archTIS

Barton, Australia
2005
  |  By Irena Mroz
Protecting intellectual property (IP) and trade secrets is critical to a company’s bottom line. Keeping IP and sensitive business-critical information within the confines of the company and its employees is not always possible, especially in the manufacturing industry. Vendors must often share previews of new products with retailers and distribution partners before release.
  |  By Rod Bernabe
Regularly reviewing user permissions is important to reduce the risk of data overexposure and breaches. Overpermissioned users pose a significant security risk. Restricting access to only necessary information for individuals to perform their jobs can significantly reduce risk. By conducting regular permissions audits in Microsoft 365 and SharePoint, organizations can ensure that sensitive information access remains appropriate, safe and secure.
  |  By Irena Mroz
While the days of swashbuckling pirates terrorizing the seven seas may be long gone, modern data pirates abound in the vast cyber seas. They set out to steal your company’s crown jewels – data. Today’s document management systems are filled with treasure ready for the taking, from personal data to credit cards and intellectual property worth billions. But beware, your motley crew can pose just as significant a risk as the pirates roaming the cyber seas.
  |  By Rod Bernabe
Data governance and protection are crucial in safeguarding sensitive information. Proper classification and data labeling is essential to ensure that the right people access the right information. Failure to implement these practices can result in data breaches, financial loss, and harm to an organization’s reputation.
  |  By Irena Mroz
Microsoft Azure and Microsoft 365 are among the leading cloud services globally, but their limited Bring Your Own Key (BYOK) capabilities pose potential data security and compliance issues for organisations that must comply with the EU and global data sovereignty laws. Increased government concern over protecting sensitive personal, business, government and defence data in the Cloud has led to a complex regulatory landscape that aims to maintain control of citizen and government data.
  |  By Irena Mroz
The Defence supply chain is a network of interrelated companies, services, and products that transform raw materials and information into goods and expertise for military materiel applications. Given the scale, breadth, and complexity of bringing so many different stakeholders and activities together, the risks that a supply chain presents can be challenging to define and manage.
  |  By Irena Mroz
In today’s rapidly evolving cyber threat landscape, organizations, particularly those within the public sector and defense industries, face unprecedented challenges in securing sensitive data and ensuring regulatory compliance. The need for a comprehensive, cloud-based productivity and collaboration suite that empowers teams and meets stringent security and compliance requirements has never been greater.
  |  By Daniel Lai
Friends and Colleagues, We are proud to share that archTIS has won the 2023 Australian Defence Industry Award for Cyber Business of the Year for the second year running. We are humbled to once again be recognised by our peers and industry leaders for the valuable contributions and leadership role archTIS has taken in solving the critical Defence challenge of securing sensitive and classified information sharing.
  |  By Irena Mroz
As increased cyber threats and regulations governing the handling of sensitive personal data, government and defense data are enacted, the ability to automate the discovery, classification and protection of sensitive information is critical across enterprise content management systems. To this end, archTIS recently extended NC Protect’s capabilities to support NetApp ONTAP to ensure we support a wide range of enterprise platforms.
  |  By Irena Mroz
The volume of data moving to and collaborating in the cloud has spurred government concern and oversight over protecting sensitive personal, business, government and defence data. Data sovereignty is the concept of a country or jurisdiction having the right to govern and control digital data collection, storage, processing, and distribution within its borders. Organisations operating across international borders must comply with the rules of each country/jurisdiction where their data resides.
  |  By archTIS
Kojensi from archTIS is a highly secure, multi-level security platform for the secure sharing and collaboration of sensitive and classified files. By taking a data-centric, zero trust security approach, a file’s attributes such as security classification, organisation and country releasability, determine who is able to access, edit and download the file. Kojensi users can create, co-author and share documents in real-time, all in a secure and intuitive platform that ensure sensitive information remains need to know only.
