Sage's Executive Cybersecurity Readiness Program

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Sage offers an award-winning portfolio of Advisory, Assessment and Incident Response information security services designed to protect your information assets and ensure regulatory compliance. Contact us to learn how we can be of service to your organization.

  • Advisory Services
    • Information Security Program Management & Advisory Services
    • Regulatory Compliance
    • Risk Management
    • Continuity Of Operations Planning
    • Information Security Strategic Planning
    • Policy & Standards Development
  • Assessment Services
    • CAVA Configuration & Vulnerability Assessment
    • External Vulnerability Assessment & Penetration Testing
    • Risk Assessment, Analysis & Management
    • Social Engineering Vulnerability Assessment
    • Wireless Security Assessment
    • Firewall Configuration & Rule-Set Review
  • Incident Response Services
    • Incident Response Advisory & Forensic Investigation Services
    • Incident Response Planning & Preparation
Some of our Satisfied Clients

"We use Sage Data Security for our annual Pen-test, log monitoring, security compliance, education and training. I would highly recommend Sage because 1) they’re focused on security and only security, which makes them extremely knowledgeable ‘experts’ in this area, and 2) they understand your business and work to fit security into your business, not change your business to fit a canned security model."

Andy Goodwin
Chief Information Officer,
Georgia Hospital Association

"[We use Sage for] penetration testing, vulnerability testing, and IT security advisory. I would recommend them for their value proposition, their professionalism, the quality of their work, and especially their competent and friendly staff."

Craig Sjoberg
IT Director, County Federal Credit Union

"Sage Data Security has been a valuable partner in our information security program for over 5 years. Even after all these years, I am more confident in this relationship than ever."

James Gordon
IT Senior Vice President,
Needham Bank

"We utilize Sage Data Security for nDiscovery services, pen testing and risk analysis, and will also be utilizing them for disaster recovery and business continuity planning. By contracting with Sage, I have professionals who are experts monitoring my network, allowing my staff to concentrate on the customer service aspect of supporting end users and applications."

Christina St. Pierre
IT Director, Maine Municipal Association

"Sage has helped us take control of our network and be proactive instead of reactive to issues. We use nDiscovery for logs and also firewall analysis, as well as helping us with potential issues as they arise. They are thorough, intelligent, persistent, and great to work with. They are knowledgeable in the field and I trust them to keep me up to date in this area, and to help us keep our assets as safe as possible."

Lisa Roy
Chief Technology Officer,
Maine Maritime Academy
Sage In The Community

Sage Data Security believes in giving back to our community. We provided support for all of these organizations with donations and in-kind gifts.

  • Alyn Hospital – Wheels of
    Love Campaign
  • Alzheimer’s Association
  • American Lung Association –
    Trek Across Maine
  • Animal Refuge League
  • Big Brothers / Big Sisters
  • Certified Fraud Examiners –
    Maine Chapter
  • The Dempsey Challenge
  • Education Foundation of
    the Kennebunks
  • Faraja Orphan Center in Tanzania, Africa
  • Girl Scouts of America
  • ISACA - New England
  • Maine Bankers Association
  • Pine Tree Boy Scout Association
  • Pine Tree Society
  • SeaCoast Hospice
  • Unicef

Sage publications and events are designed to keep you abreast of the latest security trends and best practices. CyberCrime Symposium 2015

Download a data sheet (.pdf) to learn more about Sage’s nDiscovery service.

  • Request a Live Tour of the nDiscovery Portal
    Sage’s nDiscovery is a
    proactive, systematic solution that provides independent, outsourced security log analysis from highly trained experts.

  • Try the nDiscovery interactive video, which shows you why you
    need nDiscovery, how it
    works and more!

  • Watch the nAlert Overview Video: real-time alerting for log review.

  • nDiscovery
    Each server, network device, and application in your IT infrastructure collects and logs information that can be used to secure your company. Sage’s nDiscovery service mines the logs to uncover and identify suspicious and potentially dangerous network activity, including internal system misuse, unauthorized access, malicious applications, and security breaches. Sage’s proprietary log analysis methodology provides independent, outsourced security information management from
    highly trained experts.
  • nDiscovery Resources:

    Log Management White Paper
    Monitoring event logs is more than just good policy for securing an IT infrastructure – it also is an integral part of complying with a number of government regulations. Learn more in Event Logs are Key to a Secure Network.

    Guide to Computer Security Log Management
    Read the comprehensive recommendations of the Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST).

    New England Breach Notification
    Table (.pdf)
    Compare the notification and reporting requirements for each of the six New England states.



    Sage Data Security was recently named as one of the 2014 Best Places to Work in Maine.

    Best Places To Work In Maine

Executive Cybersecurity Readiness Program Cyber Forensic Readiness Program