archTIS
  • Products
    • Kojensi
    • Spirion
      • Sensitive Data Platform
      • Sensitive Data Finder
      • Sensitive Data Watcher
      • Sensitive Data Manager
    • NC Protect
      • NC Protect Overview
      • NC Protect for Microsoft 365
      • NC Protect for SharePoint On-premises
      • NC Protect for File Shares
      • NC Protect for Nutanix Files
      • NC Protect for NetApp ONTAP
      • NC Encrypt
      • Data Connector for Microsoft Sentinel
      • NC Protect for Government & Defense
      • NC Protect Integrations
    • Trusted Data Integration
      • Security Policy Orchestration
      • Service Orchestration
  • Solutions
    • Kojensi Use Cases
      • Government
      • Australian Defence DISP/PSPF/ISM
      • US Defense ITAR/Export Controls
      • Intelligence
      • Multinational Coalition
      • Critical Infrastructure (SLACIP)
      • Universities
    • NC Protect Use Cases
      • Audit and Track Sensitive Data Access
      • CMMC & NIST Compliance
      • Data Encryption
      • Guest Access
      • Information Barriers
      • ITAR & EAR Compliance
      • Multi-label Classification for M365
      • Privacy Compliance
      • Restrict File Access
      • Secure Watermarks
    • TDI USE CASES
      • Security Policy Orchestration
      • Service Orchestration
  • Resources
    • Blog
    • Events
    • Resource Center
    • What is ABAC?
  • Support & Services
    • Support
    • Services
  • Company
    • About archTIS
    • Board of Directors
    • Executive Team
    • Careers
    • Newsroom
      • Press Releases
      • Media Coverage
    • Partners
  • Investor
  • Contact
Select Page
As seen in VM Blog: Sharing Data Inside and Outside of the (Drop)Box

As seen in VM Blog: Sharing Data Inside and Outside of the (Drop)Box

by Irena Mroz | Sep 27, 2019 | Blog

This article originally appeared in VM blog By: Dr. Steve Marsh, VP of Product, Nucleus Cyber  Cloud based collaboration tools, like Dropbox, are one of the best and worst things to happen to business collaboration. Ironically, the ease of which users can share files...

Subscribe Now

Latest Blogs

  • 2025 Compliance Changes Review — What Organizations Must Know
  • 2025 Data Security Insights and Resources to Prepare for 2026
  • Season’s Greetings from the archTIS family to yours!
  • Navigating Security Clearance Portability in a Zero Trust World

Latest Press Releases

  • archTIS Unveils the Next Generation of NC Protect for Microsoft 365
  • archTIS Acquires U.S. Data Security Firm Spirion to Accelerate Global Expansion and Expand Data-Centric Security Offering
  • archTIS Named a 2025 Australian Defence Industry Awards Finalist for Cyber Business of the Year
  • archTIS Completes Asset Acquisition of Direktiv to Expand Market Innovation Across Data-centric Zero Trust Product Lines
  • Follow
  • Follow
  • Follow
  • Follow

© 2025 archTIS Limited

Products & Services

  • Kojensi
  • NC Protect
  • NC Encrypt
  • Spirion
  • Trusted Data Integration
  • Services
  • Support

Resources

  • Attribute Based Access Control
  • Blog
  • Events
  • Media Coverage
  • Press Releases
  • Resources

Company

  • About archTIS
  • Executive Team
  • Board of Directors
  • Our Partners
  • Careers
  • Privacy Policy

Contact

Contact Us

Investor Relations