Listing Thumbnail

    Vulnerability & Exposure Management Services by DivisionHex

     Info
    Coalfire’s Vulnerability & Exposure Management Services help organizations identify, validate, and remediate security gaps across cloud and on-prem environments. Our offerings combine advanced scanning techniques, exploit validation, and attack surface discovery with expert advisory services to ensure prioritized risk reduction.

    Overview

    Services We Provide

    Vulnerability Scanning

    Cloud Workload Vulnerability Scanning

    * Comprehensive vulnerability scanning across one (1) cloud environment (AWS, Azure, or GCP) covering up to two (2) regions with a combined total of 100 workloads. Includes connector configuration/setup for greater coverage. * *Deliverable: Raw scan results

    IT Vulnerability Scanning

    * Vulnerability scanning across five (5) /22 subnet (up to 5,120 IP addresses) at one (1) physical location to identify vulnerabilities across systems, workstations, servers, network devices, IoT devices, and endpoints within on-premise environments (excludes cloud-hosted IT assets). Supports authenticated and/or unauthenticated scans. * *Deliverable: Raw scan results

    Exploit Validation Services

    Exploit Validation Testing

    * Simulate real-world adversary exploitation techniques in a safe, controlled manner on up to five (5) qualified vulnerabilities to validate which exposures are truly exploitable in your unique environment. * Assess how environmental variables influence vulnerability exploitability and actual risk. * Align validation efforts with tactics, techniques, and procedures (TTPs) from MITRE ATT&CK, recent threat intelligence, and known exploit kits to reflect current adversary behavior and real-world attack scenarios. * *Deliverable: Exploit Validation Testing Report

    Attack Surface Discovery Services

    External Attack Surface Discovery Scanning

    * Comprehensive reconnaissance and scanning to identify all internet-facing assets, including web applications, cloud resources, domains, subdomains, IP ranges, and exposed services across one (1) attack surface with up to 3,000 assets. * Identify and catalog exposed services, open ports, and running applications across the external attack surface. * Uncover unauthorized systems, forgotten infrastructure, third-party integrations, and shadow IT assets that may exist outside of documented inventories. * *Deliverable: Raw scan results

    Internal Attack Surface Discovery Scanning

    * Comprehensive scanning across one (1) attack surface covering up to five (5) /22 subnets (up to 5,120 IP addresses) to identify systems, workstations, servers, network devices, IoT devices, and endpoints within the organization's internal environment. * Identify and catalog internal services, applications, databases, file shares, and accessible resources across network segments to map the internal attack surface. * Evaluate network segmentation controls, VLAN configurations, and access boundaries to identify lateral movement opportunities and segmentation weaknesses. * Uncover unauthorized systems, rogue devices, undocumented servers, and shadow IT assets operating within trusted network zones outside of documented inventories. * *Deliverable: Raw scan results

    Dark Web Intelligence Services

    Dark Web Monitoring

    * Targeted monitoring of dark web forums, marketplaces, paste sites, and underground communities for 30 days to identify exposed organizational data, credential leaks, and threat actor discussions related to one (1) brand or customer domain.

    Exposure Management Advisory Services

    Vulnerability Scan Analysis & Remediation Guidance

    * Bridge the gap between vulnerability identification and effective risk reduction by developing precise, actionable remediation strategies for up to ten (10) vulnerabilities that enable organizations to address security gaps confidently and efficiently (actual number reviewed may vary based on vulnerability complexity). * Receive tailored recommendations for addressing identified vulnerabilities and guide risk acceptance strategies to align with organizational risk tolerance and business objectives. * *Deliverables: Vulnerability Remediation Report

    Vulnerability Scanner Configuration Review:

    * Review existing vulnerability scanning platform configurations, policies, and integrations to identify gaps and optimization opportunities (one (1) day engagement). * Analyze up to five (5) active scan policies to evaluate coverage, scheduling, and alignment with organizational risk priorities. * Assess up to three (3) platform integrations with security tools, ticketing systems, or SIEM solutions to identify workflow inefficiencies and improvement opportunities. * *Deliverables: Platform Configuration Gap Report

    Attack Surface Analysis & Recommendations

    * Map the external attack surface by identifying exposed services, open ports, cloud resources, third-party integrations, and potential entry points visible to external adversaries for one (1) attack surface up to 5,500 assets. * Validate discovered assets against existing inventories. * Obtain strategic guidance on minimizing potential entry points through comprehensive attack surface management practices, enhancing security posture and reducing the likelihood of successful attacks. * *Deliverable: Attack Surface Mapping and Analysis Report

    Highlights

    • Unified Defense Starts Here: Exposure management that doesn’t wait for trouble. We connect tools, data, and people to identify, prioritize, and neutralize risks before attackers even take aim.
    • Real-world validation: Exploit testing aligned with MITRE ATT&CK to prioritize true risk.
    • Dark Web. Fully Exposed. DivisionHex’s Cyber Intel Monitoring keeps eyes where attackers hide — tracking leaks, chatter, and stolen data across the dark web to uncover risks early and take them down fast.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    For questions or support, please reach out to CoalfireAWSpartner@coalfire.com