PROTECT YOUR ORGANISATION FROM THREATS

I N S I D E    A N D    O U T

AWARD-WINNING TECHNOLOGY, PURPOSE-BUILT FOR AGILITY

WHAT WE DO

3

Authentication Solutions

Identity Management

Access Management

Threat Visibility and Protection

Sustainment Services

JELLYFISH: Cyber Security Command and Control Centre

Jellyfish is a next generation cyber security platform designed to dynamically protect data and enhance the situational awareness of cyber threats. It actively counters and responds to new threat landscapes and prevents data breaches by intelligently combining data from multiple sensors and applications.

Cogito Group

CAPABILITY STATEMENT

We collated use cases to highlight what we do, including: Public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions.

Latest Blog Posts

Pros and Cons of Azure

Microsoft Azure is a cloud-based business solution designed for ease-of-access managment within organisations that scale from small to large....

read more

Pros and Cons of Azure

Microsoft Azure is a cloud-based business solution designed for ease-of-access managment within organisations that scale from small to large. Cloud-based business solutions have become popular for offering less expense, less downtime, and often more security, with a...

Data Compromise – What the AWS Engineer Leak can Teach us

When an engineer working for AWS accidentally made almost a gigabyte worth of data public, resulting in a massive data compromise, it was Californian Cyber Security company Upguard that came to the rescue, contacting AWS to inform them of the breach. Greg Pollock,...

Iranian Spear-Phishing Attacks Escalate amid Rising Tensions with U.S.

Recent reports of spear-phishing emails targeted at U.S Government agencies have fed into fears that offensive Iranian cyber-attacks could be increasing amid rising tensions between the Middle-Eastern country and the U.S. Earlier this month the Trump administration...

The Biggest Mistakes Businesses Make Using PKI

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...

How to find and fix Vulnerable Certificates in your Network

1 in 5 unique IP addresses are still using the vulnerable SHA-1 certificate, according to research by machine identity protection agency Venafi.   There are multiples issues SSL certificates can be exposed to, including vulnerabilities from attacks like POODLE or...

Iranian Spear-Phishing Attacks Escalate amid Rising Tensions with U.S.

Recent reports of spear-phishing emails targeted at U.S Government agencies have fed into fears that offensive Iranian cyber-attacks could be increasing amid rising tensions between the Middle-Eastern country and the U.S. Earlier this month the Trump administration...

The Biggest Mistakes Businesses Make Using PKI

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...