Skip to content Skip to footer
Conform to a wide range of international regulations and standards.

Solves your major regulatory compliance requirements

ACSC ISM & DISP icon

Encrypted files can only be accessed by authorised users on authorised pcs. Users access files as normal without any extra steps. Online and Offline modes of encryption specifically designed to support SME needs including air-gapped networks.

Automatically discovers, classifies and encrypts all types of files used by SMEs. Also supports ad-hoc classification and encryption of files by users via ‘right-click encrypt’ options. Classification allows tracking of files related to specific contract projects.

iso 27001 icon

Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

NIST SP800-171 icon

Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

CMMC 2.0 icon

Continuous monitoring of access to encrypted files by users and automatic altering and blocking of unusual patterns of access. PROTECT’s processes and reports provide the strong data protection and auditing controls needed for compliance.

VPDWW 2.0 icon

Organisations in Victoria that perform the functions of a public entity are required to comply with the Part 4 of the Privacy and Data Protection Act, 2014. In relation to this OVIC has published the Victorian Protective Data Security Framework

The GuardWare suite of products has the potential to be a force multiplier tool for the Australian Government to achieve the vision set out in the recent Defence Data Strategy