Security Offerings

Below are Affinitas Tech’s cyber security offerings. 

Are you wondering about your organization’s data risks and needs for a current security risk analysis? Contact Affinitas Tech by email: info@affinitastech.com, or by phone: 434-218-359 

Fractional CISO

 A CISO is a chief information security officer. Or, in other words, the main Cybersecurity head of an organization.  

The term Fractional derives from that a Fractional CISO is brought on part time to complete a specific project. 

For some companies that do not have dedicated overhead dedicated for cyber security a Fractional CISO can be a perfect solution if the prior company is in the following situations. 

  • Limited resources 
  • Transitional periods 
  • Compliance Requirements (see compliance page above)  
  • Specific projects 

Having strategic leadership from a Fractional CISO provides an invaluable role in protecting organizations from cyberattacks and keeping all company data secure. 

Vulnerability Assessment

Vulnerability assessment is the process of defining, identifying, classifying, and prioritizing vulnerabilities in computer systems.  

Think of it as a baseline for the beginning goal of becoming cyber compliant, whatever the framework might be. From vulnerability assessment, a plan of action will be created.  

Penetration Testing

Penetration testing (pen testing) is a planned attack on the computer infrastructure. The main goal behind the pen test is to find any vulnerabilities before a cyber-attacker finds them first.  

Pen testing can be done at any stage of development.  

  • As a final check once the vulnerability testing is complete. 
  • Intermediately throughout the compliance period to catch vulnerabilities early. 

By performing pen testing, the configuration security gets one last check, from the (planned) view of an attacker.  

SIEM/SOC Services

SIEM is a way to report to the SOC. Think of it as a messenger; a SIEM service gathers a comprehensive overview of a system’s security posture. From here, it can be given to the SOC to respond to potential threats. 

A SIEM is the main communicator to the SOC for all security related inquiries. The SIEM communicates potential issues to the SOC streamlining the cyber-security process, keeping the system safe from threats.  

Risk Assessments

The purpose of risk assessments is an assessment of the potential cyberthreats that a company may face. Not to be mistaken with vulnerability assessments, which evaluate the threats from inside a company system. The goal of risk assessments is to evaluate potential threats and create responses to those threats.  

Risk assessments protect the company’s assets and brand. Risk assessments also ensure that the company itself will keep operating, even when unexpected cyber threats occur.