archTIS Limited announced the launch of NC Encrypt to provide independent encryption key management and Bring Your Own Key (BYOK) support for Microsoft 365 applications and SharePoint Server environments. Encryption of sensitive data in Microsoft 365 (M365) cloud applications and SharePoint on- premises is important for data security and compliance - especially with the surge in remote work and the number of collaboration channels these tools have introduced. NC Protect now offers flexible, enhanced options for organizations looking to encrypt their sensitive data.

Out of the box, NC Protect enables dynamic encryption and adds additional protection capabilities to the standard Microsoft Purview Information Protection (MPIP) and RMS encryption capabilities included in customers' Microsoft stack. For organizations using NC Protect that do not have RMS, require independent key management, or want to leverage third party key management tools to encrypt Microsoft application content, the new NC Encrypt module provides independent encryption capabilities and BYOK support. Key features of NC Encrypt include: File and SharePoint column encryption ­ NC Encrypt can be used to encrypt individual files in supported applications at rest and SharePoint columns to ensure the same protections and restrictions are applied to multiple forms of content for consistent security.

Strong Encryption ­ NC Encrypt uses secure AES-256 bit encryption that is FIPS 140-2 compatible. BYOK Support ­ Customers can use NC Encrypt's dynamically generated keys or supply and manage their own encryption keys (BYOK). Enhanced Encryption ­ Provides connectors to third party key management platforms so customers can easily leverage existing encryption investments.

Centralized policy management ­ Centrally manages both access and encryption policies across all M365 apps, SharePoint Online, SharePoint Server and/or hybrid environments from a single application to streamline policy management. Reporting and Auditing ­ Real-time activity logging and reporting tracks permitted and denied access requests, and actions taken with authorized files for auditing and compliance purposes.