archTIS
  • Products
    • Kojensi
    • Spirion
      • Sensitive Data Platform
      • Sensitive Data Finder
      • Sensitive Data Watcher
      • Sensitive Data Manager
    • NC Protect
      • NC Protect Overview
      • NC Protect for Microsoft 365
      • NC Protect for SharePoint On-premises
      • NC Protect for File Shares
      • NC Protect for Nutanix Files
      • NC Protect for NetApp ONTAP
      • NC Encrypt
      • Data Connector for Microsoft Sentinel
      • NC Protect for Government & Defense
      • NC Protect Integrations
    • Trusted Data Integration
      • Security Policy Orchestration
      • Service Orchestration
  • Solutions
    • Kojensi Use Cases
      • Government
      • Australian Defence DISP/PSPF/ISM
      • US Defense ITAR/Export Controls
      • Intelligence
      • Multinational Coalition
      • Critical Infrastructure (SLACIP)
      • Universities
    • NC Protect Use Cases
      • Audit and Track Sensitive Data Access
      • CMMC & NIST Compliance
      • Dynamic Watermarks
      • Manage Guest Access
      • Information Barriers
      • ITAR & EAR Compliance
      • Policy-based Data Encryption
      • Privacy Compliance
      • Multi-label Classification for M365
      • Restrict File Access
      • Secure File Sharing in Microsoft Teams
    • TDI USE CASES
      • Security Policy Orchestration
      • Service Orchestration
  • Resources
    • Blog
    • Events
    • Resource Center
    • What is ABAC?
  • Support & Services
    • Support
    • Premium Support
    • Services
  • Company
    • About archTIS
    • Board of Directors
    • Executive Team
    • Careers
    • Newsroom
      • Press Releases
      • Media Coverage
    • Partners
  • Investor
  • Contact
Select Page
What is Attribute-Based Access Control or ABAC?

What is Attribute-Based Access Control or ABAC?

by Irena Mroz | Mar 15, 2024 | Blog

One of the biggest issues facing government and industry is how to securely share sensitive and classified information. While information sharing and collaboration have tremendous benefits for productivity and service outcomes, they do come with risks. A dynamic,...

Subscribe Now

Latest Blogs

  • FERPA Compliance in Higher Education: Controlling Access to Student Data
  • Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High
  • The Next Phase of Enterprise Data Security: From Discovery to Control
  • New Integrations with Microsoft Teams and ISEC7 Now Available for NC Protect for M365

Latest Press Releases

  • Latest Release of archTIS’ NC Protect for M365 Introduces New Integrations with Microsoft Teams and ISEC7
  • archTIS Unveils the Next Generation of NC Protect for Microsoft 365
  • archTIS Acquires U.S. Data Security Firm Spirion to Accelerate Global Expansion and Expand Data-Centric Security Offering
  • archTIS Named a 2025 Australian Defence Industry Awards Finalist for Cyber Business of the Year
  • Follow
  • Follow
  • Follow
  • Follow

© 2026 archTIS Limited

Products & Services

  • Kojensi
  • NC Protect
  • NC Encrypt
  • Spirion
  • Trusted Data Integration
  • Services
  • Support

Resources

  • Attribute Based Access Control
  • Blog
  • Events
  • Media Coverage
  • Press Releases
  • Resources

Company

  • About archTIS
  • Executive Team
  • Board of Directors
  • Our Partners
  • Careers
  • Privacy Policy

Contact

Contact Us

Investor Relations