Jellyfish

Jellyfish

Cogito Group
+
+

Related Products

  • Keeper Security
    1,752 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • FusionAuth
    178 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    613 Ratings
    Visit Website
  • Auth0
    1,008 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • 1Password
    16,550 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website

About

Jellyfish has been developed as a modular solution. We have significantly improved the way identity, credentials, access and other security products are managed by developing a series of connectors (Cognectors). These connectors enable the creation of automatic workflows, pass data through disparate systems and use triggers on one platform (example PACS) to affect another (example LACS). The Cognectors feed data from disparate systems into the Service Bus. This enables a number of benefits including enhanced monitoring and reporting of activity. Access to systems and building areas can seamlessly be added and removed as people join, move within, or leave an organisation through existing HR functions. Jellyfish uses modern authentication protocols and adaptive support to provide integration with logical and physical access control systems. Jellyfish focuses on future-proofing security, using emerging standards and multi-factor authentication.

About

Transform your cloud footprint from a black box to an open book with our industry-leading CASB, an integrated component of Skyhigh Security SSE. Discovers sensitive data at rest within cloud services while remediating violating content. Applies real-time controls to protect data as user activity occurs including granular content sharing and access controls. Provides the world’s largest and most accurate registry of cloud services based on a customizable 261-point risk assessment to support risk-aware cloud governance. Captures a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics. Leverages machine learning to detect activity signaling negligence and malicious behavior including insiders stealing sensitive data. Protects sensitive structured data with peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a cybersecurity command and control platform

Audience

Organizations of all kinds that need a powerful CASB solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cogito Group
Founded: 2011
Australia
cogitogroup.net/jellyfish/

Company Information

Skyhigh Security
Founded: 2022
United States
www.skyhighsecurity.com/en-us/products/cloud-access-security-broker.html

Alternatives

Alternatives

Check Point CloudGuard

Check Point CloudGuard

Check Point Software Technologies
Vault One

Vault One

VaultOne Software
Forcepoint CASB

Forcepoint CASB

Forcepoint

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Integrations

Avatier Identity Anywhere
Bitdefender GravityZone
DigiCert Secure Site
Oracle CASB
Palo Alto Networks Next-Generation Firewalls
SailPoint
Sophos Intercept X Endpoint
Spirion
Trend Micro Cloud App Security
Vormetric Data Security Platform
WSO2 Identity Server

Integrations

Avatier Identity Anywhere
Bitdefender GravityZone
DigiCert Secure Site
Oracle CASB
Palo Alto Networks Next-Generation Firewalls
SailPoint
Sophos Intercept X Endpoint
Spirion
Trend Micro Cloud App Security
Vormetric Data Security Platform
WSO2 Identity Server
Claim Jellyfish and update features and information
Claim Jellyfish and update features and information
Claim Skyhigh Security Cloud Access Security Broker (CASB) and update features and information
Claim Skyhigh Security Cloud Access Security Broker (CASB) and update features and information