White Paper: Secure Collaboration – The Impossible Paradox
Despite best efforts, the security solutions in use today are only partially effective at protecting sensitive data. A new approach is clearly needed. Explore a more effective data-centric approach to tackling data security.
White Paper: 5 Data Security Challenges to Modern Collaboration
Get our tips for balancing security and collaboration needs as cybersecurity threats have increased and data protection regulations have evolved.
Video: NC Protect for Microsoft 365
See how NC Protect’s advanced information protection capabilities prevent data breaches, unauthorized file access and accidental sharing in M365 apps, Windows File Shares and more — simpler, faster and cheaper.
Video: NC Protect for Microsoft Teams
See how NC Protect offers a simpler, faster and easier way to ensure secure collaboration in Microsoft Teams.
Video: NC Protect Integration with Microsoft Information Protection
Learn how Microsoft Information Protection sensitivity labels combined with NC Protect’s dynamic access and secure collaboration rules give you expanded protection and control over all your M365 collaboration.
Video: NC Protect for Nutanix Files Overview
See how NC Protect provides Nutanix Files users with unmatched information protection capabilities to prevent accidental sharing, data misuse and loss.
Webinar: 5 Tips for Securing Guest Access in Microsoft Teams
This on demand webinar provides valuable information on the challenges, best practices and tools to Secure Guest Access in Teams.
Webinar: 4 Tips for Securing Information in Microsoft Teams
This on demand webinar provides the four critical steps for information security in Teams and steps to reduce accidental or malicious exposure of business-critical information during collaboration.
Webinar: 5 Must Haves for Microsoft Teams Adoption and Data Security
This recorded webinar provides guidance on how to roll out a Teams intranet with governance and data security built-in from the start to guarantee adoption and secure collaboration.
Webinar: Understanding Insider Threats and 4 Ways to Stop Them
Watch this recorded webinar to learn the Key findings of the 2019 Insider Threat Report and four steps you can take to protect your content from insider threats.
Webinar: 3 Flaws of Protecting File Share Data with ACLs and Permissions
Watch this recorded webinar to learn the challenges, best practices and more effective tools to properly secure file share data.
archTIS Delivers Australian Sovereign Cloud computing to the edge of the battlespace
Live from Land Forces 2021 archTIS CEO Daniel Lai discusses the company's partnership with Thales as part of the Nexium Defence Cloud Edge offering.
Data Sheet: Kojensi Enterprise
Learn about Kojensi Enterprise, a Multi-Level Security platform for Defence, Government and Industry to share and manage highly classified information.
Data Sheet: Kojensi Field
Kojensi Field is a field deployable Multi-Level Security platform to share and manage highly classified information.
Data Sheet: Kojensi SaaS
Learn about Kojensi SaaS, a government accredited cloud service for Government, Defence and their industry partners to share and manage PROTECTED information.
Maximising the Value of Classified Information
Download this white paper to learn more about building a secure, trusted information sharing framework for classified information.