PROTECT YOUR ORGANISATION FROM THREATS

I N S I D E    A N D    O U T

AWARD-WINNING TECHNOLOGY, PURPOSE-BUILT FOR AGILITY

WHAT WE DO

3

Authentication Solutions

Identity Management

Access Management

Threat Visibility and Protection

Sustainment Services

JELLYFISH: Cyber Security Command and Control Centre

Jellyfish is a next generation cyber security platform designed to dynamically protect data and enhance the situational awareness of cyber threats. It actively counters and responds to new threat landscapes and prevents data breaches by intelligently combining data from multiple sensors and applications.

Cogito Group

CAPABILITY STATEMENT

We collated use cases to highlight what we do, including: Public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions.

Latest Blog Posts

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy, and how it works. This article...

read more

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy, and how it works. This article will cover the practical implementation steps behind setting up a group policy. Group Policy is designed to make dealing...

Do you Need a Group Policy?

This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how to implement best practice for use of these services within an entity. What is Group Policy? Group Policy is a method...

Pros and Cons of Azure

Microsoft Azure is a cloud-based business solution designed for ease-of-access managment within organisations that scale from small to large. Cloud-based business solutions have become popular for offering less expense, less downtime, and often more security, with a...

Data Compromise – What the AWS Engineer Leak can Teach us

When an engineer working for AWS accidentally made almost a gigabyte worth of data public, resulting in a massive data compromise, it was Californian Cyber Security company Upguard that came to the rescue, contacting AWS to inform them of the breach. Greg Pollock,...

Iranian Spear-Phishing Attacks Escalate amid Rising Tensions with U.S.

Recent reports of spear-phishing emails targeted at U.S Government agencies have fed into fears that offensive Iranian cyber-attacks could be increasing amid rising tensions between the Middle-Eastern country and the U.S. Earlier this month the Trump administration...

Pros and Cons of Azure

Microsoft Azure is a cloud-based business solution designed for ease-of-access managment within organisations that scale from small to large. Cloud-based business solutions have become popular for offering less expense, less downtime, and often more security, with a...

Data Compromise – What the AWS Engineer Leak can Teach us

When an engineer working for AWS accidentally made almost a gigabyte worth of data public, resulting in a massive data compromise, it was Californian Cyber Security company Upguard that came to the rescue, contacting AWS to inform them of the breach. Greg Pollock,...

AU: +61 2 6140 4494

NZ: +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

 

Auckland | Brisbane | Canberra
London | Melbourne | Sydney
Wellington | Washington DC