SecurityMetrics

SecurityMetrics

Speciality: Network and Application Penetration Testing

Orem, United States 272 employees
[01] About

Private computer and network security company providing PCI and HIPAA compliance assessments, incident response, cybersecurity, security training, and penetration testing; 173 employees (+1.5% YoY), $69.4M revenue; based in Orem, Utah, founded 2000.

We secure peace of mind for organizations that handle sensitive data by holding our tools, training, and support to a higher standard. Never have a false sense of security.™ We are PCI certified in Qualified Security Assessor (QSA), Approved Scanning Vendor (ASV), Certified Forensic Investigator (PFI), Qualified P2PE Application Assessor (P2PE QSA), PCI Software Security Framework (SSF) Assessor, Qualified Payment Application Assessor (PA-QSA), Qualified PIN Assessor (QPA), and a Managed Security provider with over 20 years of data security experience. We remain a leading provider in PCI and HIPAA compliance and we have tested over 1 million systems for vulnerabilities. We are one of only two companies worldwide certified by Visa, MasterCard, and the PCI Security Council, to conduct all major PCI validations: PCI scans (ASV) PCI DSS Assessments (QSA) Payment Application Data Security Standard Audits (PA-QSA) PCI Forensic Investigations (PFI) Point-to-Point Encryption Assessments (P2PE QSA) Our award-winning tools and customer service help simplify data security and compliance efforts at organizations of all sizes: PIIscan: discovers Personally Identifiable Information (PII) like SSNs, birth dates, and card data. PANscan: discovers cardholder data like Primary Account Numbers. Health Network Portal: tool to manage network-wide HIPAA compliance for large medical networks. Managed Firewall: managed in-house by data security and compliance experts. GDPR Defense for Small Businesses: tools to find PII and assess compliance with GDPR requirements . GDPR Consulting for Large Businesses: professional guidance from experienced network security experts. SecurityMetrics Mobile: scans devices for vulnerabilities. CCPA Training Webpage Integrity Monitoring (WIM) for e-Commerce JavaScript Skimming
[02] Services
[03] Certifications
PCI DSS

PCI DSS Certification


Origin


The Payment Card Industry Data Security Standard (PCI DSS) was created in 2004 by the major credit card companies: Visa, Mastercard, American Express, Discover, and JCB International. These companies formed the PCI Security Standards Council in 2006 to manage and evolve the standard. PCI DSS was developed in response to increasing credit card fraud and data breaches, establishing a unified set of security requirements for all organizations that store, process, or transmit cardholder data. The goal was to create consistent security measures across the payment card industry to protect sensitive payment information.


Industry Value and Importance


PCI DSS compliance is mandatory for any business that handles credit card transactions, making it one of the most critical security standards in commerce today. The certification demonstrates that an organization has implemented robust security controls, including network protection, access management, encryption, and regular security testing. Non-compliance can result in severe consequences, including substantial fines (up to $100,000 per month), increased transaction fees, loss of payment processing privileges, and reputational damage following a breach. For IT professionals, PCI DSS expertise is highly valued as organizations across all industries need qualified personnel to implement, maintain, and audit these security controls.

HIPAA

HIPAA Compliance and Cybersecurity


HIPAA (Health Insurance Portability and Accountability Act) was enacted by the U.S. Congress and signed into law in 1996. The legislation was created to protect sensitive patient health information from being disclosed without patient consent or knowledge. The Security Rule, added in 2003, established national standards for protecting electronic personal health information (ePHI), requiring covered entities and their business associates to implement administrative, physical, and technical safeguards. While HIPAA itself is legislation rather than a certification, various organizations offer HIPAA compliance training and certification programs to help IT professionals understand and implement these requirements.


HIPAA compliance is critically important in healthcare IT because violations can result in severe penalties, ranging from $100 to $50,000 per violation, with annual maximums reaching $1.5 million. Beyond avoiding fines, HIPAA knowledge is valued because healthcare data breaches can expose sensitive patient information, damage organizational reputation, and erode patient trust. IT professionals with HIPAA expertise are highly sought after as healthcare organizations increasingly rely on digital systems for medical records, billing, and patient communication. Understanding HIPAA requirements helps ensure that healthcare systems are designed, implemented, and maintained with appropriate security controls to protect patient privacy in an era of growing cyber threats.

HITRUST

HITRUST Cybersecurity Certification


Origin


HITRUST (Health Information Trust Alliance) was founded in 2007 by a collaboration of healthcare, technology, and information security leaders. The organization created the HITRUST Common Security Framework (CSF) to address the fragmented landscape of security and privacy regulations facing the healthcare industry. Recognizing that healthcare organizations were struggling to comply with multiple frameworks like HIPAA, PCI-DSS, and ISO standards simultaneously, HITRUST developed a unified, certifiable framework that harmonizes these various requirements into a single comprehensive standard.


Industry Value and Importance


The HITRUST CSF certification has become the gold standard for demonstrating security and compliance in healthcare and beyond, now extending to financial services, retail, and other regulated industries. Organizations value HITRUST certification because it provides a standardized, risk-based approach that satisfies multiple regulatory requirements at once, reducing audit fatigue and compliance costs. The certification is particularly trusted by business partners and customers as third-party validation of an organization's security controls, often becoming a prerequisite for vendor relationships and contracts. Its prescriptive control requirements and rigorous assessment process make it more comprehensive than self-attestation models, giving stakeholders greater confidence in an organization's security posture.

CMMC

Cybersecurity Maturity Model Certification (CMMC)


Origin


The Cybersecurity Maturity Model Certification (CMMC) was created by the U.S. Department of Defense (DoD) in 2020 in response to increasing cybersecurity threats targeting the Defense Industrial Base (DIB). The framework was developed to ensure that defense contractors and subcontractors adequately protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) in their systems. The DoD recognized that existing self-attestation methods were insufficient to safeguard sensitive defense-related data from sophisticated cyber attacks, particularly from nation-state adversaries, prompting the need for a more rigorous, third-party verification system.


Industry Value and Importance


CMMC certification has become essential for companies seeking to do business with the Department of Defense, as it is now a contractual requirement for defense contractors. The certification demonstrates that an organization has implemented appropriate cybersecurity practices and processes to protect sensitive government information, making it a competitive differentiator in the defense contracting marketplace. Beyond compliance, CMMC helps organizations improve their overall cybersecurity posture, reduce breach risks, and build trust with government clients and partners. The tiered certification structure allows companies to align their security investments with the sensitivity of the information they handle, making it both practical and scalable across the diverse defense supply chain.

[05] Notable Clients
  • Ziosk
  • Zift
  • Washington State University
  • Vectra
  • Transactis
  • TD Bank
  • SuitePay
  • Stripe
  • SKNANB
  • Rocky Mountain Merchant Services
  • RentMoola
  • RCSC
  • Qualpay
  • Professional Solutions
  • Persolvent
  • Paysafe
  • Payment Transactions
  • Paragon
  • Orange County
  • NMA
  • NCMIC
  • National Processing
  • Merete
  • Merchant Service Group
  • Merchant Partners
  • Media Contour
  • M33
  • IPS International Payment Services
  • IP
  • Iciniti
  • Heritage Bank
  • GoTickets
  • GoFundMe
  • Getta
  • Frontline
  • ECSI
  • Cygnus
  • ClientPay
  • Church's Chicken
  • Cashflows
  • Card Works
  • BlueSnap
  • BASYS TowneBank
  • Bank of Hawaii
  • BambooHR
  • BAC
  • Avidia
  • Authorize.Net
  • Audit Advantage
  • APS
  • Affiliated Acceptance Corporation
  • Abtek
  • ABAV