<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

2019 Security Report: Cyber Attack Trends Analysis

See Latest Trends

8 Steps to Prevent the next Data Breach

Download the Data Breach Guide

Simplifying the Business of Security

For over two decades, Cadre Information Security has been the single source for security guidance, enabling our clients to focus on increasing value, efficiency and productivity. We take the complexity out of the network, giving you the confidence that comes from security that supports and evolves with your business goals. 

Every person in the company is committed to doing whatever it takes to understand your information security needs and develop the best systems and solutions for your organization. We invest the right amount of time, energy and money in training, education, certification and technologies to make sure your needs are met before, during and after your solution is implemented. Around the corner or around the globe, our service extends beyond our technical capabilities.

The strength of our relationships with “best of breed” network security technologies allows us to serve as your authority on the most complex information security solutions.

View Partners

Solutions for your unique security needs. 

Our talented team of security experts deliver tailored and unique solutions to help secure your business.

Learn More About Us. 

Training and Certifications

Our customized courses help you expand your product knowledge and validate your expertise. Our instructor-led courses provide hands-on learning, in-class demonstrations and constructive feedback.


The most critical first step any organization should take is to independently evaluate its current security posture. As a trusted security partner for over two decades, Cadre offers a comprehensive suite of assessment services.

Managed Security Services

Our engineers will take the burden off your team with comprehensive IT security support.


To avoid unwanted intrusions Cadre offers comprehensive and expert analysis that yields the most appropriate strategies and infrastructure design to manage your information security. 

Recent Blog Posts

5 Ways to be Sure You’re not Over- or Under-Solving for Security

Remember the story of Goldilocks breaking into the three bears’ cottage and wreaking havoc? Goldilocks was eager to eat the porridge left by the bears, so she tried the first bowl and soon realized it was too hot. The ...

Read more

Grab-n-Go Baldr Malware: A Stunning New Type of Malware

Author: Tim O'Connor A revolutionary new type of malware toolset is starting to show up in dark web hacking forums. The new malware architecture is being called “Grab-n-Go”.

Read more

Why the Citrix Breach Happened and 6 Steps You Can Take to Protect Your Company

What happened? Citrix, an American software company, disclosed a security breach in which hackers potentially exposed customer data. On March 6, 2019, the FBI contacted Citrix to advise they had reason to believe that ...

Read more


We want to help. If you have a specific question or just looking for general information, send us a message and we'll be in touch shortly.

Contact Us