The global software provider confirmed the launch of their NC Encrypt offering, delivering independent encryption key management as well as Microsoft 365 and SharePoint Bring Your Own Key support.
To continue reading the rest of this article, please log in.
Create free account to get unlimited news articles and more!
NC Encrypt is expected to provide business security and compliance, amid an increase in endpoint risk arising from remote work. It is hoped that the new offering will enable companies to meet the need for encryption with new flexible and enhanced security options.
The module is designed to provide existing NC Protect customers, who are seeking a third-party key management tool or who do not have RMS, with independent encryption capacity and Bring Your Own Key capabilities.
According to archTIS, NC Encrypt is expected to deliver:
- File and SharePoint column encryption;
- Strong encryption, using secure AES-256 bit encryption that is FIPS 140-2 compatible;
- Bring Your Own Key support, using NC Encrypt’s keys or supply their own;
- Enhanced encryption through third party key management platforms;
- Centralised policy management across Microsoft 365 apps, SharePoint online, SharePoint Services and hybrid environments; and
- Real time reporting and auditing.
“The sheer number of communication and collaboration channels the M365 platform has introduced increases the vulnerability of sensitive data and potential for accidental data loss or overexposure, making protection mechanisms such as encryption critical,” Kurt Mueffelmann, global chief operating officer and US president of archTIS, said.
“The ability to support BYOK is critical with 69 per cent of companies voicing that key management is one of the most important features in an encryption solution, according to the 2021 Global Encryption Trends Study by Ponemon.
“To address this, NC Encrypt now gives customers the flexibility to encrypt their Microsoft application data and manage their encryption keys or use existing third-party key management solutions to meet their security needs and compliance policies. This is increasingly becoming a requirement for companies based in Europe and Asia.”