What is Jellyfish?

Play this video for an overview of Jellyfish.

Jellyfish is an innovative cyber security platform that brings a unified approach to security by aggregating security services and products.

Single pane of glass

Jellyfish is a fully integrated Cyber Security Command and Control System that gives you a number of base security services all in one single glass pane. One interface to connect disparate components such as IdM, PKI, OTP, SSO, Password Management, LACS, PACS, LDAP, DB, MDM, Monitoring and Audit.

Full credential, identity and access management

Jellyfish is an aggregator of numerous security services and products – providing full credential management with identity and access management. This means organisations can make better access control decisions and be aware of more vulnerabilities due to this integrated interface.

Modular, Agile and Integrated

The Jellyfish solution is modular and best explained through the metaphor of a jigsaw puzzle. It’s designed as an integrated, cohesive stack that is purpose-built to handle complexity. Start with one piece and add more as your security requirements grow. Additional layers and modules can be inserted and existing modules can be replaced as new and improved technology is released.

This is not a set and forget solution. It is organic and will grow with your security requirements.

The Cyber Security Platform

Jellyfish® is an innovative cyber security platform that brings a unified approach to security by aggregating security services and products. Jellyfish® is an aggregator of numerous security services and products – providing full credential management with identity and access management. This means organisations can make better access control decisions and be aware of more vulnerabilities due to this integrated interface.
To learn more about Jellyfish please click on the below links or contact sales@cogitogroup.com.au or sales@cogitogroup.co.nz

More About Jellyfish

Jellyfish provides the most innovative and comprehensive set of features enabling security, privacy, confidentiality, integrity and availability of all information.

A connector of systems
Modular – with no vendor lock in for individual components
A single source of truth
‘All in one’ credential management service
Single sign-on capability
Authentication translation service
Reliable and mature backend
Secure storage
Get your keys
Control your devices