Secure Data Group (SDG) was founded to focus on the “Business of IT Solutions” with a mission to
provide holistic, vendor-agnostic consulting and best-in-class deliverables that enhance clients’ current
infrastructure investments while providing maximum protection for clients’ data at rest and in motion. This
concept enticed Bell Micro Products, a four billion dollar per year storage focused distributor to fund the
launch of the company and have it operate as a wholly owned subsidiary of Bell Microproducts.
In July of 2007, Secure Data Group broke off from Bell Microproducts and began operating as SDG
Partners LLC, DBA Secure Data Group. In August of 2007, Wave Group of Companies acquired SDG
Partners LLC, bringing together two best-of-breed organizations which now provide management and
protection of clients’ documents, digital assets and critical business operations as its core offerings.
Secure Data Group is comprised of industry veterans bringing years of specialization and hands-on
experience to three main practice areas: Data Management, Information Security and Disaster
Recovery/Business Continuance. SDG’s goal is to ensure that clients’ data is highly available, well
protected and performing to their expectations, whether they are in same or mixed-manufacturer
environments. Years of working closely with the top manufacturers ensure that our clients are presented
with choices that truly fit their unique IT/Business and financial requirements.
SDG’s approach is to work closely with executives and senior management to discover their IT business
goals, and current infrastructure investments to understand what works and what doesn’t. We want to know
what keeps them awake at night and work with them to get those issues resolved. From there, we take a
methodical approach, working outward to ensure that all systems and infrastructure are aligned to the
company’s overall IT/Business plans.
SDG believes that throwing hardware and software at problems only complicates matters. An
organization’s data is considered one of its most important assets. It is important that we understand our
client’s business, current infrastructure, data security and data availability requirements prior to
recommending a course of action. This enables us to work within existing IT investments whenever
possible to maximize our clients’ ROI.