Jellyfish for All Levels of Government
Jellyfish has been purposely designed as a modular platform, agile and adaptive to change. Jellyfish is currently made up of modules that are designed to either be stand alone to address a singular pain point of a business or integrate to enable enterprise security. Importantly, we are designing our modules to integrate and evolve to ensure our clients are armed with the tools to combat new and emerging malicious cyber activity.
ASD Essential Eight
1. Identify which systems require protection
2. Identify which adversaries are most likely to target their systems
3. Identify what level of protection is required
1. Application Whitelisting
This strategy ensures that all non-approved applications, including malicious code, are prevented from executing.
Configure Microsoft Office macro settings
Restrict administrative privileges
Admin accounts are the ‘keys to the kingdom’ and adversaries use these accounts to gain full access to information and systems.
Multi-factor authentication
2. Patch Applications
This strategy prevents security vulnerabilities in applications can be used to execute malicious code in systems.
User application hardening
Patch Operating Systems
Security vulnerabilities in operating systems can be used to fruther the compromise of systems.
Daily Backups

Read about Jellyfish for SMEs
Want to Learn More about Jellyfish?

AU: +61 2 6140 4494
NZ: +64 4909 7580
Auckland | Brisbane | Canberra | Melbourne | Sydney | Wellington