Protect your Organisation from threats

I N S I D E    A N D    O U T 

Award-winning technology, purpose-built for agility

Authentication Solutions

Identity Management

Access Management

Threat Visibility and Protection

Sustainment Services

JELLYFISH: Cyber Security Command and Control Centre

Jellyfish is a next generation cyber security platform designed to dynamically protect data and enhance the situational awareness of cyber threats. It actively counters and responds to new threat landscapes and prevents data breaches by intelligently combining data from multiple sensors and applications.

Cogito Group

Capability Statement

We collated use cases to highlight what we do, including: Public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions.

Latest Blog Posts

Best Browsers for Privacy

It’s no secret that Google loves our data, keeping track of what we click, search for, and scroll through.   Google’s own browser, Chrome, is the...

read more

Best Browsers for Privacy

It’s no secret that Google loves our data, keeping track of what we click, search for, and scroll through.   Google’s own browser, Chrome, is the first choice among desktop users. According to Gartner, personal data archives are the biggest area for privacy risks. For...

Pros and Cons of Amazon Web Services

Next to Microsoft’s Azure, Amazon Web Services is one of the largest, most trusted, and most cost-effective cloud-based business solutions.  If you're looking for a cloud-based business solution, we've compiled a list of the pros and cons of Amazon Web Services. But...

Emerging Trends in Cyber Crime 2020

Cybercrime is the fastest growing crime across the US. And the global cost could exceed $6 trillion by 2021. These costs comprise damage to data, loss of money, and loss of personally identifiable information.  With the recent implementation of the GDPR, there has...

Google Algorithm Updates 2020

Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates prioritise the most relevant results for search queries.  Changes to the algorithm can impact websites and where they rank in...

Active Directory Security Best Practices

This article forms part 3 of our discussion on Group Policy. For articles 1 and 2 refer here: 1. Do you need a group policy? 2. Group policy best practices   What is Active Directory?   Active Directory is an Identity and Access Management tool (IAM) created by...

Emerging Trends in Cyber Crime 2020

Cybercrime is the fastest growing crime across the US. And the global cost could exceed $6 trillion by 2021. These costs comprise damage to data, loss of money, and loss of personally identifiable information.  With the recent implementation of the GDPR, there has...

Google Algorithm Updates 2020

Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates prioritise the most relevant results for search queries.  Changes to the algorithm can impact websites and where they rank in...

Our Clients

Australia

1800 COGITO (264486)

or +61 2 6140 4494

New Zealand

0800 COGITO (264486)

or +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

Auckland | Brisbane | Canberra | London | Melbourne | Sydney | Washington DC| Wellington