Why CIS?

For over twenty-one years CIS’ philosophy and culture of “It’s All About the Client” has resulted in a fanatical devotion to developing long-term mutually beneficial customer relationships.  CIS maintains a sterling reputation for technical excellence throughout all divisions, with a particular renown for expertise in Identity and Access ManagementNetwork SecurityEnterprise Cloud Migrations, and IP Telephony.  CIS' annual client retention rate, which has exceeded 90% every year since the firm was founded in 1995, is a testament to the expertise and dedication that allow CIS to become the trusted technology partner for our clients.



Case Studies


Partners

microfocus
shoretel
Beyond Trust
Microsoft
vmware
SonicWall
Cisco
Citrix
Veeam


Knowledge Base

"WannaCry" but Keep Calm & Don't Panic...

As you have no doubt read recently, we have an unprecedented global malware situation that has been directly impacting human lives around the world over the last few days.  As your trusted technology advisor, CIS will provide further information as more details become available.  Action must be taken as quickly as possible to protect exposed systems, we have given this maximum priority and are leveraging the entire CIS team to address all possible solutions in the most expedient manner possible. An email to clients this morning included a screenshot of the National Health Service of the U.K.'s website's posted outage message as one example of what has been taking place all over the world.  In this one case, a hospital’s non-emergency operations have been suspended and ambulances are being diverted as a result of the malware’s existence.  In other words, this cyber-incident can now be classified by some as “deadly.”  There are widespread examples of similar impacts to critical services from around the world, however they are currently of little consequence.  The most important thing to focus on is:  What happens now? Immediate actions we recommend be taken include the following.  Be advised, while these items will help lessen risk they are NOT a guarantee that malware will not morph [change] into something else that will penetrate a network.

  •  Do not click on links, even though they appear legitimate.  Check to see where these links may take you.
  • Do not click on links sent via email, even if they are sent from friends.
  • Do not open attachments.
  • Deactivate all WI-FI equipment [tablets, cell phones, etc.] wherever possible.
  • Stay vigilant and propagate best practices to colleagues.
Please know that Computer Integrated Services is doing all we can to protect you.  We are enlisting all possible avenues to do our due diligence and keep you safe.  As information and mitigation procedures become available we will keep you informed.  At this point, nobody can state with 100% assurance, even with these best practices, that you will not be affected. If you have any questions regarding this issue, please feel free to contact us.  We thank you for your business and your trust.

Read More

Navigating the 23 NYCRR 500 Financial Regulations w/ CIS & BeyondTrust

The New York State Department of Financial Services (DFS), has released legislation:  23 NYCRR 500 to combat the persistent threat posed to information and financial systems by nation-states and independent criminal actors.  This regulation is designed to:

  • Promote the protection of customer information
  • Promote the protection of information technology systems of regulated entities
  • Require each company to assess its specific risk profile
  • Require each company to design a program that addresses its risks in a robust fashion
  • Require annual certification confirming compliance with these regulations by senior management
CIS and BeyondTrust have been monitoring the requirements of this new legislation, and recommend that anyone in the financial industry read the attachment below as a first-step in implementing a plan. To discuss further, please contact a CIS rep at:  sales@cisus.com or 212-577-6033 NY State Financial Cyber Security Requirements

Read More

CIS Network Security Bulletin

Welcome to the first of our Security Bulletins, prepared by CIS’ Chief Information Officer, Anthony Fama.  The purpose of these ongoing bulletins is to help strengthen IT Security awareness within our client base.  CIS strives to provide our clients with the critical information they need, in an actionable format, to support the decision making process, and ensure stability, efficiency, and security of client environments.  For further information, please contact your Account Manager or the CIS Service Desk.  Click the link below to access the full bulletin. CIS Security Bulletin - 4-2017 (opens separate PDF)

Read More


News & Events

CIS and BeyondTrust host webinar focused on IT Privilege Abuse in Higher Education

Cyber Security Expert, and BeyondTrust Vice President of Technology, Office of the CTO, Morey Haber   I’m reaching out to invite you to a webinar that BeyondTrust and CIS are hosting for a small group of IT and security leaders at Mid-Atlantic colleges and universities: “Preventing IT Privilege Abuse in Higher Education.”  Please pass on to your team members!! Below is a presentation overview and login details, plus links to a couple relevant analyst reports. I hope you can make it! If so, please hit “accept” so we know to expect you. The presentation will cover how PowerBroker Privileged Access Management (PAM) solutions from BeyondTrust can help you to:

  • Secure faculty, staff and student access to sensitive systems
  • Store, manage and rotate privileged passwords and SSH keys
  • Monitor privileged account usage and flag in-progress threats
  • Enforce least-privilege policies without killing productivity
  • Address FERPA, PCI, HIPAA and other mandates impacting higher Ed,
We’ll start with a short overview from Morey Haber, VP of Technology at BeyondTrust, followed by a quick demo of how our integrated password management and least privilege solutions work together to prevent data breaches. In the meantime, check out these PAM reports from Gartner and Forrester:

Read More

Strategic Partnership with CIS enhances the BeyondTrust partner program and helps organizations mitigate threats involving privileged access.

PHOENIX, March 1, 2017 - BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, today announced a new partnership with Computer Integrated Services (CIS), aimed to help more customers prevent privilege misuse and stop unauthorized access. As the BeyondTrust partner with the top-tier organization with a proven track record of successful joint identity and access management (IAM) and privileged access management (PAM) deployments, customers can trust CIS to accelerate deployment results, speed time to value, reduce ongoing costs and improve efficiencies. BeyondTrust Adds CIS to Portfolio of Trusted Identity and Access Management Partners

Read More

CIS' Geoffrey Carman Releases his second Book On Identity and Access Governance

CIS is delighted to announce the publication of Geoffrey Carman's second book, which can be found for purchase here.  Geoffrey is one of the most well regarded and widely read minds in the field of Identity and Access Governance.  His first book, "Definitive Guide to IDM Tokens," published in 2014, remains the authoritative work on the subject.  For this next effort, Geoffrey focused on creating something he felt was lacking, a manual for IDM Validator, hence the book's name "IDM Validator:  The Missing Manual."  The work delves into covers testing methodologies and reviews all actions in Validator with highlighted examples; it is sure to be a fixture in the technical library of anyone working with Validator for years to come.   Click here to learn more about CIS’ Identity team and their capabilities.

Read More


Leadership

A founding philosophy at CIS is to provide excellence in every conceivable role. CIS goes to great lengths to ensure that each member of the CIS team exudes courtesy and confidence. Each CIS team is managed by a Practice Director, who is typically responsible for architecting and designing projects, interfacing with clients in conjunction with the assigned project manager, and providing high-level management, as needed.

CIS Executives are directly involved in the daily aspects of the firm's business, providing direct management of client accounts and operations, as well as oversight to accounts that are managed by CIS Reps. This approach helps ensure that clients have a true voice in what is done, with feedback going directly to management and ownership, making CIS shockingly responsive to client needs.

Click Here to read more about our Leadership Team




CIS Client Reference Letters