Barton, Australia
Sep 28, 2022   |  By Irena Mroz
The last few years have seen a huge shift in how organizations work with their data. The COVID pandemic accelerated a digital transformation as workers transitioned from the office to home-based and back into hybrid working environments. With this new set-up, collaboration is key to worker efficiency. However, the adoption of Microsoft 365 and Teams as a front-end platform has created new challenges for security teams.
Sep 19, 2022   |  By Irena Mroz
We are pleased to announce the launch of NC Encrypt to provide independent encryption key management and Bring Your Own Key (BYOK) support for Microsoft 365 applications and SharePoint Server environments. The sheer number of communication and collaboration channels the M365 platform has introduced, increases the vulnerability of sensitive data and potential for accidental data loss or overexposure, making protection mechanisms such as encryption critical.
Sep 8, 2022   |  By Dave Matthews
Demands on data have created a host of challenges for security and administration, and traditional tools are not keeping up. As we expand collaboration and business activities outside the office, data moves more widely and user permissions expand with every responsibility or team project. Keeping ahead of this permission burden is tough yet necessary for zero trust “don’t trust, verify” security.
Sep 1, 2022   |  By Irena Mroz
The US Department of Defense (DoD) initiative to adopt the Executive Order for Zero Trust is heating up. This week the Pentagon’s CIO, John Sherman, announced plans to implement a zero trust architecture agency-wide within the next 5 years – by 2027. To support this initiative, he plans to announce a new strategy next month to help meet the ambitious deadline for an agency of over 4 million people.
Aug 24, 2022   |  By Dave Matthews
Many organizations want to leverage encryption in their environments. This usually starts off with encrypting data and devices that physically leave the organization. External USB drives with encryption or internal drive encryption on laptops using BitLocker for example. We have all heard stories of secret government documentation being left behind on the train or a laptop with employee information being left in a Taxi while traveling.
Aug 17, 2022   |  By Irena Mroz
We’re pleased to announced the release of Kojensi SaaS v2.0 to ensure secure document collaboration and sharing of sensitive and Export Controlled content between Government, Defence, Defence supply chain, and higher education institutions. This new release assists organisations with meeting strict regulatory guidelines and compliance obligations for secure information sharing.
Aug 11, 2022   |  By Irena Mroz
While the Singapore Personal Data Protection Act (PDPA) 2020 Amendment phases came into effect on Feb 1, 2021, starting on October 1, 2022, the maximum financial penalty for breaches of PDPA will be increased. Here’s what you need to know for the next phase of PDPA and how to ensure your information security practices are compliant to avoid penalties.
Aug 4, 2022   |  By Jeff Melnick
With the introduction of various compliance requirements such as HIPAA, PCI and GDPR (just to name a few from around the world), there is an increasing need for organizations to determine where their sensitive data is located, secure access to it and protect it accordingly. There are many products that incorporate the ability to Discover and Classify data. NC Protect is no different.
Jul 21, 2022   |  By Irena Mroz
In July, the Pentagon’s acquisition office issued a memo reminding acquisition officials of the DoD’s requirements for handling controlled unclassified information (CUI). The standard which applies Defence contractors is not new. The original Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 requirement went into effect in 2017.
Jul 13, 2022   |  By Irena Mroz
All information is an attractive target for bad actors, but some is inherently more valuable than others. State-sponsored and hacktivist attacks constantly probe enterprise networks seeking to identify the location of sensitive information. Attackers historically targeted core enterprise systems but as the defenses for those systems have matured, attackers now target the same information but in less secured unstructured (broadly speaking, file and email based) repositories.
Aug 18, 2022   |  By archTIS
Empower your agency to take advantage of all the productivity and collaboration capabilities the Microsoft 365, Teams and SharePoint Server have to offer with zero trust ABAC powered information security from NC Protect.
Nov 15, 2021   |  By archTIS
NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.
