Coalfire
Close
  • Home
  • Toggle Solutions
    • Toggle Cloud security
      • Cloud security strategy and maturity assessment
      • Accelerated Cloud Engineering
      • Infrastructure as Code development
      • Cyber performance review
      • Product applicability guides
      • Security operations and cyber dashboards
    • Toggle Threat and vulnerability management
      • CoalfireOne scanning
      • Penetration testing
      • Red team exercise
      • Threat modeling and attack simulation
      • Vulnerability assessment
    • Toggle Strategy, privacy, and risk
      • Strategy+ cybersecurity program assessment
      • CISO program management
      • Privacy services
      • M&A cyber due diligence
      • Cyber risk assessment
      • Healthcare security risk analysis and advisory
      • Third-party risk management
      • Cyber breach services
    • Toggle Cloud managed services
      • Accelerated Cloud Engineering services
      • CoalfireOne scanning
      • Security operations and cyber dashboards
    • Toggle Secure product development
      • Application security
      • Internet of Things security
    • Toggle Compliance services
      • CMMC
      • DEA EPCS
      • DoD RMF
      • FedRAMP
      • FFIEC
      • FISMA
      • HIPAA
      • HITRUST
      • ISO management
      • ITAR and EAR
      • NIST SP 800-171
      • PA-DSS/SSF
      • Payments services
      • PCI DSS assessments and advisory
      • PCI Forensic Investigator
      • PCI in the cloud
      • P2PE
      • Report on compliance
      • SOC and SSAE 18
      • White paper services
    • Toggle CoalfireOne℠
      • CoalfireOne overview
      • CoalfireOne assessment and project management
      • CoalfireOne scanning
      • CoalfireOne Compliance Management
  • Toggle Industries
    • Cloud service providers
    • Federal government
    • Financial services
    • Healthcare
    • Higher education
    • Hospitality
    • Retail
    • State & local government
    • Technology
    • Utilities
  • Toggle About
    • Company overview
    • Board Advisors and Directors
    • Executive Team
    • Partners
    • Quality management
    • Richard E. Dakin Fund
  • Toggle Insights
    • Blog
    • Resources
    • News and events
  • Careers
  • Contact
Toggle navigation

Coalfire Resources

  • Featured
  • Brochures
  • Case Studies
  • Data Sheets
  • Webinars
  • White Papers
  • Videos
  • All Resources

Brochures

Coalfire corporate overview

Coalfire corporate overview

Services that span the cybersecurity lifecyle including: advisory, compliance, technical testing, and engineering services. Learn more about why Coalfire is a leader in cybersecurity.

brochure

Coalfire Federal overview

Coalfire Federal overview

Coalfire Federal has a proven track record of providing a full spectrum of cybersecurity services for federal government clients.

brochure

CoalfireOne overview - a complete view into your Coalfire assessements

CoalfireOne overview - a complete view into your Coalfire assessements

CoalfireOne delivers the technology and insight to help you simplify compliance and reduce risks. Announcing CoalfireOne, the latest suite of tools by Coalfire, designed to empower your enterprise.

brochure

Solutions
  • Cloud security
  • Threat and vulnerability management
  • Strategy, privacy, and risk
  • Cloud managed services
  • Secure product development
  • Compliance services
  • CoalfireOne℠

Industries
About
  • Company overview
  • Board Advisors and Directors
  • Executive Team
  • Quality management
  • Richard E. Dakin Fund
  • Partners
Insights
  • Blog
  • Resources
  • News and events
  • Newsletter

Certificate program
Careers Contact us

Under attack? Take immediate action with our digital forensics services.

  • USA/CAN: (877) 224-8077
  • FEDERAL: (703) 760-3801
  • UK/EMEA: +44 161 464 6302

Copyright © Coalfire. All Rights Reserved. Privacy Policy and disclaimers Vulnerability discourse policy

  • Facebook
  • Twitter
  • LinkedIn
CoalfireOne login
  • Solutions
    • Cloud security
    • Threat and vulnerability management
    • Strategy, privacy, and risk
    • Cloud managed services
    • Secure product development
    • Compliance services
    • CoalfireOne℠
    {%DocumentName%} Image

    Move forward, faster with solutions that span the entire cybersecurity lifecycle. Our experts help you develop a business-aligned strategy, build and operate an effective program, assess its effectiveness, and validate compliance with applicable regulations.

