Conform to a wide range of international regulations and standards.
Solves your major regulatory compliance requirements

ACSC ISM & DISP
Encrypted files can only be accessed by authorised users on authorised pcs. Users access files as normal without any extra steps. Online and Offline modes of encryption specifically designed to support SME needs including air-gapped networks.

ITAR
Automatically discovers, classifies and encrypts all types of files used by SMEs. Also supports ad-hoc classification and encryption of files by users via ‘right-click encrypt’ options. Classification allows tracking of files related to specific contract projects.

ISO 27001:2022
Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

NIST SP 800-171
Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

CMMC 2.0
Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

VPDSS 2.0
Organisations in Victoria that perform the functions of a public entity are required to comply with the Part 4 of the Privacy and Data Protection Act, 2014. In relation to this OVIC has published the Victorian Protective Data Security Framework

Defence Data Strategy
The GuardWare suite of products has the potential to be a force multiplier tool for the Australian Government to achieve the vision set out in the recent Defence Data Strategy