Welcome to Blackfire Technology

Your full-service solutions provider for custom software, including design, development, and maintenance, as well as back office technical staffing. Serving business, government, and higher education since 2015.

Providing all your custom business software needs. Specializing in full lifecycle Application Design, Development, and Maintenance.

Back-Office Icon Back-Office Staffing

Free up your team to focus on your core business.

Let Blackfire’s Back-Office team manage the paperwork and processing demands of your business. Our skilled professionals handle a spectrum of tasks, from processing paperwork, including managing workflow intense processes, to administering your online applications including professional correspondence.

see full details

DSAS - Data Sharing & Approval System

Is your data highly valuable for reuse or sharing, but also sensitive? The Data Sharing & Approval System (DAAS) is a turnkey system for controlling the dissemination of data and documents. Originally developed for controlling access to cyber security research data generated by DHS research projects, where subsequent researchers could jumpstart their efforts using previous work but bad actors had to be barred from access.


DSAS features:

  • Security Levels - Multiple security levels for datasets/documents
  • On Screen Agreements / Wet Signature Agreements - Require either/both click agreements and wet signature contracts.
  • Usage Agreement Contracts -
    • Custom usage agreements by security levels
    • Custom usage clauses for individual datasets/documents that can be automatically inserted into usage agreements.
  • Multiple Levels of Approval - Up to two-level human approval for reviewing, checking references, and approving access requests. Supports preliminary approval by an administrative team and final approval by a “data owner”.
  • Reporting - Tracking and reporting of all aspects of the system
  • Admin Staffing Available - Blackfire’s Back-Office staff is available to be your first-line administrative team processing access requests. They have extensive experience in creating approval policies and processes, and are trained to spot bad actors attempting to game security protections.