A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary CoBiT - Control Objectives for Information and Related Technologies What is CoBiT? Control Objectives for Information and Related Technologies (CoBiT) is an IT management framework first developed in 1996. The framework was published by the IT Governance Institute and the Information Systems Audit and Control Association (ISACA) to help businesses develop, organize and implement strategies around information management and governance. The objective is to provide a common language for business executives to communicate with each other about goals, objectives and results. The latest version was published in 2013 and emphasizes the value that information governance can provide to a business's success. It also provides guidance about enterprise risk management. CoBiT 5 is based on five key principles for governance and management of enterprise IT: meeting stakeholder needs, covering the enterprise end to end, applying a single, integrated framework, enabling a holistic approach and separating governance from management. Image Related Services Enterprise Resilience Data Governance CMMC Endpoint Security Related TermsNIST CSF - National Institute of Standards and Technology Cybersecurity Framework Share: Contact Us