resources     |     NC Protect Resources

Case Study: SAP Secures Sensitive Government and Regulated Industry Data with Kojensi

Case Study: SAP Secures Sensitive Government and Regulated Industry Data with Kojensi

Learn how Kojensi uses attribute-based access control (ABAC) policies to ensure both internal users across SAP entities, their customers and other third parties only have access to information on a ‘need to know’ basis.
Webinar: Independent Encryption Key Management and BYOK Support for M365 & SharePoint

Webinar: Independent Encryption Key Management and BYOK Support for M365 & SharePoint

Data encryption and key management are a core part of any organization’s security and compliance toolbox. However, many organizations prefer to manage their own encryption keys. In this recorded Webinar we discuss how to add independent key management and BYOK to your Microsoft 365 and SharePoint on-premises environments to minimize unnecessary access and build confidence in Microsoft services.
Request-For-Proposal (RFP) Template for Information Security Providers

Request-For-Proposal (RFP) Template for Information Security Providers

Preparing a request for proposal or 'RFP' to purchase an information security solution to enhance data protection in SharePoint, M365, or Teams? Download this free RFP Template to easily collect important information and compare offerings from security software vendors to assist in the selection process.
Video: NC Protect Integration with Microsoft Purview Information Protection

Video: NC Protect Integration with Microsoft Purview Information Protection

Learn how Microsoft Information Protection sensitivity labels combined with NC Protect’s dynamic access and secure collaboration rules give you expanded protection and control over all your M365 collaboration.
White Paper: RBAC or ABAC?  Adopting a Modern Zero Trust Approach to Data Access

White Paper: RBAC or ABAC? Adopting a Modern Zero Trust Approach to Data Access

This white paper explores the differences between Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) and their ability to support a modern zero trust approach to data access.
FCW CMMC 2.0 Workshop Brief

FCW CMMC 2.0 Workshop Brief

The U.S. Department of Defense has doubled down on how it protects CUI, underscoring the importance of using a solution that ensures any sensitive data is properly safeguarded.  Read this handout to see how to protect DOD controlled unclassified information (CUI) from getting into the wrong hands.
Video: Applying CUI Markings with NC Protect

Video: Applying CUI Markings with NC Protect

Discover how NC Protect makes it easy to dynamically or manually apply CUI markings including CUI Designation Indicator label including Owner Name, Controlled By, Category, Distribution/Limited Dissemination Control and POC, as well as header/footer information into documents as a watermark.
Webinar: Optimizing Governance and Data Security in Microsoft 365 & Teams

Webinar: Optimizing Governance and Data Security in Microsoft 365 & Teams

This webinar shares highlights from a new AIIM survey on the challenges of optimizing M365 for the long term success and content governance. Discover how to ensure secure information access and collaboration that is underpinned by dynamic, contextual security to ensure only the right users - internal or external - have access to the right content at the right time.
Datasheet: NC Protect Advanced Watermarking

Datasheet: NC Protect Advanced Watermarking

Learn about NC Protect's built-in Digital Security Watermarks to prevent data loss and aid in forensics. Advanced capabilities include the ability to apply CUI markings for CMMC, ITAR and NIST.
White Paper: Securing Multinational Coalition Collaboration with Data-Centric Security

White Paper: Securing Multinational Coalition Collaboration with Data-Centric Security

Learn about the advantages of dynamic ABAC secured information sharing for Multinational coalition collaboration in Mission Partner Environments (MPE).
White Paper: Boost Your Information Security to Meet ITAR Compliance in Microsoft 365, Teams and SharePoint

White Paper: Boost Your Information Security to Meet ITAR Compliance in Microsoft 365, Teams and SharePoint

This white paper reviews the 5 essential checkpoints of ITAR and provides strategies, recommended security controls and tools to assist with information protection obligations in Microsoft 365, Teams and SharePoint on-premises.
NC Encrypt Datasheet

NC Encrypt Datasheet

Available as an add-on module to NC Protect, NC Encrypt provides encryption capabilities for organizations that do not have RMS, have third party key management in place or require independent key management.
Webinar: New Mandatory CUI Identification and Marking Requirements for CMMC 2.0

Webinar: New Mandatory CUI Identification and Marking Requirements for CMMC 2.0

Watch this on-demand webinar hosted by FCW to learn about the challenges of implementing mandated best practices for handling CUI and FCI to meet new Defense guidelines and how to tackle them using data-centric zero trust security techniques. 
eBook: Dynamic Data Defense Made Simple

eBook: Dynamic Data Defense Made Simple

Combat data loss, stop insider threats, and meet compliance requirements with archTIS and Microsoft. By combining Microsoft Purview Information Protection sensitivity labels with NC Protect’s dynamic attribute-based policies, gain expanded protection and control over information access, collaboration, and sharing.
Kojensi ITAR Datasheet

Kojensi ITAR Datasheet

Kojensi provides a cost-effective, ready to use solution using dynamic access and identity management to rapidly meet ITAR compliance requirements.
White Paper: SharePoint Governance Guide and Template

White Paper: SharePoint Governance Guide and Template

This whitepaper is designed to help organizations improve their governance and security management aspects in SharePoint.
Technology Brief: GDPR Compliance for Microsoft SharePoint Data

Technology Brief: GDPR Compliance for Microsoft SharePoint Data

Since the introduction of the general data protection regulation (GDPR) in May 2018, organisations have been frantically developing plans to manage copious amounts of structured and unstructured data. Read this Technology Brief to understand how NC Protect can protect your sensitive data in SharePoint and keep you in compliance with GDPR.
Case Study: Australian Dept of Defence – Securing mission critical collaboration in SharePoint  Dynamically with ABAC

Case Study: Australian Dept of Defence – Securing mission critical collaboration in SharePoint Dynamically with ABAC

Learn how the Australian Department of Defence secures the collaboration and sharing of files and prevents accidental data loss while maintaining need to know principles and controlling the releasability of files in SharePoint using NC Protect.