PROTECT YOUR ORGANISATION FROM THREATS

I N S I D E    A N D    O U T

AWARD-WINNING TECHNOLOGY, PURPOSE-BUILT FOR AGILITY

WHAT WE DO

3

Authentication Solutions

Identity Management

Access Management

Threat Visibility and Protection

Sustainment Services

JELLYFISH: Cyber Security Command and Control Centre

Jellyfish is a next generation cyber security platform designed to dynamically protect data and enhance the situational awareness of cyber threats. It actively counters and responds to new threat landscapes and prevents data breaches by intelligently combining data from multiple sensors and applications.

Cogito Group

CAPABILITY STATEMENT

We collated use cases to highlight what we do, including: Public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions.

Latest Blog Posts

Active Directory Security Best Practices

This article forms part 3 of our discussion on Group Policy. For articles 1 and 2 refer here: 1. Do you need a group policy? 2. Group policy best practices   What is Active Directory?   Active Directory is an Identity and Access Management tool (IAM) created by...

What is a Digital Certificate?

What is a Digital Certificate?   A digital certificate is a tool much like a password. In Public Key Infrastructure digital certificates confirm the identity of network traffic. A digital certificate proves that you are who you say you are when operating within a...

Cyber Security Risks when Working from Home

 Cyber security risks are more present given the COVID-19 crisis. We now face increased cyber security risks working from home. Even large banks like ANZ are sending workers home.   These new remote working landscapes cross through home networks and use new...

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy and how it works. This article will cover the practical implementation of Group Policy best Practice.   Group Policy makes dealing with your operating...

Do you Need a Group Policy?

This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how to implement best practice for use of these services within an entity. What is Group Policy? Group Policy is a method...

Cyber Security Risks when Working from Home

 Cyber security risks are more present given the COVID-19 crisis. We now face increased cyber security risks working from home. Even large banks like ANZ are sending workers home.   These new remote working landscapes cross through home networks and use new...

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy and how it works. This article will cover the practical implementation of Group Policy best Practice.   Group Policy makes dealing with your operating...

Our Clients

AU: +61 2 6140 4494

NZ: +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

 

Auckland | Brisbane | Canberra
London | Melbourne | Sydney
Wellington | Washington DC