What is Jellyfish?

Jellyfish is a next generation cyber security platform designed to dynamically protect data and enhance the situational awareness of cyber threats. It actively counters and responds to new threat landscapes and prevents data breaches by intelligently combining data from multiple sensors and applications.

Key Jellyfish Features

• Credential Management • Identity and Access Management • Encryption • Discovery • Data Sync and Replication • Mobile Device Management • Vulnerability • App Management • Audit, Intelligent Analytics and Reporting • Biometrics •

Cogito Group

Capability Statement

We collated use cases to highlight what we do, including: public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions. 

Our Clients

Latest Blog Posts

Cogito Group’s Holiday Wishlist

Cogito Group’s Holiday Wishlist

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...

Five Computer Security Myths, Debunked

This article was first published by Alan Henry on LifeHacker.com on 21 February 2019, and has been adapted for publishing on the Cogito Ergo Sum Blog Some computer security myths and stories that keep getting passed around, even though they're clearly not true. There...

Cogito Group’s Holiday Wishlist

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...

Success in the Australian Technologies Competition

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

Understanding Derived Credentials

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...

Success in the Australian Technologies Competition

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

Let’s secure

your data

Start a Discussion