archTIS
  • Products and Services
    • Kojensi
    • NC Protect
      • NC Protect Overview
      • NC Protect for Microsoft 365 & SharePoint Online
      • NC Protect for SharePoint On-premises
      • NC Protect for Microsoft Teams
      • NC Protect for Yammer
      • NC Protect for Dropbox
      • NC Protect for File Shares
      • NC Protect for Nutanix Files
      • NC Protect Data Connector for Microsoft Sentinel
      • M365 & SharePoint Solutions for Government & Defense
    • NC Encrypt
    • Partner Products
    • Services Overview
  • Solutions
    • Kojensi Use Cases
      • Government
      • Australian Defence DISP/PSPF/ISM
      • US Defense ITAR/CMMC/NIST
      • Intelligence
      • Multinational Coalition
      • Critical Infrastructure (SLACIP)
      • Universities
    • NC Protect Use Cases
      • Audit and Track Sensitive Data Access
      • CMMC & NIST Compliance
      • Discover & Classify Data
      • Data Encryption
      • Document Redaction
      • Email Encryption
      • File Integrity
      • Guest Access
      • Information Barriers
      • ITAR & EAR Compliance
      • Microsoft Teams Collaboration
      • Privacy Compliance
      • Restrict File Access
      • Secure Watermarks
  • Resources
    • Blog
    • Events
    • Resource Center
    • Support
    • What is ABAC?
  • Newsroom
    • Press Releases
    • In The News
  • Company
    • About archTIS
    • Board of Directors
    • Executive Team
    • Careers
    • Our Partners
  • Investor Relations
  • Contact
Select Page
Defining Sensitive Data to Protect Your Organization’s Critical Assets

Defining Sensitive Data to Protect Your Organization’s Critical Assets

by Irena Mroz | Jun 13, 2019 | Blog

What Do We Mean When We Say Sensitive Data? At Nucleus Cyber we spend a lot of our time talking about sensitive data. This shouldn’t be a huge surprise given that we are in the business of providing data-centric solutions to protect your sensitive data. But just what...
Breaches Highlight Why Password Protecting Systems Alone Falls Short

Breaches Highlight Why Password Protecting Systems Alone Falls Short

by Irena Mroz | May 2, 2019 | Blog

Secure Locations Alone Don’t Protect Sensitive Data Another day and yet another example of a company failing to provide any protection to sensitive data beyond passwords to access it. In this case it was, ironically, Citrix – a technology company whose own...

Subscribe Now

Latest Blogs

  • BYOD Security: Using ABAC to Manage Access to Sensitive Data
  • Understanding Australia’s SLACIP and SoNS Requirements for Critical Infrastructure
  • Preventing the Theft of IP and Military Secrets
  • Make Zero Trust Data Access Your New Year’s Resolution

Latest Press Releases

  • archTIS NC Protect Named “Policy Management Solution of the Year” in 6th Annual CyberSecurity Breakthrough Awards Program
  • archTIS Launches NC Encrypt to Address Growing Demand for Independent Encryption Key Management
  • archTIS Named 2022 Cyber Business of the Year at the Australian Defence Industry Awards
  • archTIS Expands Strategic Partner Network in Asia
  • Follow
  • Follow
  • Follow

© 2023 archTIS Limited

Products & Services

  • Kojensi
  • NC Protect
  • NC Encrypt
  • Partner Products
  • Services
  • Support
  • Terms and Conditions

Resources

  • Attribute Based Access Control
  • Blog
  • Events
  • In The News
  • Press Releases
  • Resources

Company

  • About archTIS
  • Executive Team
  • Board of Directors
  • Our Partners
  • Careers
  • Privacy Policy

Investor Relations

Contact Us

Level 3
10 National Circuit
Barton ACT 2600
Australia
info@archtis.com
+61 2 6273 9932