Nov 11, 2021   |  By archTIS
Discover, Classify, and Protect your most Sensitive data. Find critical data in local and remote file shares such as Microsoft SharePoint, Office 365, AWS or Azure and create custom sensitive data rules to locate and classify intellectual property and other sensitive data specific to your business.
Nov 11, 2021   |  By archTIS
Data protection, encryption and compliance for Microsoft platforms: SharePoint, Office 365, OneDrive and more. Instantly encrypt SharePoint data and keep it protected no matter where it is stored or how it is used: in use, in flight, and at rest.
Aug 13, 2021   |  By archTIS
Organizations have sensitive data spread across on-premises and cloud based platforms. This present a major challenge for IT to ensure data integrity and security. NC Protect is both content and context aware to automatically find, classify and secure unstructured data on-premises, in the cloud and in hybrid environments.
Aug 13, 2021   |  By archTIS
See how NC Protect provides Nutanix Files users unmatched information protection capabilities to prevent accidental sharing, data misuse and loss, while maintaining a simple and intuitive user experience that empowers customers to start securing information in hours, not days or weeks.
Aug 13, 2021   |  By archTIS
NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.
Jun 7, 2021   |  By archTIS
Live from Land Forces 2021 archTIS CEO Daniel Lai discusses the company's partnership with Thales as part of the Nexium Defence Cloud Edge offering.
May 13, 2021   |  By archTIS
SENSITIVE AND CLASSIFIED INFORMATION, SHARED SECURELY archTIS solutions apply and enforce dynamic, policy-driven access controls that leverage both user and data attributes to ensure your users and partners access, share and collaborate on sensitive, classified and top secret information—securely.
May 19, 2022   |  By archTIS
Now more than ever the Boardroom, Chief Executive Officer and Chief Information Officer have information security front of mind and keeping them awake at night. Every day a new attack, incident or vulnerability is announced that has a significant impact on reputation, compliance, cost or service delivery. Chief Information Security Officers must now adapt to this changing landscape and lead their organizations to adopt new security methodologies to both protect and enable their data whenever and wherever it is required in a cost effective, risk managed way. So how do they achieve it?
May 19, 2022   |  By archTIS
Business demands information management that meets their needs. From an IT perspective, it means that stakeholders are demanding access to information services that reach far beyond the boundaries of the organisation. At the same time, they are also expecting the IT department to protect their high-value information assets and intellectual property. How can you ensure that enabling remote and mobile access to your protected information services will not compromise your high-value information assets?
May 1, 2022   |  By archTIS
Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).
May 1, 2022   |  By archTIS
Information barriers that were once relegated to financial services and regulatory compliance are quickly becoming a must have to accommodate a variety of business scenarios. The art of running a business is a forever evolving path of goldmines and hurdles. Trying to map these business processes over current technology, is challenging at best and extremely difficult to achieve for all elements and viewpoints of business workflows.
Apr 1, 2022   |  By archTIS
The U.S. Government requires all manufacturers, importers, exporters, and brokers of defence articles, defence services or related technical information to meet International Traffic in Arms Regulations (ITAR) compliance. Applying these regulations to your business and to those within the greater supply chain introduces additional costs, rigor, and complexity into your processes. This whitepaper introduces 5 essential checkpoints of ITAR and provides strategies to assist with compliance and cyber resilience.

archTIS Limited (ASX:AR9, OTCQB:ARHLF) is a global provider of innovative software solutions for the secure collaboration of sensitive information. The company’s award-winning data-centric information security solutions protect the world’s most sensitive content in government, defence, supply chain, enterprises and regulated industries through attribute-based access and control (ABAC) policies. archTIS products include Kojensi, a multi-government certified platform for the secure access, sharing and collaboration of sensitive and classified information; and NC Protect and the cp. suite of products for enhanced information protection for file access and sharing, messaging and emailing of sensitive and classified content across Microsoft 365 apps, Dropbox, Nutanix Files and Windows file shares. For more information visit or follow @arch_tis.