
FORT WAYNE, Ind., Aug. 15, 2011 /PRNewswire/ -- iSekurity, a national consumer identity theft security and restoration firm comprised of former United States Federal Agents, announced today a joint venture with SOVA, Inc. to market their identity theft protection services through a national network of Independent Telecommunications Agents.
iSekurity, the nation's leading second generation identity theft security and restoration firm goes beyond the traditional monitor and notify process and actually pursues the criminal. According to Drew Hirsty, Head of Marketing, "Our team of highly skilled professionals attacks the problem to find it, fix it, and stop it. Having the chance to work with SOVA to market our services through a new channel of Telecom Agents with established business and affinity relationships is a true honor."
According to Gene Esopi, SOVA's president, "We are excited to bring this opportunity to the telecommunications agent community. It not only generates a new revenue stream for telecom agents, but allows them to provide their clients with a service that protects against our nations fastest growing crime. The program supports three levels of telecom agents – Independent Agents, Regional Master Agents, and National Master Agents."
About iSekurity:
iSekurity was founded in 2007 by former United States Secret Service agent Reginald Ball. iSekurity is comprised of the nation's largest collection of former federal agents including FBI, USSS, DEA, IRS, Customs, Postal and Social Security Administration. This team investigates crimes of identity theft against members, restores the member's identity and good name, identifies the criminal and assists in the arrest and prosecution.
About SOVA:
SOVA, headquartered in Plains PA, has operated as a Master Agent in the telecommunications industry since 1992 and supports a network of national premises-based Agents as well as telesales operations.
For more information contact Gale Beery, Director of Communications at [email protected] or by phone at 888 735-8748
SOURCE iSekurity
Share this article