Technology Brief: GDPR Compliance for Microsoft SharePoint Data
Since the introduction of the general data protection regulation (GDPR) in May 2018, organisations have been frantically developing plans to manage copious amounts of structured and unstructured data. Read this Technology Brief to understand how NC Protect can protect your sensitive data in SharePoint and keep you in compliance with GDPR.
Case Study: Australian Dept of Defence – Securing mission critical collaboration in SharePoint Dynamically with ABAC
Learn how the Australian Department of Defence secures the collaboration and sharing of files and prevents accidental data loss while maintaining need to know principles and controlling the releasability of files in SharePoint using NC Protect.
White Paper: Data Classification Guide
This template will help you define the core structure of your data classification policies. It offers a comprehensive overview of what is required from general information about the responsibilities and the terms used, to the detailed explanation of different impact levels and how each level is capable of affecting the organization in question.
KuppingerCole Market Compass Report: Secure Collaboration
Get a copy of the KuppingerCole Market Compass on Secure Collaboration review of NC Protect, which was awarded high marks across every category of the Report for its ability to enable data-centric security to facilitate virtual collaboration in Microsoft cloud, on-premises and hybrid collaboration applications and file shares.
Video: NC Protect – Advanced Data Protection for Government, Defense and Supply Chain Across Microsoft Applications
Empower your organization to take advantage of all the productivity and collaboration capabilities the Microsoft 365, Teams and SharePoint Server have to offer with zero trust ABAC powered information security from NC Protect.
White Paper: Solving Sensitive/Classified Information Sharing & Collaboration Challenges with Kojensi
The archTIS Kojensi platform addresses the long-standing challenge of how to securely collaborate on and share sensitive and classified information within and between organisations. This white paper describes the business problem and use case that Kojensi addresses, and provides an overview of the technology and the security model.
archTIS Defense & DIB Cybersecurity Summit
Access the recording of this live event featuring government and industry cybersecurity experts as they share insights and best practices for addressing evolving information security challenges and requirements in Defense and the Defense Industrial Base (DIB).
Zero Trust A Data-Centric Strategy for Success
This white paper examines the new information security paradigm of zero trust and how to ensure it extends beyond the perimeter and applications to more effectively protect what is most at risk - data.
Presentation: Using Zero Trust to Protect Intellectual Property in Media and Entertainment
Intellectual property (IP) protection is vital to your bottom line. A leaked script, clip or game design can be disastrous to the success of any project. While today’s collaboration tools have made it easier than ever to exchange ideas and information. Learn how applying a Zero trust methodology to data access and sharing can help safeguard your most vital assets.
NC Protect FedRAMP Statement
archTIS has confirmed with the FedRAMP Program Management Office (PMO) that our NC Protect product capabilities do not require FedRAMP certification as the product is not a cloud service. Learn more.
Webinar: CMMC 2.0 – Jumpstart FCI & CUI Protection in Microsoft 365 with Data-centric Zero Trust
Watch this on demand webinar to discover the challenges of implementing mandated best practices for the handling of FCI and CUI to meet CMMC, NIST, and the Zero Trust mandate guidelines, and how to tackle them using data-centric security techniques.
Webinar: Myth Busting ABAC vs RBAC for Effective Data Security
Watch this webinar as we bust some of the common myths about ABAC and RBAC security methods to help you determine the right approach to your data security.
Guiding and Managing the Implementation of Attribute Based Access Control
Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.
Industry Report eBook: Optimize M365 for Controlled Content Services
Microsoft 365 enterprise presence is becoming ubiquitous. According to AIIM research, 93% of organizations ...
Brochure: NC Protect for Government & Defense
Empower your agency or Defense Industry Base (DIB) organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC and ITAR for information security.
Case Study: NC Protect Seamlessly Manages CUI in SharePoint at this Defense Supply Chain Manufacturer
Learn how this Defense manufacturer uses NC Protect to identify and restrict access to Controlled Unclassified Information (CUI) in their SharePoint on-premises environment for ITAR compliance.
Data Sheet: NC Protect for SharePoint Server On-Premises
NC Protect provides advanced data-centric security for SharePoint Server 2010, 2013, 2016 and 2019 on-premises deployments, delivering enhanced information protection for on-premises environments that can be extended to hybrid and cloud M365 deployments should you migrate in the future.
Demo: NC Protect Automates Classification & Compliance
See how NC Protect’s dynamic classification and protection capabilities ensure compliance and secure sharing.