Contact: 087 238 1870

  • Cyber Security and Visibility- what you don't know will hurt you

  • Cyber Security Centre

    View our brochure
  • Dtex SystemSkan

    Complete User Visibility to reduce internal cyber risk using behavioural monitoring and advanced analytics.
  • J2 Managed Security Services

    Security assessments On-going monitoring and maintenance Employee and Infrastructure Monitoring Policy Reporting & Enforcement
  • J2 Hosted Exchange

    Hosted Exchange from J2 Software is designed for businesses of all sizes. Hosted Exchange is an advanced email solution that allows users to communicate, share information, contacts and calendars with each other utilising any device.
  • Information Security Services

    J2 Software will provide you with a Managed Security Services solution individually tailored to fit your changing needs.
  • Fibre Internet Connectivity

    Uncapped and Unshaped Bandwidth – While other ISPs claim to provide “uncapped” services, in reality they apply a “fair usage” policy, which means they are entitled to slow down your Internet speed once you’ve used up a certain amount of data.
  • J2 Software Consultants

    With J2 Software’s combination of skills, knowledge and leading solutions we will ensure all users and equipment are working as they should.

FinallySecureTM Enterprise

Enabling Compliance through Smart Full Disk Encryption

Today almost all of your companies sensitive and confidential data resides on mobile devices like laptops. Companies must figure out how to cost-effectively manage different brands and generations of globally dispersed computers, while implementing corporate security policies, ensuring legal compliance, and preventing data loss and financial penalty.

J2 Software is proud to bring you SECUDE, which gives you an enterprise endpoint data protection solution that provides intelligent technology to secure and manage enterprises' endpoints. Through SECUDE's rapid deployment technology, enterprises can dramatically cut down deployment and administrative costs while providing full end user transparency without requiring any end user training. SECUDE's FinallySecureTM Enterprise seamlessly integrates into existing software management infrastructure; optionally, it provides its own Web-based management and reporting console.

FinallySecureTM Enterprise enables you to handle data anywhere, anytime, while meeting legal compliance and data protection requirements. The solution offers strong user authentication even before the boot-up process. Also, users can authenticate through the optional use of smart cards or digital certificates, thus making their laptops truly secure. FinallySecureTM Enterprise encrypts the entire content in your laptop's hard disk, thus safeguarding your organization from potential financial loss and consequential legal issues even if the computer falls into wrong hands. FinallySecureTM Enterprise's dedicated management console offers greater administrative flexibility and reduces cost.

The FinallySecureTM Enterprise software supports disks that are already equipped with internal hardware-based encryption, such as Seagate Momentus FDE.x. In the future, as the new safety standards come into force, standards such as Opal Security Subsystem Class (Opal SSC) will be integrated.

From the operational perspective, FinallySecureTM Enterprise does not in any way affect user productivity. In fact, the user would hardly notice any change in the computer's performance. The solution has future-proof architecture and is widely installed across many companies. Thus, rest assured as you have made a wise long-term investment.

Comprehensive security results from the use of multiple security components. Enhance your organisation's Information security through the use of FinallySecureTM Enterprise along with the added power of SecureFolder Enterpise to encrypt data folders on your machines and network.

These solutions perfectly complement the implementation of risk management and Data Loss Prevention (DLP).

  • J2 Software Online Backup

    J2 Software backups

    What would you do if you lost all your data?
    We specialise in automated backups to the cloud

    Project Details

  • Dtex Systems


    Detect and stop the insider cyber threat

    Dtex combines an incredibly lightweight micro-agent on each endpoint with a powerful server-based analysis engine to deliver security, visibility, and cost saving solutions

    Project Details

  • Dtex Systems / Williams Grand Prix Engineering Case Study


    Learn how Williams Grand Prix Engineering uses Dtex Systems to protect high value intellectual property. As Williams moves from a control-centric security model to a people-centric security model, they needed the full visibility across all endpoints provided by Dtex Systems.

What our users say


Mandy Mckernan

For PPS Insurance Company Ltd.

Since 2002 J2 Software (Pty)Ltd. have delivers consulting Services.


Luis Da Silva

ICT: Operations Manager - Europ Assistance South Africa (Pty) Ltd.

We use System Skan and Mimecast for both email managment and data security.

home users-3

Mark Saunders

IT Manager - WorldNet Logistics (Pty) Ltd..

Since 2010, J2 Software is our preferred supplier of Mimecast Mail Management solution without any issues. View Letter

home users-4

Immo Steffens

IT Manager - Sharp Electronics

We at Seartec Trading (Pty) Ltd. have had the please of dealing with J2 Software for more the 4 years. Their knowledge of SystemSkan is superb.View Letter