TRUSTED TO SAFEGUARD THE WORLD’S MOST SENSITIVE INFORMATION
SENSITIVE AND CLASSIFIED INFORMATION, SHARED SECURELY
archTIS Limited is a global provider of innovative software solutions for the secure collaboration of sensitive information. The company’s award-winning data-centric information security solutions protect the world’s most sensitive content in government, defence, supply chain, enterprises and regulated industries through attribute-based access and control (ABAC) policies.
Established in 2006, archTIS has over 15 years of experience delivering information security solutions within the highest security levels of the government and defence, as well as enterprises.
archTIS solutions apply and enforce dynamic, policy-driven access controls that leverage both user and data attributes to ensure your users and partners access, share and collaborate on sensitive, classified and top secret information—securely.

Why archTIS?
archTIS Products

NC PROTECT
ADVANCED INFORMATION PROTECTION FOR MICROSOFT APPLICATIONS
Get granular policy-based control over how information is shared, accessed & used across M365 & on-premises apps.

KOJENSI
SHARING SENSITIVE & CLASSIFIED FILES SECURELY
Compartmentalized military-grade classified information collaboration & sharing.
DISCOVER & CLASSIFY DATA
NC Protect finds your organization’s sensitive data, classifies and secures it with dynamic conditional security across your collaboration tools in on-premises, cloud or hybrid environments. Get dynamic granular access control and data protection, including encryption and user rights management, to mitigate risk and ensure secure collaboration of all business-critical data.
AUDIT & TRACK SENSITIVE DATA ACCESS
Today’s organizations must assume they will be compromised by a bad actor, disgruntled or even a negligent employee. We can no longer solely afford to settle for after the fact detection and user behavior analysis to detect a breach. NC Protect’s real-time data security leverages attribute-based access control (ABAC) policies which take into consideration content and user context, to prevent both negligent and malicious data loss, and audit and track sensitive data access.
CMMC & NIST COMPLIANCE
With the migration to the Cloud, BYOD, and COVID19 creating a world-wide remote workforce, there truly is no perimeter anymore. Now more than ever, we need a seamless way to adapt our cyber defenses to also look towards the inside and proactively secure data.
For government and defense industry, the solution also has to scale to meet the demands of both the DOD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and CMMC.
INFORMATION BARRIERS IN MICROSOFT TEAMS
NC Protect’s flexible Information Barriers for Microsoft 365 and Teams allow users to communicate and collaborate on permitted projects or topics, while simultaneously preventing unauthorized or accidental sharing of specific types of information between parties (e.g. trade secrets, insider information, etc.).
MICROSOFT TEAMS GUEST ACCESS
NC Protect enhances security for Guest members accessing Teams content with features that automatically apply information protection policies to existing and newly created Teams and the content within them.
ITAR & EAR COMPLIANCE
If your company falls under ITAR or EAR and you are using Microsoft 365 (M365), SharePoint Online or on-premises (SharePoint) to provide access to product development plans, hardware specifications, source code, and other sensitive information, then you must implement security controls in these applications to be compliant. The rules apply to any internal and external users or groups that have access to regulated content in the US and in many other countries as defined in the requirements. NC Protect provides a simple approach using dynamic access and identity management.
DYNAMIC DIGITAL SECURITY WATERMARKS
Digital Security Watermarks that adapt to user and use case offer a perfect solution to augment your information security practices, providing a visual deterrent to prevent data loss and aid in forensics. NC Protect offers digital security watermarks that go beyond just stamping a document as confidential. Fully integrated with Microsoft 365 apps including SharePoint® Online and on-premises, OneDrive, Teams, Outlook and Office, as well as other file shares.
PRIVACY COMPLIANCE
Violations can bring hefty penalties but the challenge of locating and adequately protecting the information is overwhelming for many organizations. With information spread throughout intranets, file shares and collaboration systems the risks to the organization and compliance officers, policy managers and executives on the hook for this responsibility is great. NC Protect addresses privacy issues including who can access systems and applications that contain PII. Secure files and control how authorized users can share and utilize documents containing PII, while providing a clear audit trail of access and use.
RESTRICT FILE ACCESS
Today, your files and users are in a constant state of motion. Modern collaboration tools mean that sensitive information is no longer stored within the corporate firewall but instead also rests on laptops, mobile devices and cloud storage accounts. NC Protect prevents accidental sharing, misuse and data loss by restricting access to and encrypting content at rest or in-transit within Microsoft apps including SharePoint® Online and on-premises, OneDrive, Teams and Yammer and File Shares.
SECURE EMAIL
Email is an essential business tool for communication and collaboration. It is also one of the most common vectors for information leakage in your organization. NC Protect safeguards your sensitive data and IP from accidental data loss and malicious users.
SECURE COLLABORATION IN MICROSOFT TEAMS
Microsoft Teams is everywhere in 2020. Adoption was growing before the pandemic, and the surge of remote workers sent usage into overdrive. However, a by-product of accelerated growth is users requesting more features and exposing feature gaps much faster than anticipated. The good news is there are ways to plug some of those collaboration feature gaps and user frustrations – immediately and seamlessly with NC Protect.
SECURE CLASSIFIED INFORMATION SHARING
