How Jellyfish Works

 

The Jellyfish Platform

A Modular Solution

Jellyfish has been developed as a modular solution. We have significantly improved the way identity, credentials, access and other security products are managed by developing a series of connectors (Cognectors).

Cognectors

These connectors enable the creation of automatic workflows, pass data through disparate systems and use triggers on one platform (example PACS) to affect another (example LACS).

The Service Bus

The Cognectors feed data from disparate systems into the Service Bus. This enables a number of benefits including enhanced monitoring and reporting of activity.

Jellyfish provides a single access interface for:

Access Management

Provides integration with logical and physical access control systems (including integration with legacy systems) through adaptive support through modern authentication protocols as well as emerging standards and multifactor authentication. This ensures access to systems and building areas can seamlessly be added and removed as people join, move within or leave an organisation through existing HR functions.

CASB Elements

Data Loss Prevention (DLP), Shadow IT discovery, TLS Decryption, Intrusion Detection System and  Intrusion Prevention System (IDS/IPS), Sanctioned IT usage / Analytics, User and Entity Behavior Analytics  (UEBA), Key Management & Data Privacy, Centralised Key Management Services, Bring Your Own Key (BYOK), Hold Your Own Key (HYOK).

Identity Management

With CRUD operations, data transformation between source and target systems for users and resources and configurable workflows.

Mobile Device Management

Manage Mobile Enterprise and BYOD devices from within the system as well as use these devices as one factor in secure multifactor authentication.

Networking Management

Including network devices and firewalls.

Credential Management

Provides administrators with the ability to issue and manage certificates, smartcards, OTP tokens. An auto-enrolment capability is also provided.

Incident and Event Management
Service and Status Reporting
Auditing
Logical and Physical Access Control
End Point Protection
Encryption

The Cyber Security Control Centre

Jellyfish Factsheet

Download the Jellyfish Overview factsheet to learn more about Cogito Group’s Jellyfish Cyber Security Platform.