    • Cloud security strategy and maturity assessment

      Assess and improve your cloud security posture

    • Accelerated Cloud Engineering

      Streamline cloud development with compliant-ready environments

    • Infrastructure as Code development

      Build in cybersecurity right from the start

    • Cyber performance review

      Secure your cloud and IT perimeter with the latest boundary protection techniques

    • Product applicability guides

      Increase customer confidence by promoting your security story

    • Security operations and cyber dashboards

      Make smart, strategic, and informed decisions about security events

    • CoalfireOne scanning

      Confirm system protection by quickly and easily running internal and external scans

    • Penetration testing

      Discover and remediate critical vulnerabilities before they’re exploited

    • Red team exercise

      Boost your defenses by simulating a real-world attack

    • Threat modeling and attack simulation

      Maximize security investments and prove their effectiveness

    • Vulnerability assessment

      Strengthen your risk and compliance postures with a proactive approach to security

    • Strategy+ cybersecurity program assessment

      Drive business success through cybersecurity strategy

    • CISO program management

      Strengthen your program by putting our experts to work

    • Privacy services

      Turn privacy into a competitive advantage

    • M&A cyber due diligence

      Know what risks you’re facing with a merger or acquisition

    • Cyber risk assessment

      Uncover the risks present in your organization

    • Healthcare security risk analysis and advisory

      Safeguard protected health information and medical devices

    • Third-party risk management

      Hold vendors and partners to your security standards

    • Cyber breach services

      Don’t waste critical response time. Prepare for incidents before they happen.

    • Accelerated Cloud Engineering services

      Reduce the operational burden associated with maintaining your FedRAMP boundary

    • CoalfireOne scanning

      Confirm system protection by quickly and easily running internal and external scans

    • Security operations and cyber dashboards

      Make smart, strategic, and informed decisions about security events

    • Application security

      Identify weaknesses that make your applications ripe for attacks

    • Internet of Things security

      Protect every aspect of your IoT solution

    • CMMC

      Navigate your path to Cybersecurity Maturity Model Certification

    • DEA EPCS

      Simplify and streamline DEA EPCS compliance

    • DoD RMF

      Assess your systems to DoD RMF standards

    • FedRAMP

      Get advisory and assessment services from the leading 3PAO

    • FFIEC

      Reduce IT security risk in financial services

    • FISMA

      Meet your FISMA authorization needs

    • HIPAA

      Protect health data from threats and vulnerabilities

    • HITRUST

      Receive guidance from an original HITRUST CSF Assessor firm

    • ISO management

      Build a management system that complies with ISO standards

    • ITAR and EAR

      Understand and address ITAR and EAR security obligations

    • NIST SP 800-171

      Protect controlled unclassified information

    • PA-DSS/SSF

      Validate the security of your payment applications

    • Payments services

      Shape your overall payments program for current and future security

    • PCI DSS assessments and advisory

      Protect cardholder data from cyber attacks and breaches

    • PCI Forensic Investigator

      Suspect a cardholder data breach? Contact us now.

    • PCI in the cloud

      Simplify and optimize PCI compliance in the cloud

    • P2PE

      Secure data as soon as it’s entered into a point device

    • Report on compliance

      Provide the strongest validation of your PCI program

    • SOC and SSAE 18

      Ensure trust and confidence in your security and financial controls

    • White paper services

      Demonstrate your commitment to cybersecurity

    • CoalfireOne overview

      Use our cloud-based platform to simplify compliance, reduce risks, and empower your enterprise’s security

    • CoalfireOne assessment and project management

      Manage and simplify your compliance projects and assessments with Coalfire through an easy-to-use collaboration portal

    • CoalfireOne scanning

      Quickly configure and manage requirements for internal and external vulnerability scanning and PCI ASV scans

    • CoalfireOne Compliance Management

      Maintain and improve security with year-round visibility and proactive management of your compliance program

  • Industries
    • Cloud service providers
    • Federal government
    • Financial services
    • Healthcare
    • Higher education
    • Hospitality
    • Retail
    • State & local government
    • Technology
    • Utilities
    {%DocumentName%} Image

    While cybersecurity is a priority for enterprises worldwide, requirements differ greatly from one industry to the next. Coalfire understands industry nuances; we work with leading organizations in the cloud and technology, financial services, government, healthcare, and retail markets.

    Cloud service providers Image

    Coalfire can help cloud service providers prioritize the cyber risks to the company, and find the right cyber risk management and compliance efforts that keeps customer data secure, and helps differentiate products.

    Federal government Image

    "Success" at a government entity looks different at a commercial organization. Create cybersecurity solutions to support your mission goals with a team that understands your unique requirements.

