CIS CyberMarket

CIS CyberMarket is CIS’s collaborative purchasing program that serves U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, nonprofit entities, and public health and education institutions to improve cybersecurity through cost-effective group procurement.

CIS CyberMarket Opportunity Process

By leveraging the collective purchasing power of our participating public and nonprofit organizations, CIS CyberMarket works with industry-leading cybersecurity providers to secure significant group purchasing opportunities to meet the ever-evolving cybersecurity needs of our members. CIS may derive some revenue from the promotion of these opportunities.

 

Akamai

Akamai secures and delivers digital experiences for the world’s largest companies. Their intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps, and experiences closer to users than anyone — and attacks and threats far away.

Learn more about Akamai

DuoCircle

DuoCircle leads in email security, providing U.S. State, Local, Tribal, and Territorial (SLTT) governments with advanced, reliable cybersecurity solutions. Their premier products, Phish Protection and DMARC Report, are tailored for the specific security needs of these entities. Phish Protection is an all-encompassing email gateway service that robustly guards against phishing, spam, viruses, and impersonation attacks, enabling a fortified email environment. In tandem, DMARC Report delivers crucial insights into email authentication and alignment, pivotal for maintaining a secure, trusted email domain. Combined, these tools offer a robust defense against email threats, showcasing DuoCircle's dedication to bolstering the cyber resilience of SLTT government bodies.

Learn more about DuoCircle's email security solution.

Everything Blockchain (EBI)

EB Control provides seamless encryption for secure data storage and sharing across multiple platforms. EB Control enables complete control over access permissions, including who, when, where, and how data is accessed, as well as allows for revocation of access even after data has been shared, ensuring your data remains protected. With no key management required and easy installation and usability, EB Control helps organizations save valuable time and resources. Click here to learn more.

Kroll

Kroll delivers end-to-end cyber risk management to U.S. State, Local, Tribal, and Territorial (SLTT) organizations with its frontline threat intelligence and incident response expertise. From incident response to risk assessments, and complex forensics to breach notification and litigation support, Kroll's cyber experts can help in every step of the way toward cyber resilience. Kroll offers a suite of proactive, end-to-end solutions to help your organization gain a 360-degree view of its cyber risk. Learn more about Kroll's cyber risk services.

SANS

The partnership between SANS and the Center for Internet Security (CIS) draws on the shared mission to ensure that information security practitioners in critical organizations have the skills needed to protect national security, and enhance the cybersecurity readiness and response of state, local, tribal, and territorial (SLTT) government entities. CIS and SANS are proud to collaborate together to provide SANS's industry-leading security awareness programs and online technical training courses to ensure qualifying organizations can get the training they need, at an affordable cost, to improve their security posture, expand their employees' cybersecurity skills, and better protect their sensitive data.

Learn more about SANS

Tenable

Tenable is dedicated to providing affordable and comprehensive risk-based vulnerability management offerings for state, local, tribal, and territorial (SLTT) members of the MS-ISAC and EI-ISAC. With Tenable’s risk-based vulnerability management solutions, SLTT governments get full visibility into the assets and vulnerabilities in their environment. By identifying, monitoring and prioritizing vulnerabilities, SLTTs can wisely manage risk across the entire network - including on-premises, cloud, OT, mobile and virtual environments. Click here to learn more. 

Zscaler

Zscaler enables the public sector to fully embrace the cloud and modernize IT by leveraging zero trust —securely connecting users to applications regardless of device, location, or network. With the Zscaler Zero Trust Exchange, U.S. SLTTs can securely connect authorized users, workloads, and devices over any network from any location. Learn more about Zscaler's cloud native zero trust platform.  

CIS CyberMarket Vendor Opportunity Process 

To learn more about how to become a vendor for the CIS CyberMarket, please contact us at [email protected]

cybermarket-1200x627
Have a question?
Want to get involved?
Arrow [email protected]