Resources

 

Webinars

Webinar: 5 Tips for Securing Guest Access in Microsoft Teams

This on demand webinar provides valuable information on the challenges, best practices and tools to Secure Guest Access in Teams.

Webinar: 4 Tips for Securing Information in Microsoft Teams

This on demand webinar provides the four critical steps for information security in Teams and steps to reduce accidental or malicious exposure of business-critical information during collaboration.

I

Webinar: 5 Must Haves for Microsoft Teams Adoption and Data Security

This recorded webinar provides guidance on how to roll out a Teams intranet with governance and data security built-in from the start to guarantee adoption and secure collaboration. 

I

Webinar: Understanding Insider Threats and 4 Ways to Stop Them

Watch this recorded webinar to learn the Key findings of the 2019 Insider Threat Report and four steps you can take to protect your content from insider threats.

I

Webinar: 3 Flaws of Protecting File Share Data with ACLs and Permissions

Watch this recorded webinar to learn the challenges, best practices and more effective tools to properly secure file share data. 

Videos 

I

Video: NC Protect for Microsoft 365

See how NC Protect’s advanced information protection capabilities prevent data breaches, unauthorized file access and accidental sharing in M365 apps, Windows File Shares and more — simpler, faster and cheaper.

I

Video: NC Protect for Microsoft Teams

See how NC Protect offers a simpler, faster and easier way to ensure secure collaboration in Microsoft Teams. 

I

Video: NC Protect Integration with Azure Information Protection

Learn how Microsoft Information Protection sensitivity labels combined with NC Protect’s dynamic access and secure collaboration rules give you expanded protection and control over all your M365 collaboration.

I

Video: NC Protect for Nutanix Files Overview

See how NC Protect provides Nutanix Files users with unmatched information protection capabilities to prevent accidental sharing, data misuse and loss.

White Papers &

i

10 Questions to Assess Information Security Needs in Microsoft Teams

Discover if OOTB information security for Microsoft Teams is adequate, or if you need to add a third party solution to get the data protection capabilities needed to suit your business and regulatory requirements.

i

eBook: 8 Tips to Prevent Oversharing and Insider Threats in Microsoft Teams

Microsoft Teams can potentially leave you exposed to data breaches from accidental sharing of the wrong files or sharing sensitive info with the wrong Team. Discover 8 tips to collaborate freely without risking your sensitive information.

i

White Paper: Secure Collaboration – The Impossible Paradox

Despite best efforts, the security solutions in use today are only partially effective at protecting sensitive data. A new approach is clearly needed. Explore a more effective data-centric approach to tackling data security.

i

White Paper: 5 Data Security Challenges to Modern Collaboration

Get our tips for balancing security and collaboration needs as cybersecurity threats have increased and data protection regulations have evolved. 

Industry Reports

2021 State of Remote Work Security Report

The 2021 State of Remote Work Security Report reveals additional insights into the status of organizations’ efforts to secure the new workforce, key challenges and unique security threats, technology gaps and investment priorities.

2019 Insider Threat Report

The 2019 Insider Threat Report from Cybersecurity Insiders reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders and preparing to better protect their critical data and IT infrastructure.

i

Solution Brief: NC Protect - Adding Value to Microsoft Investments

Discover why customers rely on NC Protect to enhance and add additional capabilities to their Office 365 apps to safeguard against data loss, misuse, and accidental sharing.

i

White Paper: Dynamic Data Loss Prevention in SharePoint

Enable collaboration without compromising security. Learn how to apply user and file context to drive dynamic, attribute-based data protection to prevent data loss, misuse and accidental sharing.

i

White Paper: Achieving CMMC Level 3-5 to Mitigate Insider Threats in Government and Defense

How extending a Zero Trust approach used for system and application access to file access and sharing ensures compliance with CMMC standards for collaboration of FCI and CUI.

Infographics

Infographic: 5 Ways Remote Work Fuels Data Loss

Get the facts about this alarming trend and the steps your organization can take to address data loss that has been amplified by working from home.

Infographic: Identifying The Top Insider Threats to Data Security

Every organization has them. Discover the insiders inadvertently (and deliberately) putting you at risk bypassing governance and training, misusing privileges, stealing IP, sharing confidential data with unauthorized parties, and simply making innocent mistakes.

Infographic: Managing Security in Office 365 & SharePoint

Get the steps for effectively manage information security and data governance; from defining your strategy to using NC Protect to enforce compliance and apply intelligent security to SharePoint, Office 365 and file share content. 

Case Studies

U

Customer Success Stories by Industry

See how NC Protect helps customers in every industry secure data and meet compliance.

U

NC Protect Trims Information Sharing Risk for German Insurer BGW

NC Protect enabled BGW to secure the documents in accordance with their security requirements to mitigate risk and protect documents by limiting users to secure read-only access and eliminating their ability to use certain SharePoint functionality

U

NC Protect is the RX for Secure Teams Collaboration at this Biopharmaceutical

After implementing Teams to fuel collaboration internally and with outside partners, this biopharmaceutical company needed a solution to protect highly valuable IP, FDA regulated clinical trials, and other sensitive company information.

U

Cogentrix Secures Access to Sensitive Information in SharePoint with NC Protect

When it comes to securing highly confidential data, see why Cogentrix says “Nucleus Cyber’s product was a perfect fit. The solution was too good to be true offering us exactly the security we needed.” 

Data Sheets & Tech Specs

General Information

h

NC Protect Overview

NC Protect Technical Specifications

Microsoft Integrations

h

NC Protect for Office 365 & SharePoint Datasheet

h

NC Protect and Microsoft Information Protection (MIP) Integration

h

NC Protect for Microsoft Teams Data Sheet

h

NC Protect for Yammer Data Sheet

Other Integrations

h

NC Protect for Dropbox Data Sheet

h

NC Protect for LiveTiles Wizdom Data Sheet

h

NC Protect for File Shares Data Sheet

h

NC Protect for Nutanix Data Sheet