archTIS

Barton, Australia
2005
Jun 23, 2022   |  By Irena Mroz
Cybersecurity has become an important topic for the defense supply chain. The ever-increasing number of digital channels that data can be exchanged through, has exponentially increased the risk of data breaches and leaks. This puts a lot of pressure on these organizations to ensure that the risks associated with the handling of sensitive data are as low as possible.
Jun 14, 2022   |  By Irena Mroz
Protecting Controlled Unclassified Information (CUI) is a top priority for companies that have government and defense contracts, especially with the changes being rolled out in CMMC 2.0. We’re pleased at announce a new NC Protect watermarking feature to support CUI Designator labelling capability to assist US Defense and the Defense Industrial Base (DIB) with meeting the new CUI document handling and tagging requirements. The feature will be globally available during the July 2022 timeframe.
May 16, 2022   |  By archTIS
Microsoft Azure customers worldwide now gain access to NC Protect to take advantage of the scalability, reliability, and agility of Azure to drive application development and shape business strategies.
May 16, 2022   |  By Kurt Mueffelmann
We are excited to share that NC Protect for Microsoft 365 is now available in both Microsoft Azure Marketplace and Azure Government Marketplace! archTIS customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined procurement, deployment and management of NC Protect for M365 from the Marketplaces.
May 13, 2022   |  By Irena Mroz
Missed last week’s archTIS Defense & DIB Cybersecurity Summit with leading industry and defense experts? Watch the recording for their insights on the zero trust, CMMC 2 and the new threats the industry is facing and how to best combat them.
May 5, 2022   |  By Jeff Melnick
Microsoft Teams is a fantastic collaboration tool allowing people to share data effortlessly within the same organization and even across organizations. Unfortunately, because it was built with collaboration as the primary driver, it can be easy to ‘overshare’ data you don’t want to share.
Apr 27, 2022   |  By Jeff Melnick
While the data breaches that make the headlines often focus on personal data, there’s a lot more at stake if a hacker cracks open the gates. There’s even higher stakes when intellectual property (IP) theft is the goal potentially stripping away an organization’s competitive advantage. It’s not just hackers that are a threat to IP. Employees, contractors and partners all pose a risk to IP from accidental or deliberate data loss.
Apr 14, 2022   |  By Jeff Melnick
I recently attended a virtual conference on CMMC, an upcoming security mandate for defense supply chain organizations. There were a lot of great sessions, but one that really stood out was presented by Scott Goodwin, Manager – Cybersecurity and Privacy Advisory at DGC.
Mar 31, 2022   |  By Kurt Mueffelmann
In the midst of a growing global cyberthreat landscape, the Australian and US governments this week announced plans to increase spend to bolster federal cybersecurity. The Australian federal government’s newly released 2022-23 federal Budget has dedicated AU$9.9 billion to support cybersecurity and intelligence capabilities under a program called Resilience, Effects, Defence, Space, Intelligence, Cyber and Enablers (REDSPICE).
Mar 24, 2022   |  By Irena Mroz
Everyday business documents continue to be one of the biggest sources of data leakage. The Facebook leaks and WikiLeaks are prime examples of the damage such breaches can wreak. Even with the best security tools in place users seem to always be able to find a way to circumvent security. Or, as in most cases, accidentally share data with the wrong audience creating a security issue.
Nov 15, 2021   |  By archTIS
NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.
Nov 11, 2021   |  By archTIS
Discover, Classify, and Protect your most Sensitive data. Find critical data in local and remote file shares such as Microsoft SharePoint, Office 365, AWS or Azure and create custom sensitive data rules to locate and classify intellectual property and other sensitive data specific to your business.
Nov 11, 2021   |  By archTIS
Data protection, encryption and compliance for Microsoft platforms: SharePoint, Office 365, OneDrive and more. Instantly encrypt SharePoint data and keep it protected no matter where it is stored or how it is used: in use, in flight, and at rest.
Aug 13, 2021   |  By archTIS
Organizations have sensitive data spread across on-premises and cloud based platforms. This present a major challenge for IT to ensure data integrity and security. NC Protect is both content and context aware to automatically find, classify and secure unstructured data on-premises, in the cloud and in hybrid environments.
Aug 13, 2021   |  By archTIS
See how NC Protect provides Nutanix Files users unmatched information protection capabilities to prevent accidental sharing, data misuse and loss, while maintaining a simple and intuitive user experience that empowers customers to start securing information in hours, not days or weeks.
Aug 13, 2021   |  By archTIS
NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.
Jun 7, 2021   |  By archTIS
Live from Land Forces 2021 archTIS CEO Daniel Lai discusses the company's partnership with Thales as part of the Nexium Defence Cloud Edge offering.
May 13, 2021   |  By archTIS
SENSITIVE AND CLASSIFIED INFORMATION, SHARED SECURELY archTIS solutions apply and enforce dynamic, policy-driven access controls that leverage both user and data attributes to ensure your users and partners access, share and collaborate on sensitive, classified and top secret information—securely.
May 19, 2022   |  By archTIS
Now more than ever the Boardroom, Chief Executive Officer and Chief Information Officer have information security front of mind and keeping them awake at night. Every day a new attack, incident or vulnerability is announced that has a significant impact on reputation, compliance, cost or service delivery. Chief Information Security Officers must now adapt to this changing landscape and lead their organizations to adopt new security methodologies to both protect and enable their data whenever and wherever it is required in a cost effective, risk managed way. So how do they achieve it?
May 19, 2022   |  By archTIS
Business demands information management that meets their needs. From an IT perspective, it means that stakeholders are demanding access to information services that reach far beyond the boundaries of the organisation. At the same time, they are also expecting the IT department to protect their high-value information assets and intellectual property. How can you ensure that enabling remote and mobile access to your protected information services will not compromise your high-value information assets?
May 1, 2022   |  By archTIS
Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).
May 1, 2022   |  By archTIS
Information barriers that were once relegated to financial services and regulatory compliance are quickly becoming a must have to accommodate a variety of business scenarios. The art of running a business is a forever evolving path of goldmines and hurdles. Trying to map these business processes over current technology, is challenging at best and extremely difficult to achieve for all elements and viewpoints of business workflows.
Apr 1, 2022   |  By archTIS
The U.S. Government requires all manufacturers, importers, exporters, and brokers of defence articles, defence services or related technical information to meet International Traffic in Arms Regulations (ITAR) compliance. Applying these regulations to your business and to those within the greater supply chain introduces additional costs, rigor, and complexity into your processes. This whitepaper introduces 5 essential checkpoints of ITAR and provides strategies to assist with compliance and cyber resilience.

archTIS Limited (ASX:AR9, OTCQB:ARHLF) is a global provider of innovative software solutions for the secure collaboration of sensitive information. The company’s award-winning data-centric information security solutions protect the world’s most sensitive content in government, defence, supply chain, enterprises and regulated industries through attribute-based access and control (ABAC) policies. archTIS products include Kojensi, a multi-government certified platform for the secure access, sharing and collaboration of sensitive and classified information; and NC Protect and the cp. suite of products for enhanced information protection for file access and sharing, messaging and emailing of sensitive and classified content across Microsoft 365 apps, Dropbox, Nutanix Files and Windows file shares. For more information visit archtis.com or follow @arch_tis.