How Jellyfish Works
The Jellyfish Platform
Jellyfish has been developed as a modular solution. We have significantly improved the way identity, credentials, access and other security products are managed by developing a series of connectors (Cognectors).
These connectors enable the creation of automatic workflows, pass data through disparate systems and use triggers on one platform (example PACS) to affect another (example LACS).
The Cognectors feed data from disparate systems into the Service Bus. This enables a number of benefits including enhanced monitoring and reporting of activity.
Jellyfish provides a single access interface for:
Provides integration with logical and physical access control systems (including integration with legacy systems) through adaptive support through modern authentication protocols as well as emerging standards and multifactor authentication. This ensures access to systems and building areas can seamlessly be added and removed as people join, move within or leave an organisation through existing HR functions.
Data Loss Prevention (DLP), Shadow IT discovery, TLS Decryption, Intrusion Detection System and Intrusion Prevention System (IDS/IPS), Sanctioned IT usage / Analytics, User and Entity Behavior Analytics (UEBA), Key Management & Data Privacy, Centralised Key Management Services, Bring Your Own Key (BYOK), Hold Your Own Key (HYOK).
With CRUD operations, data transformation between source and target systems for users and resources and configurable workflows.
Mobile Device Management
Manage Mobile Enterprise and BYOD devices from within the system as well as use these devices as one factor in secure multifactor authentication.
Including network devices and firewalls.
Provides administrators with the ability to issue and manage certificates, smartcards, OTP tokens. An auto-enrolment capability is also provided.