A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv + Major Utility Provider = Powerful Targeted Prioritization Download The Situation – 3K+ untested OT devices increased risk of blackouts A major utility company with 18 locations and over 3,000 connected devices on their network needed to evaluate their security posture. But because they didn’t understand which critical systems were linked to which devices, prioritizing a study was difficult. Any one vulnerability could’ve led to a blackout level impact, leaving many households and businesses without electricity. Properly evaluating each device would require significant costs and labor, so the client needed help prioritizing their efforts. The client’s security team lacked both the resources and expertise to transition from a reactive to proactive approach. With an increased likelihood of data breaches and compliance requirements going unmet, the retailer faced a loss of productivity, visibility and additional security risks. Committed to building a holistic cybersecurity program, once new technologies were in place and POS (point of sale) data was encrypted, they would need to optimize their program for risk management 24x7x365. The Solution – architecture evaluation of IT and SCADA to find highest risk devices We led an architecture evaluation to identify the client’s critical IT and supervisory control and data acquisition (SCADA) systems. To help our client fully understand their environment and current risk profile, this assessment also included an asset inventory and security vulnerabilities evaluation. Forming a joint team with the client, we were able to prioritize critical vendors – proposing a full device test on three third-party vendors that presented the most risk to the utility. This test included evaluations of the software, firmware, hardware and network interfaces for each device. Industry Served: Utility Our Starting Point: Client had 3,000 connected devices, but were unsure which ones were of critical importance Testing devices individually would be expensive and labor intensive Unresolved vulnerabilities could lead to blackouts for many homes and businesses Accelerating Forward: IT and SCADA architecture evaluation, including asset inventory and vulnerability assessment Third-party device test targeted towards highest risk vendors Full evaluation of critical software, hardware, firmware and network interfaces for identified devices Client Outcomes Timesaving targeted efforts – found the appropriate third party devices to test Highest risk devices prioritized for swift remediation Successful, efficient product evaluation – Optiv Attack and Penetration team conducted a successful product evaluation within six weeks of project conclusion Image Download a printable version of this case study for more details Download Case Study How can we help you secure greatness? Optiv can advise on, deploy and operate end-to-end cybersecurity programs aligned to your business goals. As the cyber advisory and solutions leader, we serve nearly 6,000 companies across every major industry. Our certified experts can help you gain the agility, security, scale and control you need to stay ahead of the competition. Let's Get Started
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?