The information they need to share and work on is classified ‘PROTECTED’ and many of the files being shared are large in size. Furthermore, some files need to be restricted to a subset of Industry partners. At present they rely on secure USBs and literally running files from one building across town to the Industry partners office, or having them come into the government departments office to work together. The document lifecycle is hard to track and collating different version of documents problematic. Ultimately the process is slower and less productive than it could be.
By implementing a government accredited PROTECTED information sharing cloud service, Government and Industry partners consume the platform as they need, and share any files up to 10GB in size and collaborate in real time on documents, spreadsheet and presentations. Within minutes, Departments can set up a shared workspace and invite all their Industry partners in to share and collaborate on the information required to carry out key projects, knowing that each partner will only have access to information they are authorised to.
SECURE INFORMATION SHARING AND COLLABORATION FOR THE DEFENCE INDUSTRY
Defense needs to work with a number of major Defense suppliers when building the next general Naval vessel. Although major Defence Suppliers have strong and established secure platforms, some of their suppliers are new to the industry and have limited secure facilities and procedures.
By implementing a government accredited PROTECTED information sharing cloud service, Defence Industry organisations consume the platform as they need, without the substantial costs of implementing new on premise secured ICT infrastructure. Within minutes, they can set up a shared workspace and invite all their supply chain partners in to share and collaborate on the information required to carry out the project, knowing that they will only have access to information they are authorised to.
SECURE CMMC & NIST COMPLIANT COLLABORATION FOR THE DEFENSE INDUSTRY
DoD needs to work with a number of major Defense Industry suppliers to build the next general Naval vessel. Although major DIB suppliers have strong and established secure platforms, small or new suppliers may have limited secure facilities and information sharing procedures. Under CMMC requirements these suppliers will be unable to bid on US Defense contracts, unless they can pass compliance.
By implementing a government accredited PROTECTED information sharing cloud service, Defence Industry organizations consume the platform as they need, without the substantial costs of implementing new on premise secured ICT infrastructure. Within minutes, they can set up a shared workspace and invite all their supply chain partners in to share and collaborate on the information required to carry out the project, knowing that they will only have access to information they are authorized to.
SECURE CLASSIFIED INFORMATION COLLABORATION FOR INTELLIGENCE AGENCIES
In an ever changing political environment where intelligence agencies are working, not only internally, but with their global counterparts in order to carry out an investigation, traditional information sharing platforms are too rigid and slow to meet the current landscape. Information is needed to be shared quickly at different security classification levels, but each global intelligence agency has different security classifications and clearance levels. As such, each partner needs a way to control access to information, while ensuring only authorised partners and personnel can view their documents and files.
By implementing Kojensi Enterprise the agencies can quickly set up shared Communities of Interests with the ability to host, and control access to, relevant intelligence information of varying security levels (TOP SECRET and below) and invite all authorised users in to share and collaborate on the information required to develop the unified picture of Intelligence activity.
SECURE INFORMATION SHARING FOR MULTINATIONAL COALITION OPERATIONS
In an ever changing political environment where multinational coalition forces are working with traditional and non-traditional allies, most information sharing platforms are too rigid and slow to meet the current landscape. Information must be shared quickly at different security classification levels, but each coalition partner has different security classifications and clearance levels. As such, each partner needs a way to control access to information, while ensuring only authorised partners and personnel can view their documents and files.
By implementing Kojensi Enterprise multinational coalition partners can quickly set up shared Communities of Interests (CoI), with the ability to host, and control access to information of varying security levels (TOP SECRET and below). By taking a data-centric security approach, the files attributes including security classification, organisation and country releasability determine who is able access, edit and download giving the information owner complete control over their information. This means individual countries can work and create files and then decide when to share that information with other Allies, even within a CoI.
SECURING CLASSIFIED GOVERNMENT & DEFENCE RESEARCH
A group of universities are working with a Defence Systems Integrator (SI) on a new research project, involving development of new classified research papers and reporting. The information they need to share and work on is classified up to and including ‘PROTECTED’, however the current platforms they are using are not designed to manage and share information classified at this level. Existing file sharing systems enable them to send unclassified, but not sensitive information, and does not limit granularly who can see and access the information. Further, downloading and uploading information, loss of versions, and numerous calls and emails slow their collaboration, leading to significant delays.
By implementing Kojensi, a secure government accredited PROTECTED information sharing cloud service, the Defence SI can set up shared workspaces with the Universities and invite all authorised researchers in to share and collaborate on the information required to collaborate on research and deliver papers in a timely manner. Those shared workspaces can contain both sensitive and non-sensitive information, and the researchers will only have access to the information they are entitled to access based on their organisation, clearance and nationality.

