A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary C2 - Command and Control What is C2 - Command and Control? Command and control (C2) is often used by attackers to retain communications with compromised systems within a target network. They then issue commands and controls to compromised systems (as simple as a timed beacon, or as involved as remote control or data mining). It's usually the compromised system/host that initiates communication from inside a network to a command and control server on the public internet. Establishing a command and control link is often the primary objective of malware. Image Related Services APT Groups IoT Network Security Endpoint Security Related TermsAPT - Advanced Persistent ThreatsRansomwareDDoS - Distributed Denial of Service Share: Contact Us
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?