Contact: 087 238 1870

  • Cyber Security and Visibility- what you don't know will hurt you

  • Cyber Security Centre

    View our brochure
  • Dtex SystemSkan

    Complete User Visibility to reduce internal cyber risk using behavioural monitoring and advanced analytics.
  • J2 Managed Security Services

    Security assessments On-going monitoring and maintenance Employee and Infrastructure Monitoring Policy Reporting & Enforcement
  • J2 Hosted Exchange

    Hosted Exchange from J2 Software is designed for businesses of all sizes. Hosted Exchange is an advanced email solution that allows users to communicate, share information, contacts and calendars with each other utilising any device.
  • Information Security Services

    J2 Software will provide you with a Managed Security Services solution individually tailored to fit your changing needs.
  • Fibre Internet Connectivity

    Uncapped and Unshaped Bandwidth – While other ISPs claim to provide “uncapped” services, in reality they apply a “fair usage” policy, which means they are entitled to slow down your Internet speed once you’ve used up a certain amount of data.
  • J2 Software Consultants

    With J2 Software’s combination of skills, knowledge and leading solutions we will ensure all users and equipment are working as they should.

SkyView Policy Minder OPEN

PolicyMinderSkyView Policy Minder OPEN automates security administration and policy compliance tasks and reporting for Open Systems including Red Hat Enterprise Linux (RHEL), Ubuntu, CentOS and IBM AIX. With Policy Minder's central console and agentless technology you can:




  • Check compliance for user accounts, directories, files, configuration settings, daemons, exported directories and more.
  • Monitor for changes to ownership, permissions and attributes for a specific set of files or directories.
  • Monitor for changes to the contents of critical application, configuration or server files.
  • Deploy and manage script execution on multiple servers over a secure connection using Integrated Script Management (ISM.)
  • Create user-defined policies using ISM.
  • Use the Export/Import function to:
    • enforce the same policy requirements across multiple servers.
    • copy the required settings to new servers and configuring them using FixIt to set them to your required settings
  • Email exception-based compliance reports, policy, FixIt or Message log reports to yourself and others.
  • Document your security implementation using templates that reflect your security policy requirements then apply those templates to one or more servers across your organization.
  • Deploy "Fix-It" to return out of compliant items to your security policy specifications.

Examples of ways to use Policy Minder OPEN:

  • Discover files with either the SUID or SGID bit set then monitor them for changes to their ownership, permissions or attributes
  • Discover when the sudoers file has been changed by using the checksum function.
  • Schedule a cron job to run regular compliance checks on the daemons category to find when a daemon has been activated that shouldn't have been. Schedule the FixIt function to set the daemons to the appropriate value (turn them on or off as appropriate.)
  • Upload your scripts to run customized compliance checks and FixIt scripts.
  • Ensure all user accounts have been created - and remain - with the appropriate attributes.
  • Discover new admin accounts.
  • Ensure all files for an application have the appropriate owner, group and permissions. Receive a detailed report specifying any files not figured correctly. Run FixIt to change the settings.
  • Discover and manage inactive user accounts.
  • Ensure that the exported directories that are required for your servers remain along with their appropriate settings.
  • Aide with auditor and compliance requirements by ensuring password rules are set appropriately - both for the global settings and at the user level.
  • Easily set-up new servers by defining file and user account templates, daemon and configuration settings, exporting the policies to the new server and running FixIt to set the configuration.
  • Use the integrated cron function to setup regular compliance checks and immediate FixIt tasks to keep your servers in compliance.
  • Document policy exceptions along with the policy then print the policy when the auditor appears - no more scrambling to find previous years' documentation or writing up the exception in the middle of your audit.

If you'd like more information on SkyView Policy Minder OPEN, contact us

  • J2 Software Online Backup

    J2 Software backups

    What would you do if you lost all your data?
    We specialise in automated backups to the cloud

    Project Details

  • Dtex Systems


    Detect and stop the insider cyber threat

    Dtex combines an incredibly lightweight micro-agent on each endpoint with a powerful server-based analysis engine to deliver security, visibility, and cost saving solutions

    Project Details

  • Dtex Systems / Williams Grand Prix Engineering Case Study


    Learn how Williams Grand Prix Engineering uses Dtex Systems to protect high value intellectual property. As Williams moves from a control-centric security model to a people-centric security model, they needed the full visibility across all endpoints provided by Dtex Systems.

What our users say


Mandy Mckernan

For PPS Insurance Company Ltd.

Since 2002 J2 Software (Pty)Ltd. have delivers consulting Services.


Luis Da Silva

ICT: Operations Manager - Europ Assistance South Africa (Pty) Ltd.

We use System Skan and Mimecast for both email managment and data security.

home users-3

Mark Saunders

IT Manager - WorldNet Logistics (Pty) Ltd..

Since 2010, J2 Software is our preferred supplier of Mimecast Mail Management solution without any issues. View Letter

home users-4

Immo Steffens

IT Manager - Sharp Electronics

We at Seartec Trading (Pty) Ltd. have had the please of dealing with J2 Software for more the 4 years. Their knowledge of SystemSkan is superb.View Letter