• Register

Security Articles

Business Technology: The Security Revolution: Coming Soon To A Vendor Near You
Information Week
Read More

Would you buy Security Products from Microsoft?
Internet Week
Microsoft is launching a major new security initiative, "Securing the Perimeter."
Read More

Preparing for the Superworm at the Front Lines
By Jack M. Germain, TechNewsWorld
February 6, 2004
Louis Jurgens, EVP of SAGE, Inc. comments on this issue
Read More

Patch-Fatigued Users Contemplate Ditching Microsoft

It's become an all-too-common scenario--and one that's causing some businesses to re-evaluate their heavy reliance on Microsoft products.
Read More

Patch and Pray

It's the dirtiest little secret in the software industry: Patching no longer works.
Read More

SAGE Perspective
The SAGE Perspective website puts real life examples of conventional and traditional internet security under scrutiny.
Read More

Oracle Warns of Security Flaws

Two vulnerabilities affect the company's E-Business Suite
Read More

Code Flaws Push Up Cost of IT Security
UK companies face a multimillion-pound bill as the number of flaws in Microsoft Windows software escalates, analyst firm Gartner has warned...
Read More

Microsoft Security Flaws Highlight Urgent Need for Personal Firewalls

A stream of new Microsoft security flaws and the demands of patching them make the use of personal firewalls a critical enterprise requirement...
Read More

Latest Security News

Process-Based Security

SAGE Ad Graphic

Secure Web Server Appliance


  • Pre-configured with Web, email and FTP servers
  • Secure Remote Administration
  • Process-Based Built-in Security Policy
  • Worry-free maintenance
  • Hardened Operating System
  • Supports SSL, SSI, PHP, PERL PYTHON, & TCL
  • Supports MY SQL, PostgreSQL and SQL Libraries
  • Multi-domain Hosting, Virtual IP
  • Backup

Industrial Automation Firewall

Firewall AD Graphic


  • Mac Address Limiting
  • Port Management
  • Detection and Rejections of DOS Attacks
  • Protection from Viruses, Trojans and Common Cyber Attacks
  • Secure Your Ethernet Enabled Control System Devices (PLCs, RTUs, IEDs)
  • Physically Hardened
  • Secure, Cyber-Hardened Operating System
  • Protect Your End Devices Against Viruses, Worms, Trojans, Malware and Common Cyber Penetration Attacks
  • Transparent In-Line PLC Firewall and Communications Filter


Process-Based Security

PBS Ad Graphic