Security and Cyber Risk

Building effective and efficient defenses for your clients’ IT environments

Cyber Security and Risk Mitigation

With each security project it becomes more apparent that there is no silver bullet to protect an organization from a cyber-attack. At Coquina, we tailor each of our security solutions to the business needs of your clients.  Our services provide measurable data, efficient processes and the mitigation strategies needed to remain secure.


We can help protect your clients’ environment and fight the malicious threat by:


Providing various methods of security testing

Improving the overall security position

Create an end-to-end approach to security management (cloud, multi-cloud, on-premise)

Combat trends and techniques and defend against common threats


We help reduce risk through consulting, services and product expertise and work as a trusted advisor for all cyber security initiatives.  

Lower the risk of future attacks

Security Assessment

Our Security Assessment Service is an explicit study of an IT environment to locate vulnerabilities, risks and preparedness.  We analyze existing security controls and assess their ability to remediate vulnerabilities and recommend steps to lower the risk of future attacks.  

Key steps completed during our Security Assessment include;

Determine information value (short- or long-term impact of information being lost or stolen)

Identify and Prioritize Assets (trade secrets, electronic data, office devices)

Identify Threats (data leaks, insider threats, service disruption)

Identify Vulnerabilities (software analysis, audit reports, incident reports)

Calculate Likelihood and Impact (scenario review, cost of impact)

Prioritize risks (cost of prevention vs. information value)

Document results (risk assessment reporting)

Assessment report (recommended security control changes)


Revealing real-world business impact

Penetration Testing

Our Penetration Testing Service (also known as a pen test) is a simulated cyber-attack against a client’s computer systems to check for exploitable vulnerabilities.  Our team of certified, Cybersecurity Experts will perform “ethical hacking” to identify weaknesses that could be exploited.  We identify vulnerabilities and misconfigurations in your cloud platforms, networks, and applications as well as provide you with the real-world business impact of those issues.

Our Penetration Testing Services include;

Cloud security testing (AWS, Azure)

Network penetration testing (internal and external)

Dark web and open-source intelligence

Web application penetration testing



Mobile application penetration testing

Static application security testing (SAST)

Dynamic application security testing (DAST)



Part of your client's IT organization

Security Operations (SecOps)

Keeping a security program operational and integrated with your clients’ business is a difficult task. Our SecOps team acts as part of your clients’ organization, filling in whichever gaps are needed. We monitor and manage security systems and processes, freeing up resources for other critical responsibilities. 

As part of our Security Operations Services, we handle:

Vulnerability management

Security monitoring

Log management

Performance monitoring

Patch management




Configuration management

Incident response

Digital forensics

Threat intelligence

Threat hunting




design, implement, configure and manage

Security Engineering

Our Security Engineering Services help organizations incorporate security controls into their information system so that the controls become an integral part of the system’s operational capabilities to help prevent misuse and malicious behavior.    We build and implement technologies that secure your organization through design, implementation, configuration, and management. 

Our team specializes in a variety of security engineering services, including:

Secure cloud development

Security Automation development

Vulnerability/Compliance scanning

Web Application Security

Security monitoring

Log management




Privileged access management

Mobile device management

Firewall, IDS, IPS

Endpoint security

Data loss prevention

Identity credential and access management (IAM)




Client Success

How might Coquina help you with your Security project?  Click the "Contact Us" button below.