About
Subscribe

Protect your PC against theft

Johannesburg, 11 Feb 2009

Local data security solutions provider J2 Software has taken security to a whole new level with the T3 SecurityKey. The T3 SecurityKey protects computers and laptops from unauthorised access and also provides instant lockdown and global theft cover.

The T3 SecurityKey provides instant lockdown, data encryption and covers you against theft - anywhere in the world. It ensures unauthorised users cannot access one's PC to view, copy or modify confidential information. Considering that passwords can easily be hacked, a simple solution such as the T3 SecurityKey, therefore, adds another layer of protection to keep the unwanted users at bay.

J2 Software managing director John Mc Loughlin says in today's hi-tech environment, home users and businesses need to protect their computer assets and the information they carry. "When considering that close to 10% of all laptops sold each year are reported lost or stolen, it is crucial that security measures be taken in order to avoid associated costly losses: asset investment, time, revenue, and irreplaceable company information."

This information has been gained over many years, at high costs and because of this value there exists a market for the purchase of sensitive information. One's data is normally stored electronically, which makes it relatively easy to access, both for oneself as well as for those with criminal intent. However, with the T3 SecurityKey, one is instantly protected.

The T3 SecurityKey comes standard with global theft cover up to a maximum value equivalent of US$1 500 (about R12 000). In the event of theft, one is covered by the T3 Theft Cover, subject to basic terms and conditions. This means even in the unfortunate case where one's PC or laptop is stolen, the thief will not be able to access the machine and one is also covered financially.

The first local T3 Theft Cover claim, underwritten by an office of Allianz Insurance, was processed recently where a T3 SecurityKey client had his machine stolen at work. The client went through the normal claims process and submitted the necessary documentation. The physical T3 SecurityKey and the claim were processed immediately and payment was made shortly thereafter.

SecurityKey is also available through selected technology retailers and partners. For more information, visit http://www.t3southafrica.co.za or email john@t3southafrica.co.za.

Share

J2 Software

J2 Software is a leading South African IT security company. While most organisations are now starting to realise the impact of data theft and abuse of IT resources by employees, J2 recognised the need to protect against this activity some time ago. J2 Software was born after the founders identified an opportunity in the Information Technology market in South Africa and the rest of Africa. They saw a growing need for information security solutions that were comprehensive, simple to deploy, easy to use and good value for money. After tireless searching and investigation, J2 Software was officially launched in 2006.

Shortly after inception the customer list of J2 Software started to grow rapidly; and this continues to be the case to this day. J2 Software has provided services and solutions to numerous renowned, forward-thinking companies with sites running in South Africa, Angola, Botswana, Kenya, Malawi, Mauritius, Mozambique, Tanzania, Uganda and Zambia.

J2 Software provides solutions and services to various organisations that have a requirement to secure their sensitive information as well as implement, monitor and enforce internal security policies. In recent times, organisations are placing a far higher priority on the security, accountability and control of their most prized asset, their information.

Adding to this is the ever-growing pressure being placed on companies and their directors' to maintain the security and control of the sensitive data of their clients, as well as the necessity to conform to various local and international compliance regulations.

With the continued rise of identity theft and confidential data leakage the need for our product offering is not only and advantage, but an absolute necessity.

Editorial contacts

Ivor van Rensburg
IT Public Relations
(082) 652 8050
ivor@itpr.co.za
John Mc Loughlin
J2 Software
(011) 794 2537
john@jtwo.co.za