    Financial services Image

    The financial services industry was built upon security and privacy. As cyber-attacks become more sophisticated, a strong vault and a guard at the door won’t offer any protection against phishing, DDoS attacks and IT infrastructure breaches.

    Healthcare Image

    The continuum of care is a concept involving an integrated system of care that guides and tracks patients over time through a comprehensive array of health services spanning all levels of care. Interoperability is the central idea to this care continuum making it possible to have the right information at the right time for the right people to make the right decisions.

    Higher education Image

    Maintaining network and data security in any large organization is a major challenge for information systems departments. However, in the higher education environment, the protection of IT assets and sensitive information must be balanced with the need for ‘openness’ and academic freedom; making this a more difficult and complex task.

    Hospitality Image

    When it comes to cyber threats, the hospitality industry is not a friendly place. Hotels and resorts have proven to be a favorite target for cyber criminals who are looking for high transaction volume, large databases and low barriers to entry.

    Retail Image

    The global retail industry has become the top target for cyber terrorists, and the impact of this onslaught has been staggering to merchants. To secure the complex IT infrastructure of a retail environment, merchants must embrace enterprise-wide cyber risk management practices that reduces risk, minimizes costs and provides security to their customers and their bottom line.

    State & local government Image

    Private enterprises serving government and state agencies need to be upheld to the same information management practices and standards as the organizations they serve. Coalfire has over 16 years of experience helping companies navigate increasing complex governance and risk standards for public institutions and their IT vendors.

    Technology Image

    Technology innovations are enabling new methods for corporations and governments to operate and driving changes in consumer behavior. The companies delivering these technology products are facilitating business transformation that provides new operating models, increased efficiency and engagement with consumers as businesses seek a competitive advantage.

    Utilities Image

    Cybersecurity has entered the list of the top five concerns for U.S. electric utilities, and with good reason. According to the Department of Homeland Security, attacks on the utilities industry are rising "at an alarming rate".

  • About
    • Company overview
    • Board Advisors and Directors
    • Executive Team
    • Partners
    • Quality management
    • Richard E. Dakin Fund
    {%DocumentName%} Image

    Since 2001, Coalfire has worked at the cutting edge of technology to help public and private sector organizations solve their toughest cybersecurity problems and fuel their overall success.

    Company overview Image

    Coalfire helps organizations comply with global financial, government, industry and healthcare mandates while helping build the IT infrastructure and security systems that will protect their business from security breaches and data theft. The company is a leading provider of IT advisory services for security in retail, payments, healthcare, financial services, higher education, hospitality, government and utilities.

    Board Advisors and Directors Image

    The Coalfire Board of Directors provides invaluable guidance for the organization and reflects Coalfire’s dedication to achieving success for our customers.

    Executive Team Image

    Coalfire’s executive leadership team comprises some of the most knowledgeable professionals in cybersecurity, representing many decades of experience leading and developing teams to outperform in meeting the security challenges of commercial and government clients. With diverse backgrounds in IT systems security, governmental security, compliance, and reducing risk while implementing the latest enabling technologies (such as the Cloud and IoT), our leaders understand the challenges customers face.

    Partners Image

    Security is a team game. If your organization values both independence and security, perhaps we should become partners.

    Quality management Image

    With a passion for quality, Coalfire uses a process-driven quality approach to improve the customer experience and deliver unparalleled results.

    Richard E. Dakin Fund Image

    Created in honor of the late co-founder of Coalfire, the Richard E. Dakin Fund at The Denver Foundation is supporting scholarship programs at several universities for promising college students studying cybersecurity and related fields.

  • Insights
    • Blog
    • Resources
    • News and events
    {%DocumentName%} Image

    Get valuable insight into what matters most in cybersecurity, cloud, and compliance. Here you’ll find resources – including research reports, white papers, case studies, the Coalfire blog, and more – along with recent Coalfire news and upcoming events.

    Blog Image

    Written by Coalfire's leadership team and our security experts, the Coalfire Blog covers the most important issues in cloud security, cybersecurity, and compliance.

    Resources Image

    Find information that can help you approach cybersecurity programmatically. Explore our research reports, white papers, on-demand webinars, videos, case studies, and more.

    News and events Image

    Stay up-to-date with all things Coalfire. Find upcoming events and webinars. See what’s new with your cybersecurity partner. And read the latest media coverage.

  • Careers
    {%DocumentName%} Image

  • Contact
    • Locations
    {%DocumentName%} Image

Close
Top