A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Thoughts on Breach of Trust vs. a Breach of Security April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... See Details Blog
Image DDoS Threats: Are Your Third Parties Protecting You? September 24, 2017 There’s evidence that ransomware may be evolving beyond holding data hostage. In recent news, DDoS attacks were used as a threat against organizations.... See Details Blog
Image DEF CON is Here: A Reminder to Manage and Remediate Security Vulnerabilities of Your Third Parties July 27, 2017 Every year I like to take a look at the talks at Black Hat and DEFCON to see if there are areas of risk I need to review. This year, like others, has.... See Details Blog
Image Three Steps for Management and Remediation of Security Vulnerabilities with Third Parties May 23, 2017 Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some examples that.... See Details Blog
Image Ransomware Kill Chain and Controls - Part 2: Once the Crying is Over, the Controls Must Kick In May 16, 2017 In the first part of the blog series, we alluded to the impending danger of ransomware campaigns. It appears the concerns were justified, given the.... See Details Blog
Image Three Steps to Enhancing Your Third-Party Risk Program April 05, 2017 In the world of third-party and vendor risk management, many new practices are being adopted. Over the past few weeks, members of Optiv’s third-party.... See Details Blog
Image Ransomware Kill Chain and Controls - Part 1 April 20, 2016 With the rising threat of ransomware, we continue to see more and more coverage of the topic in the news and in marketing campaigns. I guess about.... See Details Blog
Image Reducing Your Personal Attack Surface February 10, 2016 Many of us are consumers of technology, I would consider myself in the upper echelon of this group. I own multiple laptops, desktops, servers, cloud.... See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?