archTIS

Barton, Australia
2005
  |  By Eva Galfi
The United States and Australian Governments have established strict regulations to safeguard the technology that can be used for military applications. The most sensitive technology is regulated by the U.S. International Traffic in Arms Regulations (ITAR), and it is imperative for any company working with ITAR-controlled technologies and data to comply with these regulations. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.
  |  By Irena Mroz
One of the biggest issues facing government and industry is how to securely share sensitive and classified information. While information sharing and collaboration have tremendous benefits for productivity and service outcomes, they do come with risks. A dynamic, data-centric approach is key to securing sensitive information and achieving compliance.
  |  By Kurt Mueffelmann
archTIS is pleased to announce it is a Compliance & Privacy Trailblazer award finalist in the 2024 Microsoft Security Excellence Awards. The company was honored among a global field of industry leaders that demonstrated success across the security landscape during the past 12 months. We are extremely proud to be recognized as a finalist for the Compliance and Privacy Trailblazer award for the second year in a row.
  |  By Irena Mroz
Safeguarding classified information is paramount to the security of any nation and its allies. However, modern collaboration tools and devices have made protecting it more challenging without the proper guardrails. Understanding classified information handling requirements and the technologies that can help enforce these obligations are the keys to preventing unauthorised access, dissemination and exposure of classified information.
  |  By Irena Mroz
The United States government has established strict regulations to safeguard intellectual property and military superiority. Compliance with the International Traffic in Arms Regulations (ITAR) is imperative for companies involved with U.S. defense technologies and data. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.
  |  By Rod Bernabe
Modern enterprises are increasingly relying on cloud collaboration to enhance their business productivity, efficiency, and communication. While these cloud-based solutions offer numerous benefits, they also come with a range of potential security risks. Among these risks, enterprise SharePoint security concerns are some of the most significant. It is essential to adopt best practices that can mitigate these risks and safeguard your organization’s valuable data and assets.
  |  By Irena Mroz
NIST SP 800-162 ‘Guide to Attribute Based Access Control (ABAC) Definition and Considerations’ is a special publication that defines attribute-based access control (ABAC) for U.S. government agencies. It also provides guidance on using ABAC to improve and maintain control of information sharing within and between organizations and best practices for ABAC implementations.
  |  By Tony Howell
The newly unveiled 2023-2030 Australian Cyber Security Strategy (the Strategy) lays out six cyber shields to achieve the Australian Government’s goal of becoming a world leader in cyber security by 2030. It aims to substantially improve the country’s overall cyber security posture, the ability to manage cyber risks and respond to cyberattacks quickly.
  |  By Irena Mroz
Protecting intellectual property (IP) and trade secrets is critical to a company’s bottom line. Keeping IP and sensitive business-critical information within the confines of the company and its employees is not always possible, especially in the manufacturing industry. Vendors must often share previews of new products with retailers and distribution partners before release.
  |  By Rod Bernabe
Regularly reviewing user permissions is important to reduce the risk of data overexposure and breaches. Overpermissioned users pose a significant security risk. Restricting access to only necessary information for individuals to perform their jobs can significantly reduce risk. By conducting regular permissions audits in Microsoft 365 and SharePoint, organizations can ensure that sensitive information access remains appropriate, safe and secure.
  |  By archTIS
Kojensi from archTIS is a highly secure, multi-level security platform for the secure sharing and collaboration of sensitive and classified files. By taking a data-centric, zero trust security approach, a file’s attributes such as security classification, organisation and country releasability, determine who is able to access, edit and download the file. Kojensi users can create, co-author and share documents in real-time, all in a secure and intuitive platform that ensure sensitive information remains need to know only.
  |  By archTIS
Empower your organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC, and ITAR for information security. archTIS’ zero trust attribute-based access control (ABAC) powered information security solutions for public sector enhance native security capabilities to empower secure collaboration within your agency, with other agencies, defense, multinational coalitions and supply chain partners.
  |  By archTIS
The complete portfolio of archTIS solutions, including NC Protect and Kojensi, leverage a data-centric, attribute-based access control (ABAC) methodology to ensure the highest levels of data protection. Watch this video to learn about the advantages of using ABAC-enabled access and data protection policies to safeguard sensitive data.
  |  By archTIS
Empower your agency to take advantage of all the productivity and collaboration capabilities the Microsoft 365, Teams and SharePoint Server have to offer with zero trust ABAC powered information security from NC Protect.
  |  By archTIS
NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.
  |  By archTIS
Discover, Classify, and Protect your most Sensitive data. Find critical data in local and remote file shares such as Microsoft SharePoint, Office 365, AWS or Azure and create custom sensitive data rules to locate and classify intellectual property and other sensitive data specific to your business.
  |  By archTIS
Data protection, encryption and compliance for Microsoft platforms: SharePoint, Office 365, OneDrive and more. Instantly encrypt SharePoint data and keep it protected no matter where it is stored or how it is used: in use, in flight, and at rest.
  |  By archTIS
Organizations have sensitive data spread across on-premises and cloud based platforms. This present a major challenge for IT to ensure data integrity and security. NC Protect is both content and context aware to automatically find, classify and secure unstructured data on-premises, in the cloud and in hybrid environments.
  |  By archTIS
See how NC Protect provides Nutanix Files users unmatched information protection capabilities to prevent accidental sharing, data misuse and loss, while maintaining a simple and intuitive user experience that empowers customers to start securing information in hours, not days or weeks.
  |  By archTIS
NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.
  |  By archTIS
Now more than ever the Boardroom, Chief Executive Officer and Chief Information Officer have information security front of mind and keeping them awake at night. Every day a new attack, incident or vulnerability is announced that has a significant impact on reputation, compliance, cost or service delivery. Chief Information Security Officers must now adapt to this changing landscape and lead their organizations to adopt new security methodologies to both protect and enable their data whenever and wherever it is required in a cost effective, risk managed way. So how do they achieve it?
  |  By archTIS
Business demands information management that meets their needs. From an IT perspective, it means that stakeholders are demanding access to information services that reach far beyond the boundaries of the organisation. At the same time, they are also expecting the IT department to protect their high-value information assets and intellectual property. How can you ensure that enabling remote and mobile access to your protected information services will not compromise your high-value information assets?
  |  By archTIS
Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).
  |  By archTIS
Information barriers that were once relegated to financial services and regulatory compliance are quickly becoming a must have to accommodate a variety of business scenarios. The art of running a business is a forever evolving path of goldmines and hurdles. Trying to map these business processes over current technology, is challenging at best and extremely difficult to achieve for all elements and viewpoints of business workflows.
  |  By archTIS
The U.S. Government requires all manufacturers, importers, exporters, and brokers of defence articles, defence services or related technical information to meet International Traffic in Arms Regulations (ITAR) compliance. Applying these regulations to your business and to those within the greater supply chain introduces additional costs, rigor, and complexity into your processes. This whitepaper introduces 5 essential checkpoints of ITAR and provides strategies to assist with compliance and cyber resilience.

archTIS Limited (ASX:AR9, OTCQB:ARHLF) is a global provider of innovative software solutions for the secure collaboration of sensitive information. The company’s award-winning data-centric information security solutions protect the world’s most sensitive content in government, defence, supply chain, enterprises and regulated industries through attribute-based access and control (ABAC) policies. archTIS products include Kojensi, a multi-government certified platform for the secure access, sharing and collaboration of sensitive and classified information; and NC Protect and the cp. suite of products for enhanced information protection for file access and sharing, messaging and emailing of sensitive and classified content across Microsoft 365 apps, Dropbox, Nutanix Files and Windows file shares. For more information visit archtis.com or follow @arch_tis.