In this video Richard presents the various features of Jellyfish, walking through each feature on the Jellyfish interface. Click the image above to view the video.

Richard explores the main features of Jellyfish presented in the table below.

user-portal

Identity Management
  • Provide strong authentication to ensure users accessing your network are who they claim to be
  • Network authentication
  • Digital signatures
  • Manage identity throughout its lifecycle
 Access Management
  • Integrated Physical and Logical Access
  • Web-based Access to services
  • HR workflow – access to workflow
  • Access Management based on the known and assured identity
 Mobile Device Management
  • Remotely manage the entire lifecycle of a device
  • Online authentication with a convenient single ID password
 Credential Management
  • Manage associations between an identity and their issued credentials
  • Manage Lifecycle of trusted tokens
  • Management of virtual smart cards and credentials to smartphones and other mobile devices
 Protected Data Store:
  • Provides key management
  • Transparent encryption of structured, sensitive data residing in:
    • Databases
    • Files
    • File Systems
    • Storage Units
    • Applications

And Much more

The Cyber Security Platform

Jellyfish® is an innovative cyber security platform that brings a unified approach to security by aggregating security services and products. Jellyfish® is an aggregator of numerous security services and products – providing full credential management with identity and access management. This means organisations can make better access control decisions and be aware of more vulnerabilities due to this integrated interface.

The Cyber Security Problem

Coming soon

3 Things about Cyber Security

Coming soon- this section will discuss the latest in cyber security and digital security solutions
To learn more about Jellyfish please click on the below links or contact sales@cogitogroup.com.au or sales@cogitogroup.co.nz

Jellyfish provides the most innovative and comprehensive set of requirements enabling security, privacy, confidentiality, integrity and availability of all information.

• A connector of systems

• Modular – with no vendor lock in for individual components

• A single source of truth

• ‘All in one’ credential management service

• Single sign-on capability

• Authentication translation service

• Reliable and mature back-end

• Secure storage

• Get your keys

• Control your devices