For over twenty-one years CIS’ philosophy and culture of “It’s All About the Client” has resulted in a fanatical devotion to developing long-term mutually beneficial customer relationships. CIS maintains a sterling reputation for technical excellence throughout all divisions, with a particular renown for expertise in Identity and Access Management, Network Security, Enterprise Cloud Migrations, and IP Telephony. CIS' annual client retention rate, which has exceeded 90% every year since the firm was founded in 1995, is a testament to the expertise and dedication that allow CIS to become the trusted technology partner for our clients.
From simple staff augmentation to taking on the IT support for an entire organization, Managed Services and Remote Helpdesks.
The CIS team designs and builds highly complex endpoint and device management solutions
On-premises and cloud-based IP Telephony systems that provide a robust feature-set and the flexibility.
I want to:
Beginning on May 12, 2017, in more than 150 countries around the world, business operations for companies of all shapes and sizes ground to a halt. Over 230,000 computers were infected in only a few days by a particularly malicious crypto-worm known as WannaCry. Despite protections that blocked initial versions of the worm, even some of the largest corporate entities across Europe were eventually breached by later permutations. In addition to thousands of smaller companies, victims of this attack included the British National Health Service, FedEx, Telefonica Spain, and Deutsche Bahn.
As you have no doubt read recently, we have an unprecedented global malware situation that has been directly impacting human lives around the world over the last few days. As your trusted technology advisor, CIS will provide further information as more details become available. Action must be taken as quickly as possible to protect exposed systems, we have given this maximum priority and are leveraging the entire CIS team to address all possible solutions in the most expedient manner possible.
The New York State Department of Financial Services (DFS), has released legislation: 23 NYCRR 500 to combat the persistent threat posed to information and financial systems by nation-states and independent criminal actors.
Im reaching out to invite you to a webinar that BeyondTrust and CIS are hosting for a small group of IT and security leaders at Mid-Atlantic colleges and universities: Preventing IT Privilege Abuse in Higher Education. Please pass on to your team members!! Below is a presentation overview and login details, plus links to a couple relevant analyst reports. I hope you can make it! If so, please hit accept so we know to expect you.
BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, today announced a new partnership with Computer Integrated Services (CIS), aimed to help more customers prevent privilege misuse and stop unauthorized access.
Geoffrey is one of the most well regarded and widely read minds in the field of Identity and Access Governance. His first book, "Definitive Guide to IDM Tokens," published in 2014, remains the authoritative work on the subject.
A founding philosophy at CIS is to provide excellence in every conceivable role. CIS goes to great lengths to ensure that each member of the CIS team exudes courtesy and confidence. Each CIS team is managed by a Practice Director, who is typically responsible for architecting and designing projects, interfacing with clients in conjunction with the assigned project manager, and providing high-level management, as needed.
CIS Executives are directly involved in the daily aspects of the firm's business, providing direct management of client accounts and operations, as well as oversight to accounts that are managed by CIS Reps. This approach helps ensure that clients have a true voice in what is done, with feedback going directly to management and ownership, making CIS shockingly responsive to client needs.
Click Here to read more about our Leadership Team