archTIS
  • Products
    • Kojensi
    • NC Protect
      • NC Protect Overview
      • NC Protect for Microsoft 365
      • NC Protect for SharePoint On-premises
      • NC Protect for File Shares
      • NC Protect for Nutanix Files
      • NC Protect for NetApp ONTAP
      • Data Connector for Microsoft Sentinel
      • NC Protect for Government & Defense
      • NC Protect Integrations
    • NC Encrypt
    • Trusted Data Integration
  • Solutions
    • Kojensi Use Cases
      • Government
      • Australian Defence DISP/PSPF/ISM
      • US Defense ITAR/Export Controls
      • Intelligence
      • Multinational Coalition
      • Critical Infrastructure (SLACIP)
      • Universities
    • NC Protect Use Cases
      • Audit and Track Sensitive Data Access
      • CMMC & NIST Compliance
      • Data Encryption
      • Document Redaction
      • Email Encryption
      • File Integrity
      • Guest Access
      • Information Barriers
      • ITAR & EAR Compliance
      • Multi-label Classification for M365
      • Privacy Compliance
      • Restrict File Access
      • Secure Watermarks
  • Resources
    • Blog
    • Events
    • Resource Center
    • What is ABAC?
  • Support & Services
    • Support
    • Services
  • Company
    • About archTIS
    • Board of Directors
    • Executive Team
    • Careers
    • Newsroom
      • Press Releases
      • Media Coverage
    • Partners
  • Investors
  • Contact
Select Page
Preventing Trade Secret Theft: Examining the Anthony Levandowski Case

Preventing Trade Secret Theft: Examining the Anthony Levandowski Case

by Irena Mroz | Sep 5, 2019 | Blog

Trade Secret Theft In the Spotlight Over Stolen Google IP The indictment of Anthony Levandowski on 33 charges related to trade secret theft and subsequent outcome of the criminal proceedings could have big ramifications for technology and other industries. Most in...
Defining Sensitive Data to Protect Your Organization’s Critical Assets

Defining Sensitive Data to Protect Your Organization’s Critical Assets

by Irena Mroz | Jun 13, 2019 | Blog

What Do We Mean When We Say Sensitive Data? At Nucleus Cyber we spend a lot of our time talking about sensitive data. This shouldn’t be a huge surprise given that we are in the business of providing data-centric solutions to protect your sensitive data. But just what...
Box Data Leaks – Location-Based Security Failure Impacts 90 Companies

Box Data Leaks – Location-Based Security Failure Impacts 90 Companies

by Irena Mroz | Mar 14, 2019 | Blog

3 Reasons security based on location in not good enough Another day, another data leak with the sensitive corporate and customer data from over 90 companies, including Apple, Box and Discovery Network, exposed due to the incorrect use of public sharing links in the...

Subscribe Now

Latest Blogs

  • Data Loss Prevention Guide for Microsoft 365 and SharePoint
  • Transforming Defence Information Sharing & Collaboration with Zero Trust Solutions
  • Understanding the U.S. Cloud Act: Impact on Compliance, Agreement, and Data Protection
  • What is FIPS 140-3?

Latest Press Releases

  • archTIS Named a 2025 Australian Defence Industry Awards Finalist for Cyber Business of the Year
  • archTIS Completes Asset Acquisition of Direktiv to Expand Market Innovation Across Data-centric Zero Trust Product Lines
  • archTIS Achieves JOSCAR-AU Registration to Streamline Defence and Aerospace Procurement Processes
  • Introducing the archTIS Trusted Data Integration Solution for Sensitive and Classified Structured Data
  • Follow
  • Follow
  • Follow
  • Follow

© 2025 archTIS Limited

Products & Services

  • Kojensi
  • NC Protect
  • NC Encrypt
  • Services
  • Support

Resources

  • Attribute Based Access Control
  • Blog
  • Events
  • Media Coverage
  • Press Releases
  • Resources

Company

  • About archTIS
  • Executive Team
  • Board of Directors
  • Our Partners
  • Careers
  • Privacy Policy

Contact

Contact Us

Investor Relations