Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft 365 GCC High Guide for DoD Contractors

In today’s rapidly evolving cyber threat landscape, organizations, particularly those within the public sector and defense industries, face unprecedented challenges in securing sensitive data and ensuring regulatory compliance. The need for a comprehensive, cloud-based productivity and collaboration suite that empowers teams and meets stringent security and compliance requirements has never been greater.

archTIS wins the 2023 Australian Defence Industry Award for Cyber Business of the Year two years in a row

Friends and Colleagues, We are proud to share that archTIS has won the 2023 Australian Defence Industry Award for Cyber Business of the Year for the second year running. We are humbled to once again be recognised by our peers and industry leaders for the valuable contributions and leadership role archTIS has taken in solving the critical Defence challenge of securing sensitive and classified information sharing.

Introducing Data-centric Policy-enforced Access Control and Data Protection for NetApp ONTAP

As increased cyber threats and regulations governing the handling of sensitive personal data, government and defense data are enacted, the ability to automate the discovery, classification and protection of sensitive information is critical across enterprise content management systems. To this end, archTIS recently extended NC Protect’s capabilities to support NetApp ONTAP to ensure we support a wide range of enterprise platforms.

Data Sovereignty Best Practices in M365

The volume of data moving to and collaborating in the cloud has spurred government concern and oversight over protecting sensitive personal, business, government and defence data. Data sovereignty is the concept of a country or jurisdiction having the right to govern and control digital data collection, storage, processing, and distribution within its borders. Organisations operating across international borders must comply with the rules of each country/jurisdiction where their data resides.

archTIS Shortlisted for Two 2023 Australian Defence Industry Awards

We are proud to share that archTIS has been shortlisted for two 2023 Australian Defence Industry Awards. The company has been named a Finalist for Cyber Business of the Year, and Managing Director and CEO Daniel Lai is nominated for Executive of the Year. archTIS is humbled to be recognised once again for our contributions as a company to improving the secure collaboration of sensitive information in the defence industry. I am also honoured to be nominated for Executive of the Year.

Kojensi: Military-grade Sensitive & Classified Information Sharing Platform

Kojensi from archTIS is a highly secure, multi-level security platform for the secure sharing and collaboration of sensitive and classified files. By taking a data-centric, zero trust security approach, a file’s attributes such as security classification, organisation and country releasability, determine who is able to access, edit and download the file. Kojensi users can create, co-author and share documents in real-time, all in a secure and intuitive platform that ensure sensitive information remains need to know only.

NC Protect: Advanced Data Protection for Govt, Defense & Supply Chain in Microsoft 365 Applications

Empower your organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC, and ITAR for information security. archTIS’ zero trust attribute-based access control (ABAC) powered information security solutions for public sector enhance native security capabilities to empower secure collaboration within your agency, with other agencies, defense, multinational coalitions and supply chain partners.

What is Attribute Based Access Control or ABAC?

The complete portfolio of archTIS solutions, including NC Protect and Kojensi, leverage a data-centric, attribute-based access control (ABAC) methodology to ensure the highest levels of data protection. Watch this video to learn about the advantages of using ABAC-enabled access and data protection policies to safeguard sensitive data.

Understanding the Differences Between DFARS and CMMC

Cybersecurity challenges continue to grow in impact and complexity, especially as they relate to government and Defence information. In response to increasing hacking and cyber attacks, the Department of Defense (DoD) has released the DFARS and CMMC information management and cybersecurity standards to reduce the risk of system compromises within government agencies and the defense industrial base (DIB) that supports them.