Resources
Brochures
Cogito Group Brochure
The Cogito Group Brochure comprehensively details the services we specialise in. Today threats need to be managed in a way that combines encryption, access policies, key management, content security and of course, authentication and authorisation.
Cogito Group Capability Statement
We collated use cases to highlight what we do, including: public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions.
Factsheets and Datasheets
About Cogito Group: Overview
Cogito Group are digital security experts specialising in enabling technology that keeps your physical, logical and cloud-based data and infrastructure safe. Cogito Group will protect your information: where ever it sits and how ever it is received.
About Cogito Group: Experience
Read about Cogito Group’s breadth of experience in Defence and Intelligence agencies, Card Management Systems, Sustainment, Security Management, Security Strategy, End User Computing and more.
Card Management Systems
A Card Management System (CMS) manages the lifecycle of smartcard. This factsheet describes the benefits of a CMS and examples of how they are securely used today.
Cloud Security Overview
This factsheet describes benefits of moving to cloud storage, as well as security issues faced when moving to the cloud, and how organisations can help better protect their cloud services.
Cloud Access Security Brokerage Architecture
There are two primary methods of providing a CASB service and when organisations adopt a CASB they must decide between: Proxy or API.
Cloud Access Security Brokerage Services
Cloud Access Security Brokerage (CASB) is a series of services which allow for consumers to extend their internal security policies to cloud services.
Convergence of Physical Access Control and Logical Access Control
Traditionally, physical access control is out of scope with the use of logical access control, Jellyfish changes this.
Digital Credentials
Digital credentials are the digital equivalent of a person’s signature on a piece of paper. Read the factsheet to learn more.
Encryption Services: Overview
Encryption is the process of converting plain text to cipher text that is non-readable. The algorithmic schemes used to encrypt and decrypt the information are referred to as encryption algorithms.
Encryption Services: Protecting Your Keys
Key management requires careful consideration and it involves identifying who holds the keys; how they are generated and distributed; the process for rotation, and how the keys are protected when stored.
Encryption Services: Tokenisation
Tokenisation is an approach for the protection of sensitive data is the use of data substitution with a token as a replacement for a real data. Read the factsheet for a detailed summary.
HSM Specialists
High level protection for
transactions, identities and applications.
Identity Management as a Service
Identity Management solutions provide strong authentication to ensure users and devices accessing your network are who they claim to be. Read how we deploy Identity Management as a service.
Jellyfish: Overview
Cogito Group has developed a customisable modular approach to balance security, usability and cost effectiveness: Jellyfish. This factsheet provides an overview on Jellyfish’s features and benefits, and how it works.
Jellyfish: Product Datasheet
Cogito Group’s Jellyfish is a complete and integrated cyber security platform. This factsheet provides a comprehensive list of modules and features currently available on Jellyfish.
Key Management as a Service
Securely store important keys for onpremise and cloud based services
Strong key control and security
Operational benefits of Digital Signatures
Turn operational challenges into meangingful change and eliminate potential distruptions.Â
Public Key Infrastructure: Overview
Public Key Infrastructure (PKI) allows the delivery of security and confidentiality services to electronic businesses solutions, read more in the factsheet.
Registration and EOI
Registration is the process of a user being provisioned into and identity management or credential issuance system. Evidence of Identity (EOI) is the information that an individual presents at registration to prove who they are.
Service Management Integration
IT Service Management (ITSM) tools facilitate the design, planning, delivery, control and operation of IT systems. Cogito Group’s Jellyfish integrates with ITSM tools for simplicity, ease of use and enhanced performance. Two examples of ITSM tools which Jellyfish integrate with are: ServiceNow and BMC’s Remedy Suite.
Smartcards
Smartcards can be used access systems facilities or equipment. They can replace traditional physical access control methods. Read the factsheet for a detailed overview.
Presentations

Jellyfish: Cyber Security Command Control Platform
Presented by Richard Brown, CEO Cogito Group, at the 2018 iAwards – August 2018

Cloud Security: Constant innovation without constant capital expenditure
Presented by Richard Brown, CEO Cogito Group, at the CIO Summit – July 2017

Cloud Security: Overview
Presented by Richard Brown, CEO Cogito Group, at Entrust Datacard – October 2016

State of the SSL/TLS Industry: Where Are We Today / Future Trends & Changes
Presented by Jay Schiavo, Director of Products and Markets at Entrust Datacard – October 2016

Trusted Identities | Secure Transaction
Presented by Evan O’Regan, Director of Product Management for Authentication at Entrust Datacard – October 2016

The Changing Face of Cyber Security
Presented by Richard Brown, CEO Cogito Group, at the Military Communications and Information Systems (MilCIS) Conference – November 2016

Unlocking the opportunities SafeNet and Gemalto
Presented by Richard Brown, CEO Cogito Group, at Gemalto and SafeNet APAC Summit – May 2015

Protecting Data
Presented by Richard Brown, CEO Cogito Group at NextTech – May 2015

Unlocking & Locking Big Data: Defending the Data Lake
Presented by Richard Brown, CEO Cogito Group, at CeBIT Campus Session | May 2015
Security Training

Security Risk Management Plan
A strategic Security Risk Management Plan (SRMP) is a foundation document which communicates the security issues that are important to organisations and identifies approches to reduce security risks.

Statement of Applicability
A Statement of Applicability (SoA) is the central document that defines how you will implement a large part of your information security. The SoA is the main link between the risk assessment and treatment and the implementation of your information security.

Security System Plan
The purpose of a system security plan (SSP) is to provide an overview of the security requirements of the system and describe the controls in place or planned to meet those requirements.

Wi-Fi Security
Wi-Fi is a key component of enterprise networking, this factsheet explains how certificate authentication and PKI secure your network.
Webinar

Building a Foundation of Trust – The Essentials to Understanding Enterprise Encryption Key Management
Increasing mandates around the security of personal data have made encryption for every business. Security experts, including Cogito Group’s Managing Director, Richard Brown, share their experiences in building enterprise-grade encryption.

Australia
1800 COGITO (264486)
or +61 2 6140 4494
New Zealand
0800 COGITO (264486)
or +64 4909 7580
London | Melbourne | Sydney
Washington DC | Wellington