• Dtex

    User Behavioural analytics

  • Unified Email Management

    Mimecast

  • Every users “life” resides on their PC’s and Servers

    J2 Online Backup

J2 Solutions

User Behavioural Analytics

DTEX USER POLICY MONITORING AND COMPLIANCE

End Point Visibility to reduce risk: Dtex provides complete end-user visibility to reduce risk by monitoring behavioural changes at the end user level. Dtex uses Human Analytics to detect risk and allows you to take action as soon as an incident occurs, not months later.

User Productivity Monitoring

ActivTrak’s invisible Agent tracks and measures work activity without relying on human input. This unbiased dataset includes usernames, application title bars, website URLs, activity duration, screenshots, idle time, and USB activity.

Cyber Resilience for Email

MIMECAST MAKING EMAIL SAFER FOR BUSINESS

J2 Software and Mimecast will take the pain out of handling your organisation's most important data; the information that passes through your email systems.Mimecast is the leading Cloud Based - Unified Email Management solution providing Email security, continuity, archiving and compliance in the cloud.

J2 Online Backup

As we work in the Information-Age almost all sensitive data and information is stored electronically. Every users “life” resides on their PC’s and Servers. We live in times where we take our machines for granted, forgetting these are complex pieces of technology.

Managed Encryption

Web-based management tool

SimplySecure Management System is Built for iPhone and iPads, Android phones and tablets, Windows and Mac PCs, and USB storage, SimplySecure modules can be added instantaneously to your account/web console as you need them.

Predictive Threat Intelligence

As the first to harness the cloud and artificial intelligence to stop zero-day threats in real time, Webroot secures businesses and individuals worldwide with threat intelligence and protection for endpoints and networks.

Internet Security

PERSISTENT THREAT PROTECTION

J2 Software provides Web Security Software as a Service (SaaS) - No Boxes Required!Zscaler services enable any end user, from any place, using any device a rich Internet experience while enforcing information security and business policies.The service is delivered using Zscaler's Global Cloud Infrastructure.

Hosted Exchange

Hosted Exchange from J2 Software is designed for businesses of all sizes. Hosted Exchange is an advanced email solution that allows users to communicate, share information, contacts and calendars with each other utilising any device

Office 365

Microsoft Office 365 provides a comprehensive set of software tools and services that facilitate office documentation, communication and management tasks. No upfront installation or integration is required, other than an Internet connection and supporting web browser.

Secure Data Destruction

WhiteCanyon Software, Inc. is a leading provider of security software employing permanent deletion technology to prevent identity theft. The company is engaged in the development, sales and support of hard disk utilities that leverage deletion and security related technologies.

Copyright © 2018 J2 Software