Skip to content Skip to footer
Conform to a wide range of international regulations and standards.

Solves your major regulatory compliance requirements

ACSC ISM & DISP

Encrypted files can only be accessed by authorised users on authorised pcs. Users access files as normal without any extra steps. Online and Offline modes of encryption specifically designed to support SME needs including air-gapped networks.

ITAR

Automatically discovers, classifies and encrypts all types of files used by SMEs. Also supports ad-hoc classification and encryption of files by users via ‘right-click encrypt’ options. Classification allows tracking of files related to specific contract projects.

ISO 27001:2022

Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

NIST SP 800-171

Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

CMMC 2.0

Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

VPDSS 2.0

Organisations in Victoria that perform the functions of a public entity are required to comply with the Part 4 of the Privacy and Data Protection Act, 2014. In relation to this OVIC has published the Victorian Protective Data Security Framework

Defence Data Strategy

The GuardWare suite of products has the potential to be a force multiplier tool for the Australian Government to achieve the vision set out in the recent Defence Data Strategy

Download Case Study

This will close in 0 seconds