SentryBay partners with J2 Software to expand in Africa

John Mc Loughlin, Managing Director, J2 Software

Global software security specialist, SentryBay, through its African distributor Romar, partnered with local data security solutions provider J2 Software, to expand its footprint in Africa.

SentryBay will provide its patented identity theft solutions to key partners, who will in turn offer access to large networks of customers, employees, etc. Its solutions provide added value to the users in these networks, and significant revenue-generating opportunities for the partner.

“SentryBay’s go-to-market strategy is heavily dependent on its OEM, VAR and technology partners. More importantly, SentryBay’s anti-key logging and anti-phishing technology has formed the basis for a number of market-leading, enterprise-strength solutions that address both internal and external security issues,” John Mc Loughlin, Managing Director, J2 Software.

J2 Software also shares SentryBay’s vision of changing the way companies address Internet security. As the malware landscape continues to evolve there is one constant – reactive solutions that rely on identifying malware will only ever have limited effectiveness. Moreover, a network or computer can never be guaranteed to be free from threats – now or in the future. The key is to protect the data.

Mc Loughlin says, with this backdrop in mind, SentryBay developed proactive solutions that effectively thwart malware, regardless of the integrity of the user’s computing environment.

Dave Waterson, CEO, SentryBay, says: “SentryBay solutions directly protect software or Web applications and its users. “In this way, SentryBay achieves what competing solutions cannot – effectively preventing identity theft and providing true access and data security. In addition, as SentryBay’s solutions are designed to work almost entirely in the background, deployment requires minimal operating and customer overheads.”

SentryBay is looking forward to helping our partners and customers successfully – and cost-effectively – tackle malware threats,” concludes Waterson.

Comments

Comments