archTIS
  • Products and Services
    • Kojensi
    • NC Protect
      • NC Protect Overview
      • NC Protect for Microsoft 365 & SharePoint Online
      • NC Protect for SharePoint On-premises
      • NC Protect for Microsoft Teams
      • NC Protect for Yammer
      • NC Protect for Dropbox
      • NC Protect for File Shares
      • NC Protect for Nutanix Files
      • M365 & SharePoint Solutions for Public Sector & Defense
    • Partner Products
    • Services Overview
  • Solutions
    • Kojensi Use Cases
      • Government
      • Defence Industry
      • Defense CMMC/NIST
      • Intelligence
      • Multinational Coalition
      • Universities
    • NC Protect Use Cases
      • Discover & Classify Data
      • Audit and Track Sensitive Data Access
      • CMMC & NIST Compliance
      • Information Barriers
      • Guest Access
      • ITAR & EAR Compliance
      • Secure Watermarks
      • Privacy Compliance
      • Restrict File Access
      • Secure Email
      • Microsoft Teams Collaboration
  • Resources
    • What is ABAC?
    • Resource Center
    • Support
    • Events
    • Blog
  • Newsroom
    • Press Releases
    • In The News
  • Company
    • About archTIS
    • Executive Team
    • Board of Directors
    • Our Partners
    • Careers
  • Investor Relations
  • Contact
Select Page
Preventing Trade Secret Theft: Examining the Anthony Levandowski Case

Preventing Trade Secret Theft: Examining the Anthony Levandowski Case

by Irena Mroz | Sep 5, 2019 | Blog

Trade Secret Theft In the Spotlight Over Stolen Google IP The indictment of Anthony Levandowski on 33 charges related to trade secret theft and subsequent outcome of the criminal proceedings could have big ramifications for technology and other industries. Most in...
Defining Sensitive Data to Protect Your Organization’s Critical Assets

Defining Sensitive Data to Protect Your Organization’s Critical Assets

by Irena Mroz | Jun 13, 2019 | Blog

What Do We Mean When We Say Sensitive Data? At Nucleus Cyber we spend a lot of our time talking about sensitive data. This shouldn’t be a huge surprise given that we are in the business of providing data-centric solutions to protect your sensitive data. But just what...
Box Data Leaks – Location-Based Security Failure Impacts 90 Companies

Box Data Leaks – Location-Based Security Failure Impacts 90 Companies

by Irena Mroz | Mar 14, 2019 | Blog

3 Reasons security based on location in not good enough Another day, another data leak with the sensitive corporate and customer data from over 90 companies, including Apple, Box and Discovery Network, exposed due to the incorrect use of public sharing links in the...

Subscribe Now

Latest Blogs

  • DFARS Compliance in Microsoft 365
  • Introducing NC Protect’s New CUI Designator Labelling Capability for US Defense Requirements
  • Join archTIS at Eurosatory in Paris and Infosecurity Europe in the UK this June
  • NC Protect is now available in both Microsoft Azure Marketplace and Azure Government Marketplace!

Latest Press Releases

  • archTIS NC Protect Scores High Marks in KuppingerCole 2022 Secure Collaboration Market Compass Report
  • archTIS Announces New CUI Designator Labelling Capability for US Defense Requirements
  • archTIS NC Protect Now Available in the Microsoft Azure Marketplace
  • archTIS Announces May 5th Cybersecurity Summit Featuring Prominent Government and Defense Industry Thought Leaders
  • Follow
  • Follow
  • Follow

© 2022 archTIS Limited

Products & Services

  • Kojensi
  • NC Protect
  • Axiomatics
  • Appsian
  • Services
  • Support

Our Expertise

  • Resources
  • Attribute Based Access Control
  • Blog
  • Press Releases
  • Events
  • In The News
  • Information Barriers
  • Zero Trust

Company

  • About archTIS
  • Executive Team
  • Board of Directors
  • Our Partners
  • Careers
  • Privacy Policy
  • Terms and Conditions

Investor Relations

Contact Us

Level 3
10 National Circuit
Barton ACT 2600
Australia
info@archtis.com
+61 2 6273 9932