Resource Center

All Resources     |     Kojensi Resources     |     NC Protect Resources

Video: NC Protect for Microsoft Teams

Video: NC Protect for Microsoft Teams

See how NC Protect offers a simpler, faster and easier way to ensure secure collaboration in Microsoft Teams. 
Video: NC Protect Integration with Azure Information Protection

Video: NC Protect Integration with Azure Information Protection

Learn how Microsoft Information Protection sensitivity labels combined with NC Protect’s dynamic access and secure collaboration rules give you expanded protection and control over all your M365 collaboration.
Video: NC Protect for Nutanix Files Overview

Video: NC Protect for Nutanix Files Overview

See how NC Protect provides Nutanix Files users with unmatched information protection capabilities to prevent accidental sharing, data misuse and loss.
Webinar: 5 Tips for Securing Guest Access in Microsoft Teams

Webinar: 5 Tips for Securing Guest Access in Microsoft Teams

This on demand webinar provides valuable information on the challenges, best practices and tools to Secure Guest Access in Teams.
Webinar: 4 Tips for Securing Information in Microsoft Teams

Webinar: 4 Tips for Securing Information in Microsoft Teams

This on demand webinar provides the four critical steps for information security in Teams and steps to reduce accidental or malicious exposure of business-critical information during collaboration.
Webinar: 5 Must Haves for Microsoft Teams Adoption and Data Security

Webinar: 5 Must Haves for Microsoft Teams Adoption and Data Security

This recorded webinar provides guidance on how to roll out a Teams intranet with governance and data security built-in from the start to guarantee adoption and secure collaboration. 
Webinar: Understanding Insider Threats and 4 Ways to Stop Them

Webinar: Understanding Insider Threats and 4 Ways to Stop Them

Watch this recorded webinar to learn the Key findings of the 2019 Insider Threat Report and four steps you can take to protect your content from insider threats.
Webinar: 3 Flaws of Protecting File Share Data with ACLs and Permissions

Webinar: 3 Flaws of Protecting File Share Data with ACLs and Permissions

Watch this recorded webinar to learn the challenges, best practices and more effective tools to properly secure file share data. 
archTIS Delivers Australian Sovereign Cloud computing to the edge of the battlespace

archTIS Delivers Australian Sovereign Cloud computing to the edge of the battlespace

Live from Land Forces 2021 archTIS CEO Daniel Lai discusses the company's partnership with Thales as part of the Nexium Defence Cloud Edge offering.
Whitepaper: Enabling Trusted Information Sharing

Whitepaper: Enabling Trusted Information Sharing

When it comes to data security, trust alone is not viable option to combat modern threats including hackers, malware, nation-state threats—even our ‘trusted insiders’. archTIS explores this issue and modern security approaches.
Kojensi Enterprise

Kojensi Enterprise

Learn about Kojensi Enterprise, a Multi-Level Security platform for Defence, Government and Industry to share and manage highly classified information.
Kojensi Field

Kojensi Field

Kojensi Field is a field deployable Multi-Level Security platform to share and manage highly classified information.
Kojensi Cloud Service

Kojensi Cloud Service

Learn about Kojensi Cloud Service, a government accredited cloud service for Government, Defence and their industry partners to share and manage PROTECTED information.
Guiding and Managing the Implementation of Attribute Based Access Control

Guiding and Managing the Implementation of Attribute Based Access Control

Discover how when implemented as part of a broader assured identity and information sharing capability, ABAC enables fine-grained, dynamic access control that supports the secure sharing of information within and between organisations.
Maximising the Value of Classified Information

Maximising the Value of Classified Information

Download this white paper to learn more about building a secure, trusted information sharing framework for classified information.
Secure Collaboration: Bringing Business, Information Management and Security Together

Secure Collaboration: Bringing Business, Information Management and Security Together

The risks involved in sharing are often seen to outweigh the benefits: sensitive information could be exposed, financial data stolen, a competitive advantage or even a reputation lost. Discover how to ensure secure information sharing.