The Secure Edge

In much of government and industry, technology architectures are built on a foundation that assumes reliable, readily-available and physically secure infrastructures and resources are available to users. In today’s world, however, the same cannot be said for many in the Intelligence Community (IC), Department of Defense (DoD), and other agencies’ users whose missions demand higher levels of security. These users live in a world of continually contested communications. They operate in challenging tactical environments in the field and in facilities where their communications must be protected – they live at the Secure Edge.

CIS Secure brings innovative Secure Edge solutions to the IC, DoD, and other users who need to make sure the security and the integrity of their communications are ensured, regardless of the demanding environments they must face.

No two missions
or solutions are alike

Learn more about CIS Secure's TSG Voice & Video, TEMPEST and Tactical Solutions.

Mission-driven solutions for a world at risk

secure edge soldier laptop radio

Tactical Flexibility

The Tactical Edge is commonly defined as the platforms, sites, and personnel operating in an environment characterized by:

  • a dependence on information systems and connectivity,
  • threats to the operational readiness of both information systems and connectivity, and
  • users dependent on the availability, integrity, and transparency of their information systems.

Users at the Tactical Edge often operate in the field and away from the friendly confines of their home facility. While away from their base of operations, these users must still execute the tasks associated with their mission by communicating with all stakeholders involved. Connecting to secure networks and having fully functional secure collaboration capabilities are key to their success. As a technology innovator, CIS Secure leads the way in support of these users by transforming networking and communications equipment from office-based devices into portable kits that can be deployed in the field.

secure edge person laptop headset
secure edge person standing soldier sitting headset

The ability to extend the functionality of these critical functions into simple, intuitive kits that can be transported anywhere – enables users to follow existing workflows and leverage established user training outside of the office.

CIS Secure’s understanding of mission requirements allows us to seamlessly extend office capabilities into the field by changing the form factor of commonly-used components that can then be leveraged – wherever, whenever.

TEMPEST

Many people understand that a Sensitive Compartmented Information Facility (SCIF) is a US government-accredited facility where classified or sensitive information can be stored, discussed and electronically processed. While very effective, building out and maintaining a SCIF can be expensive and complex. If the goal is to shield IT equipment (inside or outside of a SCIF), another effective approach is to block emanations (unintended data-related or intelligence-bearing radio frequency signals) by leveraging TEMPEST-certified electronic devices.

CIS Secure TEMPEST products are specifically designed to suppress compromising emanations and mitigate unwanted electromagnetic or acoustic signals. We leverage innovative designs and specially shielded materials in the development of our TEMPEST devices. Our experienced engineering team and subject matter experts have extensive program experience and the technical expertise to develop TEMPEST certified products to meet the needs of the mission.

CIS Secure TEMPEST portfolio includes computing, networking, peripherals and secure video solutions.