JELLYFISH FEATURES

ABOUT JELLYFISH

Jellyfish is a complete, integrated cyber security platform. Providing several base security services in a single glass pane. The platform connects disparate authorisation and access components. Giving organisations singular visibility for threat detection and prevention.

With its modular approach Jellyfish surpasses traditional centralised cyber security management systems. Jellyfish manages both cloud-based and on-premises systems. With Jellyfish, Cogito Group has improved our client’s governance and compliance abilities.

CENTRALISED CYBER SECURITY

Jellyfish operates as a centralised cyber security control system providing end-to-end visibility across your network. This gives Jellyfish a unique advantage in threat detection and risk mitigation.

WHAT YOU GET

Jellyfish provides the most innovative and comprehensive set of requirements enabling security, privacy, confidentiality, integrity, and availability of all information.

Identity Management

– Provide strong authentication to ensure users accessing your network are who they claim to be

– Network authentication

– Digital signatures

– Full identity lifecycle management

Credential Management

– Manage associations between an identity and their issued credentials

– Manage Lifecycle of trusted tokens

– Management of virtual smart cards and credentials to smartphones and other mobile devices

Access Management

– Integrated Physical and Logical Access

– Web-based Access to services

– HR workflow – access to workflow

– Access Management based on the known and assured identity

Protected Data Store

– Provides key management

– Transparent encryption of structured, sensitive data residing in:

    – Databases

    – Files

    – File Systems

    – Storage Units

Mobile Device Management

– Remotely manage the entire lifecycle of a device

– Online authentication with a convenient single ID password

Other Features

– Advanced protection to data

– Sophisticated monitoring services

– Mature auditing services

– Comprehensive reporting and analytics functionality

– Integration with internal directories and databases

– Integration with legacy systems

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you