• CoalfireOneSM Login
Coalfire
Close
  • Home
  • Toggle About
    • Company Overview
    • Board of Directors
    • Executive Team
    • Quality Management
    • Richard E. Dakin Fund
    • Partners
  • Toggle Industries
    • Cloud Service Providers
    • Federal Government
    • Financial Services
    • Healthcare & Life Sciences
    • Higher Education
    • Hospitality
    • Payments
    • Restaurants
    • Retail
    • State & Local Government
    • Technology
    • Utilities
  • Toggle Solutions
    • Toggle Cyber Risk Services
      • Assessments
      • Advisory
    • Toggle Cyber Engineering
      • Cyber Defense
      • Security Monitoring and Analytics
      • Security Architecture
    • Toggle Compliance Services
      • DoD RMF
      • FedRAMP
      • FFIEC
      • FISMA
      • GDPR
      • HIPAA
      • HITRUST
      • ISO 27001
      • ITAR EAR DFARS
      • NERC CIP
      • NIST SP 800-171
      • PA-DSS
      • PCI DSS
      • P2PE
      • PCI Forensic Investigator (PFI)
      • SOC
      • White Paper Services
    • Toggle Coalfire Labs
      • Research and Development
      • Penetration Testing
      • Digital Forensics
      • Application Security
      • Red Team Exercise
    • Toggle Internet of Things
      • Internet of Things Overview
    • Toggle CoalfireOne℠
      • CoalfireOne Overview
      • CoalfireOne Scanning Solutions
  • Resources
  • Careers
  • News & Events
  • Blog
  • Contact
Toggle navigation

Secure Your Future

Industries

  • Cloud Service Providers
  • Federal Government
  • Financial Services
  • Healthcare & Life Sciences
  • Higher Education
  • Hospitality
  • Payments
  • Restaurants
  • Retail
  • State & Local Government
  • Technology
  • Utilities

Solutions

  • Cyber Risk Services
  • Cyber Engineering
  • Compliance Services
  • Coalfire Labs
  • Internet of Things
  • CoalfireOne℠

About

  • Company Overview
  • Board of Directors
  • Executive Team
  • Quality Management
  • Richard E. Dakin Fund
  • Partners

Coalfire Certificate Program

A Coalfire Certificate is proof-positive that information technology controls have been independently scanned, assessed or validated in accordance with the highest industry standards. Certificates can be displayed on websites or in print.

Overview

Contact

  • USA/CAN: (877) 224-8077
  • FEDERAL: (703) 760-3801
  • UK/EMEA: +44 161 464 6302

 

Newsletter

Receive the latest cybersecurity news and insights from Coalfire.

Subscribe

 

  • Facebook
  • Twitter
  • LinkedIn

Copyright © 2018 Coalfire. All Rights Reserved. | Privacy Policy & Disclaimers

  • About
    • Company Overview
    • Board of Directors
    • Executive Team
    • Quality Management
    • Richard E. Dakin Fund
    • Partners
    {%DocumentName%} Image

    Coalfire started in 2001 with a simple idea – cyber threats are increasing, compliance mandates are getting more complicated, and a well-designed cybersecurity program can help fuel your overall success.

    Company Overview Image

    Coalfire helps organizations comply with global financial, government, industry and healthcare mandates while helping build the IT infrastructure and security systems that will protect their business from security breaches and data theft. The company is a leading provider of IT advisory services for security in retail, payments, healthcare, financial services, higher education, hospitality, government and utilities.

    Board of Directors Image

    The Coalfire Board of Directors provides invaluable guidance for the organization and reflects Coalfire’s dedication to achieving success for our customers.

    Executive Team Image

    Coalfire’s executive leadership team comprises some of the most knowledgeable professionals in cybersecurity, representing many decades of experience leading and developing teams to outperform in meeting the security challenges of commercial and government clients. With diverse backgrounds in IT systems security, governmental security, compliance, and reducing risk while implementing the latest enabling technologies (such as the Cloud and IoT), our leaders understand the challenges customers face.

    Quality Management Image

    With a passion for quality, Coalfire uses a process-driven quality approach to improve the customer experience and deliver unparalleled results.

    Richard E. Dakin Fund Image

    Created in honor of the late co-founder of Coalfire, the Richard E. Dakin Fund at The Denver Foundation is supporting scholarship programs at several universities for promising college students studying cybersecurity and related fields.

    Partners Image

    Security is a team game. If your organization values both independence and security, perhaps we should become partners.

  • Industries
    • Cloud Service Providers
    • Federal Government
    • Financial Services
    • Healthcare & Life Sciences
    • Higher Education
    • Hospitality
    • Payments
    • Restaurants
    • Retail
    • State & Local Government
    • Technology
    • Utilities
    {%DocumentName%} Image

    The increased need for cyber security has become a common enterprise priority across the globe. However, industry requirements for effective cyber risk management are as distinct as the individual entities under fire. Enterprises and government organizations need more than an off-the-shelf audit to provide an effective threat assessment. They need industry- and organization-specific insights, tools and processes to protect digital assets and ensure compliance.

    Cloud Service Providers Image

    Coalfire can help cloud service providers prioritize the cyber risks to the company, and find the right cyber risk management and compliance efforts that keeps customer data secure, and helps differentiate products.

    Federal Government Image

    “Success” at a government entity looks different than at a commercial organization. Create cybersecurity solutions to support your mission goals with a team that understands your unique requirements.

