About
Subscribe

Cost-effective data protection tool available

Johannesburg, 26 Jun 2007

Local data security solutions provider J2 Software has introduced a simple-to-use, powerful data protection tool, bundled with 12 months' global theft insurance.

The T3 SecurityKey protects one's computer from unauthorised access and can prevent modern day problems like identity theft. The T3 SecurityKey acts as an "ignition key" for one's computer.

Comprising a USB key and a software application to detect the USB key, the T3 SecurityKey prevents access to any sensitive and confidential data on one's machine.

J2 Software managing director John Mc Loughlin says laptops provide a powerful processing tool for today's mobile workforce, but at the same time, they make people more vulnerable to data and identity theft. "These include the millions of individuals that travel between various locations throughout their workday, including sales staff, small businesses owners, insurance adjustors, analysts, researchers and social workers."

Although the use of notebook computers brings about convenience and job mobility, it also makes people an easy target for scheming data thieves.

The T3 SecurityKey prevents unauthorised access to the private data on one's computer or laptop. Even in the extreme case of physical theft, the user's confidential data is protected so that no thief will gain any benefit from one's hard work or intellectual property.

The T3 SecurityKey acts like an ignition key for your machine. Without the T3 SecurityKey inserted into any USB port, it is impossible to access the encrypted data on one's machine.

"All sensitive information, including one's personal information, trade secrets and confidential information, is stored in encrypted data vaults that can only be accessed with the T3 SecurityKey. In the case of a laptop is stolen, the thief will not be able to access the Virtual Vault without your physical T3 SecurityKey in place in the USB port. This prevents access to confidential data that may exist on the lost or stolen laptop.

He says proper safety measures are necessary in order for home users, businesses and employees to protect their physical and intellectual assets. "What can businesses and individuals do as precautions against laptop theft? Keeping sensitive data safe on a portable device begins with using caution and common sense and when caring for the laptop. People always lock up their houses and cars when travelling; so why not lock up their data? After all, it is just as valuable."

Although these basic precautions help deter thieves, they are not foolproof, especially when thieves could gain access to one's entire livelihood from an unsecured laptop. One's portable computer is an easy target and contains an endless wealth of data. Laptop crime sprees will inevitably continue as long as people are careless.

The T3 SecurityKey is protected by MSIG, one of the largest insurers in the world, to offer PC and notebook theft insurance linked to the purchase of a T3 SecurityKey. This offers one 12-month global theft insurance, up to a maximum value equal to US$1 500 (about R10 000). The terms and conditions, as well as the claims process, are straightforward and easy to understand.

The T3 SecurityKey is available from Incredible Connection and Makro countrywide. For more information, visit www.t3southafrica.co.za or e-mail info@t3southafrica.co.za.

Share

J2 Software

J2 Software, a local data security solutions provider and distributor of T3 Security Suite, provides easy-to-manage, easy-to-implement and easy-to-use data security solutions. The company offers solutions for everyone, from single-users up to large corporations.

J2 Software came into existence because of the increasing demand for data protection products that are effective, simple to deploy and easy to use.

J2 Software provides effective and easy-to-manage data security solutions. We offer you complete peace of mind through the cost-effective delivery of world beating data security, encryption and protection tools. We also offer you the ability to effectively implement and monitor your internal corporate IT policy.

With the continued increase in identity theft and confidential data leakage, the need for our products is not only an advantage, but an absolute necessity.

Editorial contacts

Ivor van Rensburg
IT Public Relations
(082) 652 8050
ivor@itpr.co.za
John Mc Loughlin
J2 Software
(011) 794 8301
john@t3southafrica.co.za