Jellyfish

Jellyfish

Cogito Group
+
+
Visit Website

About

Jellyfish has been developed as a modular solution. We have significantly improved the way identity, credentials, access and other security products are managed by developing a series of connectors (Cognectors). These connectors enable the creation of automatic workflows, pass data through disparate systems and use triggers on one platform (example PACS) to affect another (example LACS). The Cognectors feed data from disparate systems into the Service Bus. This enables a number of benefits including enhanced monitoring and reporting of activity. Access to systems and building areas can seamlessly be added and removed as people join, move within, or leave an organisation through existing HR functions. Jellyfish uses modern authentication protocols and adaptive support to provide integration with logical and physical access control systems. Jellyfish focuses on future-proofing security, using emerging standards and multi-factor authentication.

About

Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a cybersecurity command and control platform

Audience

Organizations seeking comprehensive password and passkey, secrets, connection and privileged access management solutions. Keeper delivers solutions for organizations of all sizes, ranging from small home offices to global enterprises. Holding compliance certifications in FedRAMP, StateRAMP, GDPR, ISO 27001, SOC2 and more, Keeper is secure to use in any industry.

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$2.00 per user, per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 4.8 / 5
ease 4.8 / 5
features 4.8 / 5
design 4.8 / 5
support 4.8 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cogito Group
Founded: 2011
Australia
cogitogroup.net/jellyfish/

Company Information

Keeper Security
Founded: 2009
United States
keepersecurity.com

Alternatives

Alternatives

Vault One

Vault One

VaultOne Software
Proton Pass

Proton Pass

Proton AG
Cisco Duo

Cisco Duo

Cisco

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Identity Management Features

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Password Management Features

Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management

Single Sign On Features

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Integrations

Active Directory
Amazon S3
Authy
Cisco Duo
Devolutions Remote Desktop Manager
IBM QRadar SIEM
JumpCloud
Microsoft 365
Microsoft Entra ID
MyLenio
Okta
OneLogin
Oracle CASB
Palo Alto Networks Next-Generation Firewalls
Ping Identity
Shift
Sophos Intercept X Endpoint
Trend Micro Cloud App Security
Vormetric Data Security Platform

Integrations

Active Directory
Amazon S3
Authy
Cisco Duo
Devolutions Remote Desktop Manager
IBM QRadar SIEM
JumpCloud
Microsoft 365
Microsoft Entra ID
MyLenio
Okta
OneLogin
Oracle CASB
Palo Alto Networks Next-Generation Firewalls
Ping Identity
Shift
Sophos Intercept X Endpoint
Trend Micro Cloud App Security
Vormetric Data Security Platform
Claim Jellyfish and update features and information
Claim Jellyfish and update features and information