|Company size (employees)||50 to 99|
|Type of solution||Software|
NC Protect from archTIS is an advanced information protection solution that prevents data loss and protects against insider threats. It provides a simpler, faster and scalable solution to tailor information protection across file sharing, messaging and chat in popular enterprise collaboration tools.
NC Protect finds, classifies and secures unstructured data in on-premises, cloud and hybrid environments to protect against breaches, data misuse and unauthorized file access by ensuring that users access, use and share files according to organizational regulations and policies. It dynamically enforces compliance and data security policies for global privacy regulations, confidentiality, intellectual property, data loss prevention, sensitive data access, information barriers, and custom business policies.
NC Protect’s enhanced, real-time information protection increases adoption and ROI of technology investments – without the complexity or cost of native tools. It allows IT administrators and security owners to manage user access without creating more security groups, sites, folders, or other information silos. Instead, admins define access rules, usage and sharing rights to control user actions efficiently and dynamically to ensure that only the right users – access the right information – at the right time.
NC Protect integrates natively into Microsoft, Nutanix and Dropbox to enhance the data security capabilities by leveraging dynamic attribute-based access control (ABAC) and protection policies to safeguard data at rest and in motion. It enforces real-time conditional access, sharing and usage control of files, chats and messages based on data and user attributes. If the user context or data attributes change, NC Protect can automatically adjust access and protections based on defined policies. It dynamically enforces access and security policies for each and every user and device, completely transparent to the end user.
How we are different
• NC Protect’s ABAC-based policies dynamically enforce access, usage and sharing rights for each and every user and device in real time based on content and user context. Policies can be applied across enterprise collaboration tools for consistent and scalable data security and insider threat protection.
• IT administrators define access rules and usage rights to control access and user actions - efficiently and dynamically - without the need to create separate sites and security groups.
• Requires no additional client-side application, reducing IT overhead and implementation time to start securing data in hours, not days or weeks.