APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Gov and Public
    • Cogito Group
    Previous
    Next

    Cogito Group: Safeguarding Organisations with Cloud Security Services

    Richard Brown,MD, Cogito GroupRichard Brown, MD
    Cyber security is a critical component in protecting an entity’s infrastructure and its key asset, data. If that entity is a Government body, the significance of protecting that data through cyber security solutions intensifies. This is the reason why when the New Zealand Government moved to a cloud-first strategy to drive digital transformation and agreed to new measures to accelerate the adoption of cloud services by their agencies, cyber security remained a major concern. To augment security and remove it as a barrier to change, the Government initiated an association with an Australian firm, Cogito Group. Richard Brown, MD, Cogito Group says, “Cogito Group specializes in niche cyber security solutions. Currently we provide Authentication as a Service, such as Public Key Infrastructure and Identity Brokerage as a service to New Zealand Government agencies.” The firm also developed the backend product, Jellyfish, that supports the service.

    Jellyfish, Cogito Group’s flagship product, has been the driving force for the company to stay at the forefront in the cyber security space. Richard Brown explains, “Jellyfish has been developed to solve the problems that we see customers have with managing and protecting data. Increasingly we are seeing workers that are mobile; applications are in the ‘cloud’ and access to networks through a much broader range of devices. We also need to access this data in more sophisticated ways. Many organisations however, still rely heavily in what we refer to as ‘legacy’ systems. Often these critical systems were never designed to integrate with other systems and applications. Security tools that don’t talk to one another can create huge security gaps. A lot of organisations apply the band-aid solution of writing ad hoc custom code that partially addresses these issues, but this is costly to maintain and manage.

    Cogito Group protects data not only from unauthorized access and disclosure, but also from it being altered by an unauthorized third party wherever that data may be and however it gets there


    Jellyfish has been designed to tackle all these issues through integrating disparate systems and can actually make the whole more than the sum of its parts.”

    “Jellyfish protects data not only from unauthorized access and disclosure, but also from being altered by an unauthorized third party or a trusted insider with malicious intent. This assists in the detection and prevention of fraud or other malicious activities by third parties or your trusted insiders. It’s your one stop shop to manage your security tools and requirements”, details Richard.

    To address the authentication related challenges, Cogito Group provides Jellyfish as part of its Authentication as a Service offering, which covers a number of managed security solutions including full Identity and Access Management, Credential Management (such as Public Key Infrastructure and One Time Passwords), cloud access security brokerage, and other security services. Cogito provides a framework to manage the full lifecycle of users, credentials, roles, systems, and devices. Jellyfish provides a foundation for automation, confidentiality, data integrity, authentication, non-repudiation, and threat detection. Cogito’s Jellyfish solution is a multi-tenanted solution that can even allow customers to consume services from one another and from multiple cloud vendors, all with one rather than hundreds of separate connections. It can even ease the burden of multiple logons to services providing a secure, but seamless experience for users consuming cloud and internal services.

    Cogito Group has relationships with a number of government agencies across Australia and New Zealand. Jellyfish, as its flagship product, will continue to evolve to ensure that it provides the most holistic view of the organisations’ security posture and fills the emerging gaps in the security landscape. Richard is of the view that as organisations adapt to technological changes, utmost security must also be ensured. He makes a valid point by adding, “Security must ensure strong authentication and encryption are essential components in a layered approach to data protection. That’s what we’re focused on.”
    Previous
    Next
    Share this Article:
    Tweet

    Cogito Group Info

    Company
    Cogito Group

    Headquarters
    .

    Management
    Richard Brown, MD

    Description
    Renders digital identity, authentication and security solutions, to assist its clients with managing cyber risk, protecting data, ensuring compliance, and defending against vulnerabilities and threats

    2017

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    CIO Speaks

    Previous Next
    Cloud Computing: Pharma Takes the Plunge

    Andy Newsom, SVP & CIO, CSL Behring

    WiFi 6, 5G and the Internet of Things (IoT)

    Mark Badal, CIO, IT&E

    In Augmented Reality, Size Matters

    Jason Blackman, CIO, Carsales.Com

    Enhancing Customers

    Marc A. Hamer, VP & CIO, Babcock & Wilcox Enterprises, Inc.

    Cloud or On-Premise? When Would The Question End?

    Kevin Soh, CIO and Director, e-Strategies, BH Global Corporation

    Responsible AI: The Human-Machine Symbiosis

    Sal Cucchiara, CIO & Head Of Wealth Management Technology, Morgan Stanley

    Asian Development Bank: Using Emerging Digital Technologies for the Common Good

    Shirin Hamid, CIO, & CTO, Asian Development Bank

    Diversity and Inclusion can Drive Better Solutions for Clients and Employee Engagement

    Linda K. Lannen, CIO & Sr. VP, Kleinfelder

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    The Great Tech Arms Race: How Changing Consumer Behaviour and Expectation is Driving Ecommerce Transformation

    Brett Raven, CIO, Big Red Group

    Relying On Technologies To Transform Data Into Information

    Mark Ohlund, CIO & Sr. V.P., Armada Supply Chain Solution

    3D Printing Requires Wildly Different Thinking

    James MacLennan, SVP & CIO, IDEX Corporation

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/cogito-group