Frequently Asked Questions

Where are your services offered?

We offer our services throughout the United States.

What industries do you serve?

Our clients include financial institutions, healthcare organizations, government agencies, higher education, utilities, and other businesses nationwide.

Who is going to perform the actual work?

As an independent information security firm, we do not represent any vendor, nor do we sell hardware or software. All work is performed by a certified Sage professional.

What are the qualifications of your experts?

Our security experts attend ongoing training and are continuously learning. They hold a variety of certifications including:

  • Certificate of Cloud Security Knowledge (CCSK)
  • Certified Information Systems Auditor (CISA)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Security Professional (CISSP)
  • Cisco Certified Network Associate (CCNA)
  • Computer Hacking Forensic Investigator (CHFI)
  • GIAC Law of Data Security & Investigations (GLEG)
  • GIAC Penetration Tester (GPEN)
  • GIAC Security Essentials (GSEC)
  • GIAC Web Application Penetration Tester (GWAPT)
  • Microsoft Certified Solutions Expert (MCSE)
  • Network+
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Wireless Professional (OSWP)
  • Security+
  • Social Engineering Pentesting Professional (SEPP)
  • Systems Security Certified Practitioner (SCCP)

What are your methodologies based on?

The Sage Methodology leverages a variety of industry-standard frameworks and regulatory guidance, including: Federal Financial Institutions Examination Council (FFIEC), National Security Agency (NSA) Gold Standard, National Institute of Standards and Technology (NIST), ISO 27002 standards, and Centers for Medicare & Medicaid Services (CMS) guidelines.

What is Sage’s approach to cybersecurity?

At Sage Data Security, we believe that cybersecurity is more than a cost-center or simply a compliance requirement. It's a commitment to honor those who have entrusted you with their information assets. It is a shared responsibility and a civic duty. Our goals is to partner with our clients to create and sustain environments that realistically and cost-effectively protect information assets while maintaining a balance of productivity and operational effectiveness.

What can I expect when working with Sage?

Our services are customized to meet your specific business needs, so we spend a great deal of time during the scoping phase to ensure that we meet your goals and objectives and achieve the desired outcome. We are available throughout the process to answer any questions or address any concerns, even following delivery of the final report and recommendations.

How are your services priced?

Our pricing is typically based on the scope of the work required. Because we customize each engagement to fit your needs, it’s important for us to get an understanding of what they are prior to preparing a proposal.

No one is immune to cyber-attacks