Cogito Group offer best of breed identity management and digital security hardware and software products. We partner with leading international hardware providers to ensure we deliver product solutions that are tailored to the needs of our clients.


Jellyfish® is an innovative cyber security platform that brings a unified approach to security by aggregating security services and products. Jellyfish® is an aggregator of numerous security services and products – providing full credential management with identity and access management. This means organisations can make better access control decisions and be aware of more vulnerabilities due to this integrated interface.

Identity Management (IdM)

Our IdM solutions provide strong authentication to ensure users accessing your network are who they claim to be through Identity and Access Management applications such as network authentication, digital signatures and other services based on Public Key Infrastructure (PKI).

Our cloud offering

Cogito Group provides services for the protection of cloud solutions (internal, external and hybrid). These include:

  • Virtual server protection and encryption
  • File encryption
  • Database encryption
  • Secure Storage from the customer’s site
  • Secure Cryptographic Key Storage

Card Management Services

Our Card Management Service (CMS) is used for the lifecycle management of our smart cards.  Our CMS provides the interface for the:

  • registration of smart cards
  • enrolment of identities
  • issuance of a smart card
  • activation of a smart card
  • lifecycle activities such as locking, unlocking, revocation and retirement/deletion.

Smart cards, smart card readers, USB and OTP tokens

Our smart card, smart card reader, USB and OTP tokens respond to the needs for strong authentication, data loss prevention, compliance to governmental security directives and the growing demand for qualified digital signature.

Please read our Smart cards and CMS fact sheet.

Hardware Security Modules

Our HSMs provide a high level of protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services. Performance is enhanced through a larger transactional throughput.