Sold by: Coalfire Systems, Inc.
Coalfire’s Vulnerability & Exposure Management Services help organizations identify, validate, and remediate security gaps across cloud and on-prem environments. Our offerings combine advanced scanning techniques, exploit validation, and attack surface discovery with expert advisory services to ensure prioritized risk reduction.
Overview
Services We Provide
Vulnerability Scanning
Cloud Workload Vulnerability Scanning
* Comprehensive vulnerability scanning across one (1) cloud environment (AWS, Azure, or GCP) covering up to two (2) regions with a combined total of 100 workloads. Includes connector configuration/setup for greater coverage. * *Deliverable: Raw scan resultsIT Vulnerability Scanning
* Vulnerability scanning across five (5) /22 subnet (up to 5,120 IP addresses) at one (1) physical location to identify vulnerabilities across systems, workstations, servers, network devices, IoT devices, and endpoints within on-premise environments (excludes cloud-hosted IT assets). Supports authenticated and/or unauthenticated scans. * *Deliverable: Raw scan resultsExploit Validation Services
Exploit Validation Testing
* Simulate real-world adversary exploitation techniques in a safe, controlled manner on up to five (5) qualified vulnerabilities to validate which exposures are truly exploitable in your unique environment. * Assess how environmental variables influence vulnerability exploitability and actual risk. * Align validation efforts with tactics, techniques, and procedures (TTPs) from MITRE ATT&CK, recent threat intelligence, and known exploit kits to reflect current adversary behavior and real-world attack scenarios. * *Deliverable: Exploit Validation Testing ReportAttack Surface Discovery Services
External Attack Surface Discovery Scanning
* Comprehensive reconnaissance and scanning to identify all internet-facing assets, including web applications, cloud resources, domains, subdomains, IP ranges, and exposed services across one (1) attack surface with up to 3,000 assets. * Identify and catalog exposed services, open ports, and running applications across the external attack surface. * Uncover unauthorized systems, forgotten infrastructure, third-party integrations, and shadow IT assets that may exist outside of documented inventories. * *Deliverable: Raw scan resultsInternal Attack Surface Discovery Scanning
* Comprehensive scanning across one (1) attack surface covering up to five (5) /22 subnets (up to 5,120 IP addresses) to identify systems, workstations, servers, network devices, IoT devices, and endpoints within the organization's internal environment. * Identify and catalog internal services, applications, databases, file shares, and accessible resources across network segments to map the internal attack surface. * Evaluate network segmentation controls, VLAN configurations, and access boundaries to identify lateral movement opportunities and segmentation weaknesses. * Uncover unauthorized systems, rogue devices, undocumented servers, and shadow IT assets operating within trusted network zones outside of documented inventories. * *Deliverable: Raw scan resultsDark Web Intelligence Services
Dark Web Monitoring
* Targeted monitoring of dark web forums, marketplaces, paste sites, and underground communities for 30 days to identify exposed organizational data, credential leaks, and threat actor discussions related to one (1) brand or customer domain.Exposure Management Advisory Services
Vulnerability Scan Analysis & Remediation Guidance
* Bridge the gap between vulnerability identification and effective risk reduction by developing precise, actionable remediation strategies for up to ten (10) vulnerabilities that enable organizations to address security gaps confidently and efficiently (actual number reviewed may vary based on vulnerability complexity). * Receive tailored recommendations for addressing identified vulnerabilities and guide risk acceptance strategies to align with organizational risk tolerance and business objectives. * *Deliverables: Vulnerability Remediation ReportVulnerability Scanner Configuration Review:
* Review existing vulnerability scanning platform configurations, policies, and integrations to identify gaps and optimization opportunities (one (1) day engagement). * Analyze up to five (5) active scan policies to evaluate coverage, scheduling, and alignment with organizational risk priorities. * Assess up to three (3) platform integrations with security tools, ticketing systems, or SIEM solutions to identify workflow inefficiencies and improvement opportunities. * *Deliverables: Platform Configuration Gap ReportAttack Surface Analysis & Recommendations
* Map the external attack surface by identifying exposed services, open ports, cloud resources, third-party integrations, and potential entry points visible to external adversaries for one (1) attack surface up to 5,500 assets. * Validate discovered assets against existing inventories. * Obtain strategic guidance on minimizing potential entry points through comprehensive attack surface management practices, enhancing security posture and reducing the likelihood of successful attacks. * *Deliverable: Attack Surface Mapping and Analysis ReportHighlights
- Unified Defense Starts Here: Exposure management that doesn’t wait for trouble. We connect tools, data, and people to identify, prioritize, and neutralize risks before attackers even take aim.
- Real-world validation: Exploit testing aligned with MITRE ATT&CK to prioritize true risk.
- Dark Web. Fully Exposed. DivisionHex’s Cyber Intel Monitoring keeps eyes where attackers hide — tracking leaks, chatter, and stolen data across the dark web to uncover risks early and take them down fast.
Details
Sold by
Categories
Delivery method
Deployed on AWS
Unlock automation with AI agent solutions
Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.

Pricing
Custom pricing options
Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.
How can we make this page better?
We'd like to hear your feedback and ideas on how to improve this page.
Legal
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Resources
Support
Vendor support
For questions or support, please reach out to CoalfireAWSpartner@coalfire.com