Cogito Group Brochure

The Cogito Group Brochure comprehensively details the services we specialise in. Today threats need to be managed in a way that combines encryption, access policies, key management, content security and of course, authentication and authorisation.

Cogito Group Capability Statement

We collated use cases to highlight what we do, including: public key infrastructure, threat visibility, identity management, authentication solutions, cloud access security brokerage, supportability, hardware services, and encryption solutions.

Factsheets and Datasheets

About Cogito Group: Overview

Cogito Group are digital security experts specialising in enabling technology that keeps your physical, logical and cloud-based data and infrastructure safe. Cogito Group will protect your information: where ever it sits and how ever it is received.

About Cogito Group: Experience

Read about Cogito Group’s breadth of experience in Defence and Intelligence agencies, Card Management Systems, Sustainment, Security Management, Security Strategy, End User Computing and more.

Card Management Systems

A Card Management System (CMS) manages the lifecycle of smartcard. This factsheet describes the benefits of a CMS and examples of how they are securely used today.

Cloud Security Overview

This factsheet describes benefits of moving to cloud storage, as well as security issues faced when moving to the cloud, and how organisations can help better protect their cloud services.

Cloud Access Security Brokerage Architecture

There are two primary methods of providing a CASB service and when organisations adopt a CASB they must decide between: Proxy or API.

Cloud Access Security Brokerage Services

Cloud Access Security Brokerage (CASB) is a series of services which allow for consumers to extend their internal security policies to cloud services.

Digital Credentials

Digital credentials are the digital equivalent of a person’s signature on a piece of paper. Read the factsheet to learn more.

Encryption Services: Overview

Encryption is the process of converting plain text to cipher text that is non-readable. The algorithmic schemes used to encrypt and decrypt the information are referred to as encryption algorithms.

Encryption Services: Protecting Your Keys

Key management requires careful consideration and it involves identifying who holds the keys; how they are generated and distributed; the process for rotation, and how the keys are protected when stored.

Encryption Services: Tokenisation

Tokenisation is an approach for the protection of sensitive data is the use of data substitution with a token as a replacement for a real data. Read the factsheet for a detailed summary.

Identity Management as a Service

Identity Management solutions provide strong authentication to ensure users and devices accessing your network are who they claim to be. Read how we deploy Identity Management as a service.

Jellyfish: Overview

Cogito Group has developed a customisable modular approach to balance security, usability and cost effectiveness: Jellyfish. This factsheet provides an overview on Jellyfish’s features and benefits, and how it works.

Jellyfish: Product Datasheet

Cogito Group’s Jellyfish is a complete and integrated cyber security platform. This factsheet provides a comprehensive list of modules and features currently available on Jellyfish.

Public Key Infrastructure: Overview

Public Key Infrastructure (PKI) allows the delivery of security and confidentiality services to electronic businesses solutions, read more in the factsheet.

Registration and EOI

Registration is the process of a user being provisioned into and identity management or credential issuance system. Evidence of Identity (EOI) is the information that an individual presents at registration to prove who they are.

Service Management Integration

IT Service Management (ITSM) tools facilitate the design, planning, delivery, control and operation of IT systems. Cogito Group’s Jellyfish integrates with ITSM tools for simplicity, ease of use and enhanced performance. Two examples of ITSM tools which Jellyfish integrate with are: ServiceNow and BMC’s Remedy Suite.


Smartcards can be used access systems facilities or equipment. They can replace traditional physical access control methods. Read the factsheet for a detailed overview.


Cloud Security: Constant innovation without constant capital expenditure

Presented by Richard Brown, CEO Cogito Group, at the CIO Summit – July 2017

Cloud Security: Constant innovation without constant capital expenditure

Presented by Richard Brown, CEO Cogito Group, at the CIO Summit – July 2017

Cloud Security: Overview

Presented by Richard Brown, CEO Cogito Group, at Entrust Datacard – October 2016

State of the SSL/TLS Industry: Where Are We Today / Future Trends & Changes

Presented by Jay Schiavo, Director of Products and Markets at Entrust Datacard – October 2016

Trusted Identities | Secure Transaction

Presented by Evan O’Regan, Director of Product Management for Authentication at Entrust Datacard – October 2016

The Changing Face of Cyber Security

Presented by Richard Brown, CEO Cogito Group, at the Military Communications and Information Systems (MilCIS) Conference – November 2016

Unlocking the opportunities SafeNet and Gemalto

Presented by Richard Brown, CEO Cogito Group, at Gemalto and SafeNet APAC Summit – May 2015

Protecting Data

Presented by Richard Brown, CEO Cogito Group at NextTech – May 2015

Unlocking & Locking Big Data: Defending th Data Lake

Presented by Richard Brown, CEO Cogito Group, at CeBIT Campus Session | May 2015

Security Training

Security Risk Management Plan

A strategic Security Risk Management Plan (SRMP) is a foundation document which communicates the security issues that are important to organisations and identifies approches to reduce security risks.

Statement of Applicability

A Statement of Applicability (SoA) is the central document that defines how you will implement a large part of your information security. The SoA is the main link between the risk assessment and treatment and the implementation of your information security.

Security System Plan

The purpose of a system security plan (SSP) is to provide an overview of the security requirements of the system and describe the controls in place or planned to meet those requirements.

Wi-Fi Security

Wi-Fi is a key component of enterprise networking, this factsheet explains how certificate authentication and PKI secure your network.

Contact us to
learn more