  |  By archTIS
Empower your organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC, and ITAR for information security. archTIS’ zero trust attribute-based access control (ABAC) powered information security solutions for public sector enhance native security capabilities to empower secure collaboration within your agency, with other agencies, defense, multinational coalitions and supply chain partners.
  |  By archTIS
The complete portfolio of archTIS solutions, including NC Protect and Kojensi, leverage a data-centric, attribute-based access control (ABAC) methodology to ensure the highest levels of data protection. Watch this video to learn about the advantages of using ABAC-enabled access and data protection policies to safeguard sensitive data.
  |  By archTIS
Empower your agency to take advantage of all the productivity and collaboration capabilities the Microsoft 365, Teams and SharePoint Server have to offer with zero trust ABAC powered information security from NC Protect.
  |  By archTIS
NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.
  |  By archTIS
Discover, Classify, and Protect your most Sensitive data. Find critical data in local and remote file shares such as Microsoft SharePoint, Office 365, AWS or Azure and create custom sensitive data rules to locate and classify intellectual property and other sensitive data specific to your business.
  |  By archTIS
Data protection, encryption and compliance for Microsoft platforms: SharePoint, Office 365, OneDrive and more. Instantly encrypt SharePoint data and keep it protected no matter where it is stored or how it is used: in use, in flight, and at rest.
  |  By archTIS
See how NC Protect provides Nutanix Files users unmatched information protection capabilities to prevent accidental sharing, data misuse and loss, while maintaining a simple and intuitive user experience that empowers customers to start securing information in hours, not days or weeks.
  |  By archTIS
NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.
  |  By archTIS
Organizations have sensitive data spread across on-premises and cloud based platforms. This present a major challenge for IT to ensure data integrity and security. NC Protect is both content and context aware to automatically find, classify and secure unstructured data on-premises, in the cloud and in hybrid environments.
  |  By archTIS
Now more than ever the Boardroom, Chief Executive Officer and Chief Information Officer have information security front of mind and keeping them awake at night. Every day a new attack, incident or vulnerability is announced that has a significant impact on reputation, compliance, cost or service delivery. Chief Information Security Officers must now adapt to this changing landscape and lead their organizations to adopt new security methodologies to both protect and enable their data whenever and wherever it is required in a cost effective, risk managed way. So how do they achieve it?
  |  By archTIS
Business demands information management that meets their needs. From an IT perspective, it means that stakeholders are demanding access to information services that reach far beyond the boundaries of the organisation. At the same time, they are also expecting the IT department to protect their high-value information assets and intellectual property. How can you ensure that enabling remote and mobile access to your protected information services will not compromise your high-value information assets?
  |  By archTIS
Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).
  |  By archTIS
Information barriers that were once relegated to financial services and regulatory compliance are quickly becoming a must have to accommodate a variety of business scenarios. The art of running a business is a forever evolving path of goldmines and hurdles. Trying to map these business processes over current technology, is challenging at best and extremely difficult to achieve for all elements and viewpoints of business workflows.
  |  By archTIS
The U.S. Government requires all manufacturers, importers, exporters, and brokers of defence articles, defence services or related technical information to meet International Traffic in Arms Regulations (ITAR) compliance. Applying these regulations to your business and to those within the greater supply chain introduces additional costs, rigor, and complexity into your processes. This whitepaper introduces 5 essential checkpoints of ITAR and provides strategies to assist with compliance and cyber resilience.

archTIS Limited (ASX:AR9, OTCQB:ARHLF) is a global provider of innovative software solutions for the secure collaboration of sensitive information. The company’s award-winning data-centric information security solutions protect the world’s most sensitive content in government, defence, supply chain, enterprises and regulated industries through attribute-based access and control (ABAC) policies. archTIS products include Kojensi, a multi-government certified platform for the secure access, sharing and collaboration of sensitive and classified information; and NC Protect and the cp. suite of products for enhanced information protection for file access and sharing, messaging and emailing of sensitive and classified content across Microsoft 365 apps, Dropbox, Nutanix Files and Windows file shares. For more information visit archtis.com or follow @arch_tis.