A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary Center for Internet Security (CIS) Critical Security Controls What is the Center for Internet Security (CIS) Critical Security Controls? CIS is a nonprofit organization that develops Configuration Policy Benchmarks that allow businesses to improve security and compliance programs and postures. Its CIS Controls™ and CIS Benchmarks™ are the worldwide standard and accepted best practices for securing IT systems and data against the most pervasive attacks. These demonstrated guidelines are continuously refined and verified by a global community of volunteers who are experienced IT professionals. CIS also acts as home to the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices. Image Related Services Cyber Strategy & Roadmap Security Operations Network Security Incident Response Related TermsNIST CSF - National Institute of Standards and Technology Cybersecurity Framework Share: Contact Us
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?