If you clicked on this post hoping to read about marine animals you may be in the wrong place, but stick around because you are about to learn 7 things about Cogito Group’s cyber security software: Jellyfish. Instead of stinging you, our Jellyfish will prevent you from getting stung by threats.
1. Jellyfish can be deployed in the cloud or on premiseOur systems are no longer just on our physical premises, but in the cloud and accessible via the internet – and they are accessed by many devices any time, day or night from anywhere in the world. To adapt to this changing landscape, Jellyfish can be deployed as a Service (in the cloud) or on premise.
2. Jellyfish components are buildableThe Jellyfish solution is modular. It is designed as an integrated cohesive stack that is purpose-built to handle complexity. For example, one customer may need Identity Management and Mobile Device Management in their stack, while the next customer may only need Identity Management. This level of flexibility is possible with Jellyfish, as it is not a set and forget solution, it is organic and will grow with your security requirements.
3. Jellyfish is low costDue to the modular nature of the software, Jellyfish is very cost effective when compared to other solutions which connect identities – such as users, devices and services – to each other. Jellyfish allows you to use what you need, rather than locking you in to all features.
4. Jellyfish provides a single interfaceTypically security systems are managed as individual systems, for example one person looks after Access Management and another looks after Identity Management. Jellyfish removes these barriers by putting all systems in a single interface.
5. Jellyfish transforms your security platformWith all security systems in one interface, Jellyfish enables communications between the systems, which transforms their capabilities – a security system that may have only been able to perform 2 tasks before is now able to perform 20 when plugged in to Jellyfish. Take these examples:
- Identity Management: Identity management with CRUD operations, data transformation between source and target systems for users and resources and configurable workflows
- Access Management: Access management is able to provide integration with logical and physical access control systems (including integration with legacy systems) through adaptive support for modern authentication protocols as well as emerging standards and multifactor authentication. This ensures access to systems and building areas can seamlessly be added and removed as people join, move within or leave an organisation through existing HR functions.
- Mobile Device Management: The ability exists to manage Mobile Enterprise and BYOD devices from within the system as well as to use these devices as one factor in secure multifactor authentication.
- Credential Management: Credential management services provides administrator with the ability to issue and manage certificates, smartcards, and OTP tokens.