By leveraging the collective purchasing power of our participating public and nonprofit organizations, CIS CyberMarket works with industry-leading cybersecurity providers to secure significant group purchasing opportunities to meet the ever-evolving cybersecurity needs of our members. CIS may derive some revenue from the promotion of these opportunities.
The Cyber Defense Tool allows an organization to perform a high-level assessment of their overall cybersecurity capabilities and preparedness. The assessment enables the organization to focus on key areas that will improve their cybersecurity posture and also aids in the identification and prioritization of risks that could be exploited in a successful cyberattack. Click here to learn more about this tool, the current Proof of Value program, and how your organization can participate.
Akamai secures and delivers digital experiences for the world’s largest companies. Their intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps, and experiences closer to users than anyone — and attacks and threats far away.
Learn more about Akamai
EB Control provides seamless encryption for secure data storage and sharing across multiple platforms. EB Control enables complete control over access permissions, including who, when, where, and how data is accessed, as well as allows for revocation of access even after data has been shared, ensuring your data remains protected. With no key management required and easy installation and usability, EB Control helps organizations save valuable time and resources. Click here to learn more.
Kroll delivers end-to-end cyber risk management to U.S. State, Local, Tribal, and Territorial (SLTT) organizations with its frontline threat intelligence and incident response expertise. From incident response to risk assessments, and complex forensics to breach notification and litigation support, Kroll's cyber experts can help in every step of the way toward cyber resilience. Kroll offers a suite of proactive, end-to-end solutions to help your organization gain a 360-degree view of its cyber risk. Learn more about Kroll's cyber risk services.
Rubrik Security Cloud is a platform that allows organizations to secure their data, wherever it lives, across enterprise, cloud, and SaaS. With Rubrik's zero-trust data security solution, U.S. state, local, tribal, and territorial (SLTT) organizations can secure their data from insider threats or ransomware with air-gapped, immutable, access-controlled backups; continuously monitor and remediate data risks, including ransomware, sensitive data exposure, and indicators of compromise; and surgically and rapidly recover their apps, files, or users while avoiding malware reinfection. Click here to learn more.
The partnership between SANS and the Center for Internet Security (CIS) draws on the shared mission to ensure that information security practitioners in critical organizations have the skills needed to protect national security, and enhance the cybersecurity readiness and response of state, local, tribal, and territorial (SLTT) government entities. CIS and SANS are proud to collaborate together to provide SANS's industry-leading security awareness programs and online technical training courses to ensure qualifying organizations can get the training they need, at an affordable cost, to improve their security posture, expand their employees' cybersecurity skills, and better protect their sensitive data.
Learn more about SANS
Tenable is dedicated to providing affordable and comprehensive risk-based vulnerability management offerings for state, local, tribal, and territorial (SLTT) members of the MS-ISAC and EI-ISAC. With Tenable’s risk-based vulnerability management solutions, SLTT governments get full visibility into the assets and vulnerabilities in their environment. By identifying, monitoring and prioritizing vulnerabilities, SLTTs can wisely manage risk across the entire network - including on-premises, cloud, OT, mobile and virtual environments. Click here to learn more.
Zscaler enables the public sector to fully embrace the cloud and modernize IT by leveraging zero trust —securely connecting users to applications regardless of device, location, or network. With the Zscaler Zero Trust Exchange, U.S. SLTTs can securely connect authorized users, workloads, and devices over any network from any location. Learn more about Zscaler's cloud native zero trust platform.
To learn more about how to become a vendor for the CIS CyberMarket, please contact us at [email protected]
To learn more about our Cyber Defense Tool Proof of Value Program, please contact us at [email protected]