The Cogito Group Brochure comprehensively details the services we specialise in. Today threats need to be managed in a way that combines encryption, access policies, key management, content security and of course, authentication and authorisation.
We collated use cases to highlight what we do, including: public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions.
Factsheets and Datasheets
Cogito Group are digital security experts specialising in enabling technology that keeps your physical, logical and cloud-based data and infrastructure safe. Cogito Group will protect your information: where ever it sits and how ever it is received.
Read about Cogito Group’s breadth of experience in Defence and Intelligence agencies, Card Management Systems, Sustainment, Security Management, Security Strategy, End User Computing and more.
This factsheet describes benefits of moving to cloud storage, as well as security issues faced when moving to the cloud, and how organisations can help better protect their cloud services.
Encryption is the process of converting plain text to cipher text that is non-readable. The algorithmic schemes used to encrypt and decrypt the information are referred to as encryption algorithms.
Key management requires careful consideration and it involves identifying who holds the keys; how they are generated and distributed; the process for rotation, and how the keys are protected when stored.
Tokenisation is an approach for the protection of sensitive data is the use of data substitution with a token as a replacement for a real data. Read the factsheet for a detailed summary.
Identity Management solutions provide strong authentication to ensure users and devices accessing your network are who they claim to be. Read how we deploy Identity Management as a service.
Cogito Group has developed a customisable modular approach to balance security, usability and cost effectiveness: Jellyfish. This factsheet provides an overview on Jellyfish’s features and benefits, and how it works.
Cogito Group’s Jellyfish is a complete and integrated cyber security platform. This factsheet provides a comprehensive list of modules and features currently available on Jellyfish.
Registration is the process of a user being provisioned into and identity management or credential issuance system. Evidence of Identity (EOI) is the information that an individual presents at registration to prove who they are.
IT Service Management (ITSM) tools facilitate the design, planning, delivery, control and operation of IT systems. Cogito Group’s Jellyfish integrates with ITSM tools for simplicity, ease of use and enhanced performance. Two examples of ITSM tools which Jellyfish integrate with are: ServiceNow and BMC’s Remedy Suite.
Jellyfish: Cyber Security Command Control Platform
Presented by Richard Brown, CEO Cogito Group, at the 2018 iAwards – August 2018
Cloud Security: Constant innovation without constant capital expenditure
Presented by Richard Brown, CEO Cogito Group, at the CIO Summit – July 2017
Cloud Security: Overview
Presented by Richard Brown, CEO Cogito Group, at Entrust Datacard – October 2016
State of the SSL/TLS Industry: Where Are We Today / Future Trends & Changes
Presented by Jay Schiavo, Director of Products and Markets at Entrust Datacard – October 2016
Trusted Identities | Secure Transaction
Presented by Evan O’Regan, Director of Product Management for Authentication at Entrust Datacard – October 2016
The Changing Face of Cyber Security
Presented by Richard Brown, CEO Cogito Group, at the Military Communications and Information Systems (MilCIS) Conference – November 2016
Unlocking the opportunities SafeNet and Gemalto
Presented by Richard Brown, CEO Cogito Group, at Gemalto and SafeNet APAC Summit – May 2015
Presented by Richard Brown, CEO Cogito Group at NextTech – May 2015
Unlocking & Locking Big Data: Defending the Data Lake
Presented by Richard Brown, CEO Cogito Group, at CeBIT Campus Session | May 2015
Security Risk Management Plan
A strategic Security Risk Management Plan (SRMP) is a foundation document which communicates the security issues that are important to organisations and identifies approches to reduce security risks.
Statement of Applicability
A Statement of Applicability (SoA) is the central document that defines how you will implement a large part of your information security. The SoA is the main link between the risk assessment and treatment and the implementation of your information security.
Security System Plan
The purpose of a system security plan (SSP) is to provide an overview of the security requirements of the system and describe the controls in place or planned to meet those requirements.
Wi-Fi is a key component of enterprise networking, this factsheet explains how certificate authentication and PKI secure your network.
AU: +61 2 6140 4494
NZ: +64 4909 7580
Auckland | Brisbane | Canberra
Melbourne | Sydney | Wellington