Discovery Module | CogEXPLORE
The discovery component performs all network discovery and identification of certificates within network segments. Where it is permitted, it will traverse additional network segments to continue discovery. Where not permitted to traverse network segments, additional agents can be deployed to each segment to provide maximum coverage.
Email Encryption | CogLOCK
Email gateway encryption allows organisations to encrypt their emails before it gets stored on the Microsoft server. This video shows how email gateway encryption is applied to the Outlook Desktop App.
This video shows sending emails, receiving emails, and searching emails using the email encryption proxy Outlook Web App, and compares these operations against the non-proxied Outlook Web App, showing that the data is encrypted when not accessing it through the email encryption proxy.
The Outlook desktop application can also use the email encryption proxy, with no extra setup required. This means that an organisation can easily integrate email encryption into their current O365 services. This video demonstrates sending and receiving emails using the Outlook desktop that is connected to the email encryption proxy, and connected directly to the Microsoft O365 service, and then comparing the outcomes of these events, showing that connecting directly to O365 means that the data is not getting decrypted.
Endpoint Protection | CogEP
The connection wireless devices to organisational networks creates attack paths for security threats. Endpoint Protection protects networks that are remotely bridged to devices, such as laptops, mobile phones and tablets. This tutorial shows Jellyfish’s Endpoint Protection capabilities, including: connected clients, outdated clients, and device scans.
Identity Management Module | CogID
The identity management module includes a search tool, and functions to create user, create device and create role. In this tutorial we demonstrate how to perform a search. Through the use of optional additional search terms and logical operators you can quickly gain accurate search results across large user, device and certificate bases.
In this tutorial we demonstrate how to create a new user. The video will take you through the steps of filling out the new user form as well as selecting an organizational unit to put the user under and selecting a role for the user.
In this tutorial we demonstrate how to create a new device. The video will take you through the steps of filling out the new device form, allowing you to then manage the device through the Jellyfish interface.
In this tutorial we demonstrate how to create a new user role. The video will take you through the steps of filling out the new role form as well as selecting an organisation to apply the role to.
AU: +61 2 6140 4494
NZ: +64 4909 7580
Auckland | Brisbane | Canberra
London | Melbourne | Sydney
Wellington | Washington DC