J2 Cyber Security Centre launched

March 2017 News & Events, Information Security

Following months of rigorous testing, J2 Software has announced the launch of its Cyber Security Centre (CSC) which is now commercially available to support businesses focused on improving information security and governance.

John McLoughlin MD J2 Software.
John McLoughlin MD J2 Software.

John McLoughlin, MD, J2 Software, says the CSC was launched in response to growing calls for better security. “It became apparent that the traditional way of doing things is simply no longer working. Breaches are increasing; losses are growing with no apparent end in sight. Cyber-criminal networks are innovating on a daily basis and traditional security is still playing by the same rules.”

McLoughlin highlights the number of businesses today affected by cyber-crime. “One cannot talk to a business today that has not been affected in one way or another by the scourge of cyber-crime. This ranges from malicious or uninformed insiders through to meticulously planned external attacks targeting vital infrastructure and the growing number of ransomware variants seen each day.”

The J2 CSC offers globally competitive security solutions to businesses of all sizes, from enterprise through to SMEs. “SMEs are not only not immune to these threats, but in fact are often targeted by cyber criminals, either externally or internally, as they can be viewed as a softer mark,” says McLoughlin.

“I have seen first-hand how lack of resources, augmented by limited budgets, have prevented companies from providing adequate security and protection for their businesses. The aim of the J2 CSC is to ensure that this is this is no longer the case as it will cost-effectively provide: complete visibility; ongoing monitoring and rapid incident response. Our goal is to incrementally improve our client’s security maturity level with a tailor-made solution for each and every customer – we have no one-size-fits-all solutions.”

Mc Loughlin notes the J2 CSC is not a traditional Security Operations Centre (SOC) as it enables clients with limited resources to accelerate and simplify threat detection and speed up response from a single place. “Our CSC also works with global partners and we share threat information around the world, ensuring that changing and evolving threats are identified and averted as we go. We use actionable threat intelligence to strengthen clients’ defences.”

Mc Loughlin reveals that updated and relevant threat intelligence is the secret weapon.

“The J2 CSC is ready to start improving businesses’ security posture from day one. It will provide visibility and detect threats in real time, facilitating not only remediation of the threat but also identifying the source and location of the attack.”

The CSC has moved beyond managed Security Information and Event Management (SIEM) and includes vulnerability assessments, asset discovery, network and machine intrusion. “It also provides endpoint protection, managed encryption, internet security, machine learning and user behavioural monitoring – all of which go to ensure that the business is secure and compliant.”

This is backed by real-time monitoring, remediation and continuous reporting from the J2 CSC Command Centre.

“J2 CSC provides visibility and actionable threat intelligence. Our experts do the security work. The service offerings are aptly named the Detector – which provides external threat monitoring and risk detection with reporting and client remediation. The Interceptor takes this a step further and includes asset discovery, vulnerability assessments along with service and server availability monitoring. The flagship is the Destroyer, which provides our customers with proactive threat protection, wireless, host and network intrusion detection, along with file integrity monitoring and incident response and remediation. We can have a business up and running in the CSC within hours,” concludes McLoughlin.

For more information contact J2 Software, 0861 005 896, [email protected], www.j2.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Workforce Consortium to reskill 95 million people
Editor's Choice News & Events AI & Data Analytics
ICT Workforce Consortium of global leaders has come together, committing to train and upskill 95 million people over the next 10 years, as 92% of jobs analysed are expected to undergo either high or moderate transformation due to advancements in AI.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Tech Trailblazers seeks the most innovative and diverse investors in enterprise tech
News & Events
This year, the global enterprise tech startup awards, the Tech Trailblazers, is looking for the most innovative and diverse VCs as well as its usual hunt for groundbreaking tech start-ups.

Read more...