J2 Cyber Security Centre launched

March 2017 News & Events, Information Security

Following months of rigorous testing, J2 Software has announced the launch of its Cyber Security Centre (CSC) which is now commercially available to support businesses focused on improving information security and governance.

John McLoughlin MD J2 Software.
John McLoughlin MD J2 Software.

John McLoughlin, MD, J2 Software, says the CSC was launched in response to growing calls for better security. “It became apparent that the traditional way of doing things is simply no longer working. Breaches are increasing; losses are growing with no apparent end in sight. Cyber-criminal networks are innovating on a daily basis and traditional security is still playing by the same rules.”

McLoughlin highlights the number of businesses today affected by cyber-crime. “One cannot talk to a business today that has not been affected in one way or another by the scourge of cyber-crime. This ranges from malicious or uninformed insiders through to meticulously planned external attacks targeting vital infrastructure and the growing number of ransomware variants seen each day.”

The J2 CSC offers globally competitive security solutions to businesses of all sizes, from enterprise through to SMEs. “SMEs are not only not immune to these threats, but in fact are often targeted by cyber criminals, either externally or internally, as they can be viewed as a softer mark,” says McLoughlin.

“I have seen first-hand how lack of resources, augmented by limited budgets, have prevented companies from providing adequate security and protection for their businesses. The aim of the J2 CSC is to ensure that this is this is no longer the case as it will cost-effectively provide: complete visibility; ongoing monitoring and rapid incident response. Our goal is to incrementally improve our client’s security maturity level with a tailor-made solution for each and every customer – we have no one-size-fits-all solutions.”

Mc Loughlin notes the J2 CSC is not a traditional Security Operations Centre (SOC) as it enables clients with limited resources to accelerate and simplify threat detection and speed up response from a single place. “Our CSC also works with global partners and we share threat information around the world, ensuring that changing and evolving threats are identified and averted as we go. We use actionable threat intelligence to strengthen clients’ defences.”

Mc Loughlin reveals that updated and relevant threat intelligence is the secret weapon.

“The J2 CSC is ready to start improving businesses’ security posture from day one. It will provide visibility and detect threats in real time, facilitating not only remediation of the threat but also identifying the source and location of the attack.”

The CSC has moved beyond managed Security Information and Event Management (SIEM) and includes vulnerability assessments, asset discovery, network and machine intrusion. “It also provides endpoint protection, managed encryption, internet security, machine learning and user behavioural monitoring – all of which go to ensure that the business is secure and compliant.”

This is backed by real-time monitoring, remediation and continuous reporting from the J2 CSC Command Centre.

“J2 CSC provides visibility and actionable threat intelligence. Our experts do the security work. The service offerings are aptly named the Detector – which provides external threat monitoring and risk detection with reporting and client remediation. The Interceptor takes this a step further and includes asset discovery, vulnerability assessments along with service and server availability monitoring. The flagship is the Destroyer, which provides our customers with proactive threat protection, wireless, host and network intrusion detection, along with file integrity monitoring and incident response and remediation. We can have a business up and running in the CSC within hours,” concludes McLoughlin.

For more information contact J2 Software, 0861 005 896, john@j2.co.za, www.j2.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Entries for the 2026 Southern Africa OSPAs now open
News & Events
Entries are now open through to 1 April 2026 for the Southern Africa Outstanding Security Performance Awards (OSPAs). This year, the awards are open to a broader range of countries in southern Africa than ever before.

Read more...
Grand theft telematics
News & Events
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.