Jellyfish for All Levels of Government
Jellyfish has been purposely designed as a modular platform, agile and adaptive to change. Jellyfish is currently made up of modules that are designed to either be stand alone to meet a singular pain point of a business or integrate to enable enterprise security. Importantly, we are designing our modules to integrate and evolve to ensure our clients are armed with the tools to combat new and emerging malicious cyber activity.
ASD Essential Eight
Before implementing any of the mitigation strategies, organisations should:
1. Identify which systems require protection
2. Identify which adversaries are most likely to target their systems
3. Identify what level of protection is required
This strategy ensures that all non-approved applications, including malicious code, are prevented from executing.
Admin accounts are the ‘keys to the kingdom’ and adversaries use these accounts to gain full access to information and systems.
This strategy prevents security vulnerabilities in applications can be used to execute malicious code in systems.
Security vulnerabilities in operating systems can be used to fruther the compromise of systems.