A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary C2 - Command and Control What is C2 - Command and Control? Command and control (C2) is often used by attackers to retain communications with compromised systems within a target network. They then issue commands and controls to compromised systems (as simple as a timed beacon, or as involved as remote control or data mining). It's usually the compromised system/host that initiates communication from inside a network to a command and control server on the public internet. Establishing a command and control link is often the primary objective of malware. Image Related Services APT Groups IoT Network Security Endpoint Security Related TermsAPT - Advanced Persistent ThreatsRansomwareDDoS - Distributed Denial of Service Share: Contact Us