GET A QUOTE
SUPPORT
Company
Innovative Secure Communications
CIS Secure pushes the boundaries of design and innovation to advance and protect your mission. Count on us for end-to-end service on the broadest portfolio of powerful communications and cybersecurity solutions.
About Us
Who We Are
What We Do
Who We Serve
Leadership
Partners
Contact
Contact Sales
Contact Support
RMA Request
(703) 996-0500
sales@cissecure.com
support@cissecure.com
Capabilities
Mobile Mission Support
Secure Personal Mobility
Secure Mobile Computing
Tactical
Secure Collaboration
TSG Voice
TSG Video
Secure Edge
Tempest
Secure Services
Calibration
Engineering
Enterprise Modernization
Intelligence Analysis
Mission Support
Operational Readiness
Program Management
Unmanned Aerial System/Counter-UAS
Contracts
Careers
Join a Team That Defends the Way You Live
Put your talents to work on critical missions of consequence to national security.
Careers
Life at CIS Secure
Benefits
Awards
Search Openings
News
Take a Deeper Dive
Keep up with industry developments and see what our IC and DoD experts have to say about mission-driven, secure communications.
News Library
All News
Blog
Press Releases
Collateral
Videos
Events
Support
How can we help?
CIS Secure is a 24/7 operation built upon mission understanding, deep subject matter expertise, and disciplined program management to help you achieve new levels of performance, productivity and mission success.
Contact Sales
(703) 996-0500
sales@cissecure.com
Contact Support
(703) 996-0500
support@cissecure.com
RMA Request Form
(703) 996-0500
support@cissecure.com
Search
SEARCH FOR:
PRODUCT CATALOG
Featured News
Press Release
Featured
CIS Secure Names William Hargreaves Chief Product Officer
Read More
Press Release
Featured
CIS Secure Announces Promotion of Jim Patterson to Chief Technology Officer
Read More
Press Release
Featured
CIS Secure’s Intrepid Solutions Team Receives the Hire Vets Gold Medallion Award for the Fourth Year
Read More
Search & Filter
Content Type
Topics
Search
Blog
Featured
Zero Trust in the Energy Industry: Securing Critical Infrastructure and Data
Learn More
Blog
Featured
Mission Possible: Secure Space-based Communications
Learn More
Blog
Featured
Mobile Security Dos and Don’ts
Learn More
Blog
Featured
Zero Trust in the supply chain: Authentication is in.
Learn More
Blog
Featured
Secure Communications: Born For a Zero Trust World
Learn More
Blog
Featured
Are Your VoIP phones eavesdropping?
Learn More
Blog
altOS Management Server Now Runs on Red Hat
Learn More
Blog
Mobile Device Management (MDM) Versus altOS
Learn More
Blog
Enabling the Safe Use of Employee Mobile Phones in Secure Facilities
Learn More
Blog
Webinar Replay: Enabling the Safe Use of Cell phones in Secure Facilities
Learn More
Blog
Off Means Off – Are Your Mobile Devices Listening?
Learn More
Blog
Protect the Mobile Phone User – Not Just the Data
Learn More