Resource Center

All Resources     |     Kojensi Resources     |     NC Protect Resources

2021 State of Remote Work Security Report

2021 State of Remote Work Security Report

The 2021 State of Remote Work Security Report reveals additional insights into the status of organizations’ efforts to secure the new workforce, key challenges and unique security threats, technology gaps and investment priorities.
2019 Insider Threat Report

2019 Insider Threat Report

The 2019 Insider Threat Report from Cybersecurity Insiders reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders and preparing to better protect their critical data and IT infrastructure.
Solution Brief: NC Protect – Adding Value to Microsoft Investments

Solution Brief: NC Protect – Adding Value to Microsoft Investments

Discover why customers rely on NC Protect to enhance and add additional capabilities to their Office 365 apps to safeguard against data loss, misuse, and accidental sharing.
White Paper: Dynamic Data Loss Prevention in SharePoint

White Paper: Dynamic Data Loss Prevention in SharePoint

Enable collaboration without compromising security. Learn how to apply user and file context to drive dynamic, attribute-based data protection to prevent data loss, misuse and accidental sharing.
10 Questions to Assess Information Security Needs in Microsoft Teams

10 Questions to Assess Information Security Needs in Microsoft Teams

Discover if OOTB information security for Microsoft Teams is adequate, or if you need to add a third party solution to get the data protection capabilities needed to suit your business and regulatory requirements.
eBook: 8 Tips to Prevent Oversharing and Insider Threats in Microsoft Teams

eBook: 8 Tips to Prevent Oversharing and Insider Threats in Microsoft Teams

Microsoft Teams can potentially leave you exposed to data breaches from accidental sharing of the wrong files or sharing sensitive info with the wrong Team. Discover 8 tips to collaborate freely without risking your sensitive information.
White Paper: Secure Collaboration – The Impossible Paradox

White Paper: Secure Collaboration – The Impossible Paradox

Despite best efforts, the security solutions in use today are only partially effective at protecting sensitive data. A new approach is clearly needed. Explore a more effective data-centric approach to tackling data security.
White Paper: 5 Data Security Challenges to Modern Collaboration

White Paper: 5 Data Security Challenges to Modern Collaboration

Get our tips for balancing security and collaboration needs as cybersecurity threats have increased and data protection regulations have evolved.
Video: NC Protect for Microsoft 365

Video: NC Protect for Microsoft 365

See how NC Protect’s advanced information protection capabilities prevent data breaches, unauthorized file access and accidental sharing in M365 apps, Windows File Shares and more — simpler, faster and cheaper.
Video: NC Protect for Microsoft Teams

Video: NC Protect for Microsoft Teams

See how NC Protect offers a simpler, faster and easier way to ensure secure collaboration in Microsoft Teams. 
Video: NC Protect Integration with Microsoft Information Protection (MIP)

Video: NC Protect Integration with Microsoft Information Protection (MIP)

Learn how Microsoft Information Protection sensitivity labels combined with NC Protect’s dynamic access and secure collaboration rules give you expanded protection and control over all your M365 collaboration.
Video: NC Protect for Nutanix Files Overview

Video: NC Protect for Nutanix Files Overview

See how NC Protect provides Nutanix Files users with unmatched information protection capabilities to prevent accidental sharing, data misuse and loss.
Webinar: 5 Tips for Securing Guest Access in Microsoft Teams

Webinar: 5 Tips for Securing Guest Access in Microsoft Teams

This on demand webinar provides valuable information on the challenges, best practices and tools to Secure Guest Access in Teams.
Webinar: 4 Tips for Securing Information in Microsoft Teams

Webinar: 4 Tips for Securing Information in Microsoft Teams

This on demand webinar provides the four critical steps for information security in Teams and steps to reduce accidental or malicious exposure of business-critical information during collaboration.
Webinar: 5 Must Haves for Microsoft Teams Adoption and Data Security

Webinar: 5 Must Haves for Microsoft Teams Adoption and Data Security

This recorded webinar provides guidance on how to roll out a Teams intranet with governance and data security built-in from the start to guarantee adoption and secure collaboration. 
Webinar: Understanding Insider Threats and 4 Ways to Stop Them

Webinar: Understanding Insider Threats and 4 Ways to Stop Them

Watch this recorded webinar to learn the Key findings of the 2019 Insider Threat Report and four steps you can take to protect your content from insider threats.
Webinar: 3 Flaws of Protecting File Share Data with ACLs and Permissions

Webinar: 3 Flaws of Protecting File Share Data with ACLs and Permissions

Watch this recorded webinar to learn the challenges, best practices and more effective tools to properly secure file share data. 
archTIS Delivers Australian Sovereign Cloud computing to the edge of the battlespace

archTIS Delivers Australian Sovereign Cloud computing to the edge of the battlespace

Live from Land Forces 2021 archTIS CEO Daniel Lai discusses the company's partnership with Thales as part of the Nexium Defence Cloud Edge offering.