J2 Cyber Security Centre launched

March 2017 News & Events, Information Security

Following months of rigorous testing, J2 Software has announced the launch of its Cyber Security Centre (CSC) which is now commercially available to support businesses focused on improving information security and governance.

John McLoughlin MD J2 Software.
John McLoughlin MD J2 Software.

John McLoughlin, MD, J2 Software, says the CSC was launched in response to growing calls for better security. “It became apparent that the traditional way of doing things is simply no longer working. Breaches are increasing; losses are growing with no apparent end in sight. Cyber-criminal networks are innovating on a daily basis and traditional security is still playing by the same rules.”

McLoughlin highlights the number of businesses today affected by cyber-crime. “One cannot talk to a business today that has not been affected in one way or another by the scourge of cyber-crime. This ranges from malicious or uninformed insiders through to meticulously planned external attacks targeting vital infrastructure and the growing number of ransomware variants seen each day.”

The J2 CSC offers globally competitive security solutions to businesses of all sizes, from enterprise through to SMEs. “SMEs are not only not immune to these threats, but in fact are often targeted by cyber criminals, either externally or internally, as they can be viewed as a softer mark,” says McLoughlin.

“I have seen first-hand how lack of resources, augmented by limited budgets, have prevented companies from providing adequate security and protection for their businesses. The aim of the J2 CSC is to ensure that this is this is no longer the case as it will cost-effectively provide: complete visibility; ongoing monitoring and rapid incident response. Our goal is to incrementally improve our client’s security maturity level with a tailor-made solution for each and every customer – we have no one-size-fits-all solutions.”

Mc Loughlin notes the J2 CSC is not a traditional Security Operations Centre (SOC) as it enables clients with limited resources to accelerate and simplify threat detection and speed up response from a single place. “Our CSC also works with global partners and we share threat information around the world, ensuring that changing and evolving threats are identified and averted as we go. We use actionable threat intelligence to strengthen clients’ defences.”

Mc Loughlin reveals that updated and relevant threat intelligence is the secret weapon.

“The J2 CSC is ready to start improving businesses’ security posture from day one. It will provide visibility and detect threats in real time, facilitating not only remediation of the threat but also identifying the source and location of the attack.”

The CSC has moved beyond managed Security Information and Event Management (SIEM) and includes vulnerability assessments, asset discovery, network and machine intrusion. “It also provides endpoint protection, managed encryption, internet security, machine learning and user behavioural monitoring – all of which go to ensure that the business is secure and compliant.”

This is backed by real-time monitoring, remediation and continuous reporting from the J2 CSC Command Centre.

“J2 CSC provides visibility and actionable threat intelligence. Our experts do the security work. The service offerings are aptly named the Detector – which provides external threat monitoring and risk detection with reporting and client remediation. The Interceptor takes this a step further and includes asset discovery, vulnerability assessments along with service and server availability monitoring. The flagship is the Destroyer, which provides our customers with proactive threat protection, wireless, host and network intrusion detection, along with file integrity monitoring and incident response and remediation. We can have a business up and running in the CSC within hours,” concludes McLoughlin.

For more information contact J2 Software, 0861 005 896, john@j2.co.za, www.j2.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Sales basics for security installers
News & Events
Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.

Read more...
From security technician to salesperson
News & Events
Being great at security sales starts with having the right mindset. How you think informs what you say and how you act; and how you act informs the results you will achieve in your business.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...