Resource Center

Filter by

All Resources     |     Kojensi Resources     |     NC Protect Resources

White Paper: Understanding and Meeting DISP Information Security Requirements

White Paper: Understanding and Meeting DISP Information Security Requirements

Understanding the complexities of DISP can be daunting. This white paper helps outline information and cyber security requirements and provides strategies to quickly increase compliance and cyber resiliency.
Data Sheet: Kojensi for DISP Information Security Compliance

Data Sheet: Kojensi for DISP Information Security Compliance

Governance is critical to DISP accreditation, however, enforcing these guidelines is another matter. Built into ...
Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Case Study: Architecting the Single Information Environment Security Architecture (SIESA)

Learn about the award-winning Security Architecture for the Australian Department of Defence (Defence) Single Information Environment Security Architecture (SIESA).
Case Study: archTIS Implements Ship Maintenance Portal for Royal Australian Navy

Case Study: archTIS Implements Ship Maintenance Portal for Royal Australian Navy

Learn how archTIS empowered the Navy to adopt a superior method of managing and collaborating on multiple sources of logistics and engineering data, supporting contracts and contract data.
Video: archTIS Company Overview

Video: archTIS Company Overview

Meet archTIS the company trusted with the world's most sensitive information. Get to know archTIS, what we do and the markets we serve in this quick company introduction.
Video: Kojensi

Video: Kojensi

Ensure your users and partners access, share and collaborate on sensitive, classified and top secret information—securely. Watch this video to see how Kojensi provides accredited classified information sharing and collaboration out-of-the-box.
Data Sheet: NC Protect for Office 365 & SharePoint

Data Sheet: NC Protect for Office 365 & SharePoint

With modern collaboration apps, users can access data from an alarming variety of locations. Between Azure, Office 365 and other cloud platforms, businesses are adopting new technologies faster than ever and data loss prevention methodology needs to keep up.
Data Sheet: NC Protect and Microsoft Purview Information Protection (MIP) Integration

Data Sheet: NC Protect and Microsoft Purview Information Protection (MIP) Integration

NC Protect leverages key Microsoft Purview Information Protection (MPIP) extensibility capabilities to provide fine-grained, data-centric security for collaboration in Microsoft 365 applications. By combining MPIP sensitivity labels with NC Protect’s dynamic attribute-based access control (ABAC) and protection policies customers will benefit from expanded protection and control over information access, collaboration and sharing. Learn more about the integration.
Data Sheet: NC Protect for Microsoft Teams

Data Sheet: NC Protect for Microsoft Teams

With over 115M users, the ability to quickly share information via built-in chat and file sharing capabilities has rapidly made Microsoft Teams a key collaboration app for organizations.
Data Sheet: NC Protect for Yammer

Data Sheet: NC Protect for Yammer

The nature of collaboration is changing. With social collaboration tools like Yammer we can now improve engagement across our entire organization making it easier than every before to communicate with a wide audience, and share and collaborate on files.
Datasheet: NC Protect for Dropbox

Datasheet: NC Protect for Dropbox

The nature of collaboration is changing. Cloud collaboration tools like dropbox make it easier than ever before to store files for easy access across all devices, and share and collaborate with both internal and external users.
Data Sheet: NC Protect for File Shares

Data Sheet: NC Protect for File Shares

The numbers tell the story, 90 percent of data generated today is unstructured (customer purchase history, call center logs, email, spreadsheets, documents, web content, blogs, wikis, etc.). And information velocity is not slowing down with quintillions of bytes of data being created every day.
Data Sheet: NC Protect for Nutanix

Data Sheet: NC Protect for Nutanix

Organizations rely on file storage platforms like Nutanix Files to store and collaborate on unstructured content. And that content is growing quickly.
NC Protect Technical Specifications

NC Protect Technical Specifications

The following technical requirements represent the minimum recommended configuration for installing NC Protect version 8.5. archTIS recognizes that each deployment is different and can advise on how your specific environment should be configured to ensure optimal performance.
Data Sheet: NC Protect Overview

Data Sheet: NC Protect Overview

With modern collaboration apps, users can access data from an alarming variety of locations. Between Azure, Office 365 and other cloud platforms, businesses are adopting new technologies faster than ever and data loss prevention methodology needs to keep up.
White Paper: Top 10 SharePoint Security and Compliance Risks

White Paper: Top 10 SharePoint Security and Compliance Risks

This whitepaper describes 10 risks that are common in SharePoint environments. These risks are ones that we at archTIS have frequently seen in dealing with hundreds of SharePoint users over the past few years, and they are risks that can have serious consequences for organisation if left unmanaged.
NC Protect Customer Success Stories by Industry

NC Protect Customer Success Stories by Industry

See how NC Protect helps customers in every industry secure data and meet compliance.
Case Study: NC Protect Trims Information Sharing Risk in SharePoint for German Insurer BGW

Case Study: NC Protect Trims Information Sharing Risk in SharePoint for German Insurer BGW

Learn how NC Protect enabled BGW to secure SharePoint documents in accordance with their security requirements to mitigate risk and protect documents by limiting users to secure read-only access and eliminating their ability to use certain SharePoint functionality.