J2 Cyber Security Centre launched

March 2017 News & Events, Information Security

Following months of rigorous testing, J2 Software has announced the launch of its Cyber Security Centre (CSC) which is now commercially available to support businesses focused on improving information security and governance.

John McLoughlin MD J2 Software.
John McLoughlin MD J2 Software.

John McLoughlin, MD, J2 Software, says the CSC was launched in response to growing calls for better security. “It became apparent that the traditional way of doing things is simply no longer working. Breaches are increasing; losses are growing with no apparent end in sight. Cyber-criminal networks are innovating on a daily basis and traditional security is still playing by the same rules.”

McLoughlin highlights the number of businesses today affected by cyber-crime. “One cannot talk to a business today that has not been affected in one way or another by the scourge of cyber-crime. This ranges from malicious or uninformed insiders through to meticulously planned external attacks targeting vital infrastructure and the growing number of ransomware variants seen each day.”

The J2 CSC offers globally competitive security solutions to businesses of all sizes, from enterprise through to SMEs. “SMEs are not only not immune to these threats, but in fact are often targeted by cyber criminals, either externally or internally, as they can be viewed as a softer mark,” says McLoughlin.

“I have seen first-hand how lack of resources, augmented by limited budgets, have prevented companies from providing adequate security and protection for their businesses. The aim of the J2 CSC is to ensure that this is this is no longer the case as it will cost-effectively provide: complete visibility; ongoing monitoring and rapid incident response. Our goal is to incrementally improve our client’s security maturity level with a tailor-made solution for each and every customer – we have no one-size-fits-all solutions.”

Mc Loughlin notes the J2 CSC is not a traditional Security Operations Centre (SOC) as it enables clients with limited resources to accelerate and simplify threat detection and speed up response from a single place. “Our CSC also works with global partners and we share threat information around the world, ensuring that changing and evolving threats are identified and averted as we go. We use actionable threat intelligence to strengthen clients’ defences.”

Mc Loughlin reveals that updated and relevant threat intelligence is the secret weapon.

“The J2 CSC is ready to start improving businesses’ security posture from day one. It will provide visibility and detect threats in real time, facilitating not only remediation of the threat but also identifying the source and location of the attack.”

The CSC has moved beyond managed Security Information and Event Management (SIEM) and includes vulnerability assessments, asset discovery, network and machine intrusion. “It also provides endpoint protection, managed encryption, internet security, machine learning and user behavioural monitoring – all of which go to ensure that the business is secure and compliant.”

This is backed by real-time monitoring, remediation and continuous reporting from the J2 CSC Command Centre.

“J2 CSC provides visibility and actionable threat intelligence. Our experts do the security work. The service offerings are aptly named the Detector – which provides external threat monitoring and risk detection with reporting and client remediation. The Interceptor takes this a step further and includes asset discovery, vulnerability assessments along with service and server availability monitoring. The flagship is the Destroyer, which provides our customers with proactive threat protection, wireless, host and network intrusion detection, along with file integrity monitoring and incident response and remediation. We can have a business up and running in the CSC within hours,” concludes McLoughlin.

For more information contact J2 Software, 0861 005 896, [email protected], www.j2.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Igniting standards, powering protection
Securex South Africa News & Events Fire & Safety
Fire safety is more than compliance, it is a critical commitment to protecting lives, assets, and infrastructure. At Firexpo 2025, taking place from 3 to 5 June at Gallagher Convention Centre, that commitment takes centre stage.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...