Convergence of Physical Access Control Systems (PACS) and Logical Access Control (LACS)

As the number of people, devices, services and connections continue to grow by the billions, our systems are no longer only on our physical premises. They are accessed by many devices any time, day or night from anywhere in the world.

Jellyfish not only elevates how you manage current security components, it also enhances future security capabilities, as the convergence of systems creates a scalable infrastructure which grows with devices, networks and most importantly people.

Scenario 1

Your physical access card talks with the card reader on the door, the door reader then tells your computer (logical) that you have entered the office premise, and allows you to logon to your device. In this scenario the entire office environment has gone through a security check, and you’re good to go.

Scenario 2

Your physical access card has not registered against the door reader. Jellyfish detects unusual activity and locks any potential unauthorised device access. The complexities of creating this secure environment, which acts in real-time are all contained in Jellyfish.

The Jellyfish Solution

Jellyfish allows a conversation between multiple protection applications


Jellyfish sends dynamic triggers which allow one system to respond when unusual activity occurs in another system


Jellyfish combines multiple sensors and applications to detect and respond before a breach occurs


Layers of Security With Just One Tool

Cogito Group’s Jellyfish is a complete and integrated cyber security platform, which:

  • Offers the cost benefits of a cloud service
  • Improves productivity of resources
  • Improves transparency through monitoring, auditing, reporting of security breaches
  • Highly scalable through a customised modular approach
  • Automated workflows
  • Reduced management efforts