Convergence of Physical Access Control Systems (PACS) and Logical Access Control (LACS)

Our digital world has evolved into an ecosystem, with a need to protect the chain of trust via converged credentials. Our access control systems are no longer only physical. Users can access systems from many different devices, day or night from anywhere in the world.

Jellyfish not only elevates how you manage current security components, it also enhances future security capabilities. The convergence of systems creates a scalable infrastructure which grows with devices, networks and most importantly: People.

Access Control Systems

Access control and event monitoring systems provide an additional layer of network security.  Implementing an Access Control System within your organisation improves governance and compliance capabilities. With Jellyfish this is achieved at the organisational level and this provides oversight to all other levels.

Cogito Access Control

Cogito’s flagship Access Control System, Jellyfish provides modular layers of cross-organisational security. Jellyfish has been designed with organisational complexity in mind, and built to unify existing architectures to create a secure ecosystem across your organisation. 

Scenario 1

Your physical access card communicates with the card reader on the door, the door reader then tells your computer (logical) that you have entered the office premise, and allows you to logon to your device. In this scenario the entire office environment has gone through a security check, and you’re good to go.

Scenario 2

Your physical access card has not registered against the door reader. Jellyfish detects unusual activity and locks any potential unauthorised device access. The complexities of creating this secure environment, which acts in real-time are all contained in Jellyfish.

Case Study

Convergence of Physical AccesS Cyber security

Our client’s goal was to develop automatic workflows to centrally manage all of their security systems in one place. Cogito Group implemented Jellyfish to connect our client’s disparate security systems.

The Jellyfish Solution

Jellyfish allows a conversation between multiple protection applications by sending dynamic triggers which allow one system to respond when unusual activity occurs in another system. Jellyfish uses sensor fusion to detect and respond before a breach occurs.

Factsheet

Traditionally, physical access control is out of scope with the use of logical access control, Jellyfish changes this. Download the factsheet to learn more.

Benefits

Layers of security with just one tool

Cogito Group’s Jellyfish is a complete and integrated cyber security platform, which:

  • Offers the cost benefits of a cloud service
  • Improves productivity of resources
  • Improves transparency through monitoring, auditing, reporting of security breaches
  • Highly scalable through a customised modular approach
  • Automated workflows
  • Reduced management efforts

Australia

1800 COGITO (264486)

or +61 2 6140 4494

New Zealand

0800 COGITO (264486)

or +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

Auckland | Brisbane | Canberra | London | Melbourne | Sydney | Washington DC| Wellington 

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you