iSAFE offers a full complement of information security, assurance, forensics and eDiscovery services. From our initial evaluation to policy develoment, implementation and training, we're your full service partner. While others may provide you with audit services, our philosophy is to be your partner in establishing a sound information security strategy and ensuring that it's effective. While we specialize in the areas listed below, we have extensive experience in reccomending and implementing technology solutions.

Information Security

In this day and age, information security is paramount. If you don't follow best practices and maintain sound policies and procedures, you risk damage to your reputation or financial sanctions by government regulators or the courts.

iSAFE Partners specializes in custom policy development for your organization. Unlike our competitors, we don't employ a one size fits all strategy, our experts will meet with you and your team to understand and document your business practices and develop a written information security plan and other associated polices. At iSAFE we understand that security should never get in the way of the business and all of our polices and recommendations reflect that philosophy.

We'll review your operations and provide an analysis based on the current regulatory environment. We're not auditors or hardware/software vendors bent of getting you to purchase more services or equipment. We're your information security partner. We'll recommend the best solution for your business.

Information Assurance

While we've all heard stories from friends about the hard drive crash where they lost all of their personal files, downloaded music and family photos - this loss pales in comparison to the business impact of an information loss within your business. Imagine all of your customer data not being there when you arrive at the office tomorrow- while you might be able to recreate these records from paper files the time and cost required to do so will be staggering. While there are no guarantees, most are shocked to learn that there are low cost methods that can virtually ensure that you're business won't experience a data loss event.

Information assurance is the practice of managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. Today's business store and utilize a staggering amount of information. With this come the risk associated with data loss or compromise. In today's technology dependent society, our reliance on digital data can't be underestimated.

iSAFE provides analysis and recommendation to ensure confidentiality, integrity and availability of your business data. Our experts will review the types of data you control and make specific recommendations to ensure that you're minimizing the risk to loss as well as the potential of disruption in your business.


Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to explain the current state of a digital artifact. Computer Forensics has emerged as a leading evidentiary source capable of data recovery of computers, cell phones, and other devices. Qualified professionals can preserve electronic evidence from E-mail, internet activity, chat activity, buddy lists and other areas even after deletion or attempts to "cover tracks". However, electronic evidence continues to provide unique opportunities and challenges to attorneys. Due to the complexity associated with digital forensics, iSAFE has developed multiple avenues that allow us to customize your forensic needs.

A few of the many reasons to employ the techniques of computer forensics are:

  • In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to litigants.
  • To recover data in the event of a hardware or software failure.
  • To gather evidence against an employee that an organization wishes to terminate.

Special measures should be taken when conducting a forensic examination if it is desired for the results to be used in a court of law. One of the most important measures is to assure that the evidence has been accurately collected and that there is a clear chain of custody. While iSAFE Partners offers forensic recovery and analysis services, our certified forensic specialists can also analyze the results of the opposition's forensic work to determine if their acquisition and analysis were sound. We also provide expert testimony in civil cases.

eDiscovery Services

eDiscovery (Electronic discovery) refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI).

Electronic information is different from paper information because of its intangible form, transience and persistence. Additionally, electronic information is usually accompanied by metadata, which is not present in paper documents. The preservation of metadata from electronic documents creates special challenges to prevent spoliation. Metadata is sometimes relevant and play an important part as evidence in litigation. Electronic discovery was the subject of amendments to the Federal Rules of Civil Procedure, effective December 1, 2006. With the level of sophistication of both the courts and opposing counsel increasing each day, the area of electronic discovery is just beginning to take shape. Don't fall behind, let's iSAFE's expert staff guide you to employ best practices and defensible polices in the event you're party to a lawsuit.

Examples of the types of data included in e-discovery are e-mail, instant messaging chats, documents accounting databases, CAD/CAM files, Web sites, and any other electronically-stored information which could be relevant evidence in a lawsuit. Also included in e-discovery is "raw data" which Forensic Investigators can review for hidden evidence. The original file format is known as the "native" format.

While an entire marketplace has grown around software and hardware solutions to manage ESI, simple and effective steps can be taken by both small and large businesses alike to ensure compliance while minimizing costs.