    Financial Services Image

    The financial services industry was built upon security and privacy. As cyber-attacks become more sophisticated, a strong vault and a guard at the door won’t offer any protection against phishing, DDoS attacks and IT infrastructure breaches.

    Healthcare & Life Sciences Image

    The continuum of care is a concept involving an integrated system of care that guides and tracks patients over time through a comprehensive array of health services spanning all levels of care. Interoperability is the central idea to this care continuum making it possible to have the right information at the right time for the right people to make the right decisions.

    Higher Education Image

    Maintaining network and data security in any large organization is a major challenge for information systems departments. However, in the higher education environment, the protection of IT assets and sensitive information must be balanced with the need for ‘openness’ and academic freedom; making this a more difficult and complex task.

    Hospitality Image

    When it comes to cyber threats, the hospitality industry is not a friendly place. Hotels and resorts have proven to be a favorite target for cyber criminals who are looking for high transaction volume, large databases and low barriers to entry.

    Payments Image

    The payments industry is undergoing rapid changes and unfortunately, an increasing risk for data breaches. Cyber criminals are growing increasingly businesslike, and payments leaders need to move quickly to cover their cyber risk.

    Restaurants Image

    The food and beverage industry is under attack from cyber criminals intent on stealing payment information. The food and beverage industry makes up the highest percentage of breach investigations, at nearly 73 percent, according to Visa.

    Retail Image

    The global retail industry has become the top target for cyber terrorists, and the impact of this onslaught has been staggering to merchants. To secure the complex IT infrastructure of a retail environment, merchants must embrace enterprise-wide cyber risk management practices that reduces risk, minimizes costs and provides security to their customers and their bottom line.

    State & Local Government Image

    Private enterprises serving government and state agencies need to be upheld to the same information management practices and standards as the organizations they serve. Coalfire has over 16 years of experience helping companies navigate increasing complex governance and risk standards for public institutions and their IT vendors.

    Technology Image

    Technology innovations are enabling new methods for corporations and governments to operate and driving changes in consumer behavior. The companies delivering these technology products are facilitating business transformation that provides new operating models, increased efficiency and engagement with consumers as businesses seek a competitive advantage.

    Utilities Image

    Cybersecurity has entered the list of the top five concerns for U.S. electric utilities, and with good reason. According to the Department of Homeland Security, attacks on the utilities industry are rising "at an alarming rate."

  • Solutions
    • Cyber Risk Services
    • Cyber Engineering
    • Compliance Services
    • Coalfire Labs
    • Internet of Things
    • CoalfireOne℠
    {%DocumentName%} Image

    Cyber risk management, advisory, technology and compliance services. Manage risk and maximize return on investment to prevent data breaches and theft. Coalfire’s solutions are led by a team of industry experts that help enterprise organizations understand a wide range of compliance and risk management initiatives, which enables a consistent cybersecurity framework across the organization.

    • Assessments

      Expert assessments that provide an accurate understanding of what you are trying to protect, the inherent and residual cyber risk to your enterprise and the maturity of the your security program and underlying controls

    • Advisory

      Customized services to help CISOs and Senior Management develop cybersecurity strategy, implement controls, and govern a security program

    • Cyber Defense

      Adopt a proactive approach to cybersecurity

    • Security Monitoring and Analytics

      Make more informed security-related decisions

    • Security Architecture

      Design, engineer, and scale with confidence

    • DoD RMF

      Certification and Accreditation (C&A) process for DoD

    • FedRAMP

      Get FedRAMP authorized with the leading 3PAO

    • FFIEC

      Reducing Financial IT Security Risk

    • FISMA

      Meet your FISMA authorization needs

    • GDPR

      General Data Protection Regulation

    • HIPAA

      Health data protection for all shapes and sizes

    • HITRUST

      The most rigorous approach to meeting HIPAA requirements

    • ISO 27001

      An internationally recognized approach to information security

    • ITAR EAR DFARS

      ITAR, EAR, and DFARS Advisory and Assessment

    • NERC CIP

      Cyber security for electric grid critical infrastructure

    • NIST SP 800-171

      Protect Controlled Unclassified Information for Nonfederal

    • PA-DSS

      Payment Application Security Validation

    • PCI DSS

      PCI Data Security Standard Compliance

    • P2PE

      Point-to-Point Encryption

    • PCI Forensic Investigator (PFI)

      Have you suffered a data breach of cardholder data?

    • SOC

      Establish and report controls to differentiate your organization

    • White Paper Services

      Demonstrate your commitment to cybersecurity

    • Research and Development

      Malware and Vulnerability Research, Open Source Tools, and Opinions

    • Penetration Testing

      Understand vulnerabilities and implement remediation before they’re exploited

    • Digital Forensics

      Obtain, preserve, and examine digital evidence

    • Application Security

      Secure the design, development, and deployment of your applications

    • Red Team Exercise

      Test your organization’s defense against a simulated real-world attack

    Internet of Things Image

    Secure physical and digital IoT solutions with advisory, assessment and technical testing for makers, operators and users to empower the way we live and work.

    • CoalfireOne Overview

      Control your Compliance

    • CoalfireOne Scanning Solutions

      Easily identify IT vulnerabilities

  • Resources
    {%DocumentName%} Image

  • News & Events
    • Events
    • In the News
    • Scans Newsletter
    • Press Releases
    • Newsletter
    {%DocumentName%} Image

  • Careers
    {%DocumentName%} Image

  • Contact
    • Locations
    {%DocumentName%} Image

Close