The Cogito Group Brochure comprehensively details the services we specialise in. Today threats need to be managed in a way that combines encryption, access policies, key management, content security and of course, authentication and authorisation.
We collated use cases to highlight what we do, including: public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions.
Factsheets and Datasheets
Cogito Group are digital security experts specialising in enabling technology that keeps your physical, logical and cloud-based data and infrastructure safe. Cogito Group will protect your information: where ever it sits and how ever it is received.
Read about Cogito Group’s breadth of experience in Defence and Intelligence agencies, Card Management Systems, Sustainment, Security Management, Security Strategy, End User Computing and more.
This factsheet describes benefits of moving to cloud storage, as well as security issues faced when moving to the cloud, and how organisations can help better protect their cloud services.
Encryption is the process of converting plain text to cipher text that is non-readable. The algorithmic schemes used to encrypt and decrypt the information are referred to as encryption algorithms.
Key management requires careful consideration and it involves identifying who holds the keys; how they are generated and distributed; the process for rotation, and how the keys are protected when stored.
Tokenisation is an approach for the protection of sensitive data is the use of data substitution with a token as a replacement for a real data. Read the factsheet for a detailed summary.
Identity Management solutions provide strong authentication to ensure users and devices accessing your network are who they claim to be. Read how we deploy Identity Management as a service.
Cogito Group has developed a customisable modular approach to balance security, usability and cost effectiveness: Jellyfish. This factsheet provides an overview on Jellyfish’s features and benefits, and how it works.
Cogito Group’s Jellyfish is a complete and integrated cyber security platform. This factsheet provides a comprehensive list of modules and features currently available on Jellyfish.
Registration is the process of a user being provisioned into and identity management or credential issuance system. Evidence of Identity (EOI) is the information that an individual presents at registration to prove who they are.
IT Service Management (ITSM) tools facilitate the design, planning, delivery, control and operation of IT systems. Cogito Group’s Jellyfish integrates with ITSM tools for simplicity, ease of use and enhanced performance. Two examples of ITSM tools which Jellyfish integrate with are: ServiceNow and BMC’s Remedy Suite.
A strategic Security Risk Management Plan (SRMP) is a foundation document which communicates the security issues that are important to organisations and identifies approches to reduce security risks.
A Statement of Applicability (SoA) is the central document that defines how you will implement a large part of your information security. The SoA is the main link between the risk assessment and treatment and the implementation of your information security.
The purpose of a system security plan (SSP) is to provide an overview of the security requirements of the system and describe the controls in place or planned to meet those requirements.
Contact us to
AU: +61 2 6140 4494
NZ: +64 4909 7580
Auckland | Brisbane | Canberra | Melbourne | Sydney | Wellington