Jellyfish Features

What You Get

Jellyfish provides the most innovative and comprehensive set of requirements enabling security, privacy, confidentiality, integrity and availability of all information.

IDENTITY MANAGEMENT
  • Provide strong authentication to ensure users accessing your network are who they claim to be
  • Network authentication
  • Digital signatures
  • Manage identity throughout its lifecycle
MOBILE DEVICE MANAGEMENT
  • Remotely manage the entire lifecycle of a device
  • Online authentication with a convenient single ID password
PROTECTED DATA STORE
  • Provides key management
  • Transparent encryption of structured, sensitive data residing in:
    • Databases
    • Files
    • File Systems
    • Storage Units
ACCESS MANAGEMENT
  • Integrated Physical and Logical Access
  • Web-based Access to services
  • HR workflow – access to workflow
  • Access Management based on the known and assured identity
CREDENTIAL MANAGEMENT
  • Manage associations between an identity and their issued credentials
  • Manage Lifecycle of trusted tokens
  • Management of virtual smart cards and credentials to smartphones and other mobile devices
OTHER FEATURES
  • Advanced protection to data
  • Sophisticated monitoring services
  • Mature auditing services
  • Comprehensive reporting and analytics functionality
  • Integration with internal directories and databases
  • Integration with legacy systems

Jellyfish Product Data Sheet

To see the full list of Jellyfish features download our Jellyfish Product Datasheet