0861 00 JTWO (5896)

  • Cyber Security Centre

    View our brochure
  • Dtex SystemSkan

    Complete User Visibility to reduce internal cyber risk using behavioural monitoring and advanced analytics.
  • J2 Managed Security Services

    Security assessments On-going monitoring and maintenance Employee and Infrastructure Monitoring Policy Reporting & Enforcement
  • J2 Hosted Exchange

    Hosted Exchange from J2 Software is designed for businesses of all sizes. Hosted Exchange is an advanced email solution that allows users to communicate, share information, contacts and calendars with each other utilising any device.
  • Information Security Services

    J2 Software will provide you with a Managed Security Services solution individually tailored to fit your changing needs.
  • Fibre Internet Connectivity

    Uncapped and Unshaped Bandwidth – While other ISPs claim to provide “uncapped” services, in reality they apply a “fair usage” policy, which means they are entitled to slow down your Internet speed once you’ve used up a certain amount of data.
  • J2 Software Consultants

    With J2 Software’s combination of skills, knowledge and leading solutions we will ensure all users and equipment are working as they should.

Advanced Persistent Threat Protection

Defense-in-depth, in-line and automated

Hackers are coming after your people, systems, and data with custom-tailored zero day and advanced threat attacks designed to exploit your vulnerabilities and bypass your existing security. With Zscaler APT Protection, you can now protect your organization from these sophisticated threats with a multi-layered “protect-detect-remediate” defense framework, including advanced “signatureless” behavioral analysis and forensics capabilities.

Unlike security appliances, Zscaler is always in-line with your Internet traffic, bi-directionally inspecting every byte, including inspecting traffic encrypted with SSL and automatically blocking malware, quarantining infected devices, preventing botnet communications and stopping data exfiltration attempts

Protect, Detect, Remediate Defense Framework

The Protect-Detect-Remediate defense framework is a best practices approach for defending against APTs. Zscaler provides the only solution that can provide a complete, integrated protect-detect-remediate defense for any IP enabled device in your organization.

  • J2 Software Online Backup

    J2 Software backups

    What would you do if you lost all your data?
    We specialise in automated backups to the cloud

    Project Details

  • Dtex Systems

    dtex

    Detect and stop the insider cyber threat

    Dtex combines an incredibly lightweight micro-agent on each endpoint with a powerful server-based analysis engine to deliver security, visibility, and cost saving solutions

    Project Details

  • Dtex Systems / Williams Grand Prix Engineering Case Study

    dtex

    Learn how Williams Grand Prix Engineering uses Dtex Systems to protect high value intellectual property. As Williams moves from a control-centric security model to a people-centric security model, they needed the full visibility across all endpoints provided by Dtex Systems.

What our users say

 
pps-for-professionals

Mandy Mckernan

For PPS Insurance Company Ltd.

Since 2002 J2 Software (Pty)Ltd. have delivers consulting Services.

europ-assistance

Luis Da Silva

ICT: Operations Manager - Europ Assistance South Africa (Pty) Ltd.

We use System Skan and Mimecast for both email managment and data security.

home users-3

Mark Saunders

IT Manager - WorldNet Logistics (Pty) Ltd..

Since 2010, J2 Software is our preferred supplier of Mimecast Mail Management solution without any issues. View Letter

home users-4

Immo Steffens

IT Manager - Sharp Electronics

We at Seartec Trading (Pty) Ltd. have had the please of dealing with J2 Software for more the 4 years. Their knowledge of SystemSkan is superb.View Letter