Resource Center
Filter by
All Resources | Kojensi Resources | NC Protect Resources

NC Protect FedRAMP Statement
archTIS has confirmed with the FedRAMP Program Management Office (PMO) that our NC Protect product capabilities do not require FedRAMP certification as the product is not a cloud service. Learn more.

Webinar: CMMC 2.0 – Jumpstart FCI & CUI Protection in Microsoft 365 with Data-centric Zero Trust
Watch this on demand webinar to discover the challenges of implementing mandated best practices for the handling of FCI and CUI to meet CMMC, NIST, and the Zero Trust mandate guidelines, and how to tackle them using data-centric security techniques.

Webinar: Myth Busting ABAC vs RBAC for Effective Data Security
Watch this webinar as we bust some of the common myths about ABAC and RBAC security methods to help you determine the right approach to your data security.

Guiding and Managing the Implementation of Attribute Based Access Control
Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.

Industry Report eBook: Optimize M365 for Controlled Content Services
Microsoft 365 enterprise presence is becoming ubiquitous. According to AIIM research, 93% of organizations ...

Brochure: NC Protect for Public Sector
Empower your agency or Defense Industry Base (DIB) organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC and ITAR for information security.

Webinar: Tips for Secure Collaboration and Guest Access in Microsoft Teams
When Microsoft Teams is not managed properly it can lead to issues that damage the business value it delivers and leaves the company exposed to risk from data misuse. If this sounds too familiar or has you worried about adopting Teams, there is hope. It is possible to reap the vast benefits of Teams collaboration without governance and security headaches.

Case Study: NC Protect Seamlessly Manages CUI in SharePoint at this Defense Supply Chain Manufacturer
Learn how this Defense manufacturer uses NC Protect to identify and restrict access to Controlled Unclassified Information (CUI) in their SharePoint on-premises environment for ITAR compliance.

Data Sheet: NC Protect for SharePoint Server On-Premises
NC Protect provides advanced data-centric security for SharePoint Server 2010, 2013, 2016 and 2019 on-premises deployments, delivering enhanced information protection for on-premises environments that can be extended to hybrid and cloud M365 deployments should you migrate in the future.

Demo: NC Protect Demo for Microsoft Teams
See NC Protect’s unique data protection features to ensure secure collaboration, sharing and info barriers in Teams.

Demo: NC Protect Automates Classification & Compliance
See how NC Protect’s dynamic classification and protection capabilities ensure compliance and secure sharing.

Demo: NC Protect for M365 and SharePoint
See NC Protect’s dynamic and unique data protection features to ensure secure collaboration, sharing and info barriers across M365 apps.

Webinar: POPI Act Compliance 7 Best Practices to Protect Personal Data
Amid growing risk, the need to comply with the Protection of Personal Information Act (POPIA), and the emergence of a remote and hybrid workforce, organizations must find ways to achieve a balance between enabling collaboration and securing sensitive information. You will discover the seven best practices for compliance with privacy legislation, without sacrificing collaboration.

Webinar: Stop the Top 10 Data Loss Scenarios
Since the onset of COVID-19, companies are reporting sharp increases in data loss spurred by remote and hybrid work. But, just how is all this data leaking with all the security measures enterprises have in place? View this webinar and explore our solutions to the different data loss scenarios that plague most companies.

White Paper: Building Dynamic Information Barriers in Microsoft 365
This white paper examines the challenge of building information barriers using role based security and how to create more usable separation for more complex use cases using dynamic attribute-based access control (ABAC) policies.

Data Sheet: NC Protect Data Connector for Microsoft Sentinel
Microsoft Sentinel is a cloud-native SIEM that you can use for intelligent security analytics across your entire enterprise. The NC Protect Data Connector for Microsoft Sentinel allows you to easily ingest user activity and protection logs and their associated “events” from NC Protect into Microsoft Sentinel.

Technology Brief: Meeting the US Presidential Executive Order for Zero Trust
The new U.S. Presidential Cybersecurity Executive Order for Zero Trust requires US Federal agencies to transition ...

Webinar: 5 Tips to Protect Your Sensitive Data in Nutanix Files
With remote work comes new risks and concerns about how data is accessed and used in cloud sharing apps like ...