A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image How to Balance the Zero Trust Journey with the Speed of the Mission January 25, 2023 A Zero Trust Framework is essential to face today's threat landscape. Optiv and Ping connect you to the technologies to best meet your Zero Trust.... See Details Blog Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part II: Apache January 17, 2023 Optiv's gTIC team provides a prioritized software and services list that covers exploitation trends and vulnerabilities in popular Apache frameworks. See Details Blog Image What’s New in PCI DSS 4.0? January 04, 2023 PCI DSS v4.0 shifts away from precise technical specifications and toward a broader, more progressive view of implementing security controls. See Details Blog Image Leveraging Zero Trust Solution to Ensure Users Have Access to the Right Resources January 04, 2023 A Zero Trust Framework is essential to face today's threat landscape. Optiv and Ping connect you to the technologies to best meet your Zero Trust.... See Details Blog Image Russia/Ukraine Update - December 2022 December 20, 2022 Optiv's December Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay.... See Details Blog Image Making a Positive Impact Where It Counts: 2022 Optiv Chips In Year in Review December 20, 2022 Optiv Chips In is corporate volunteerism in action. We feed families in need, provide support to at-risk teens and sponsor STEM projects in.... See Details Blog Image Solving Metaverse Vulnerabilities and Threats is No Piece of Cake December 15, 2022 Metaverse security concerns are increasing. Variations have been in use for decades in commerce and threat actors have its valuable targets in their.... See Details Blog Image Shift Left(er) December 07, 2022 Shift Left Security focuses on the SDLC process. Shifting further left, where security is part of corporate culture, is critical with increasing cyber.... See Details Blog Image The Clock is Ticking: Is Your Organization Cyber Secure for the Holidays? December 05, 2022 Our Holiday Cybersecurity Tips will help secure your enterprise during this vulnerable season because threat actors don't take holidays. Learn how to.... See Details Blog Image Russia/Ukraine Update - November 2022 November 29, 2022 Optiv's November Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay.... See Details Blog Image Your ‘Forgotten Things’ Are Making You Vulnerable to Cyber Threats November 22, 2022 The Internet of Forgotten Things (IoFT) can leave you exposed. Overlooked devices like old servers or connected medical devices can pose cybersecurity.... See Details Blog Image Sensitive Data in Salesforce? November 18, 2022 In this post we provide details on the Varonis DatAdvantage Cloud platform’s capabilities. We'll cover items such as user activity auditing, identity.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 12 Page 13 Page 14 Page 15 Current page 16 Page 17 Page 18 Page 19 Page 20 … Next page Next › Last page Last »
Image How to Balance the Zero Trust Journey with the Speed of the Mission January 25, 2023 A Zero Trust Framework is essential to face today's threat landscape. Optiv and Ping connect you to the technologies to best meet your Zero Trust.... See Details Blog
Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part II: Apache January 17, 2023 Optiv's gTIC team provides a prioritized software and services list that covers exploitation trends and vulnerabilities in popular Apache frameworks. See Details Blog
Image What’s New in PCI DSS 4.0? January 04, 2023 PCI DSS v4.0 shifts away from precise technical specifications and toward a broader, more progressive view of implementing security controls. See Details Blog
Image Leveraging Zero Trust Solution to Ensure Users Have Access to the Right Resources January 04, 2023 A Zero Trust Framework is essential to face today's threat landscape. Optiv and Ping connect you to the technologies to best meet your Zero Trust.... See Details Blog
Image Russia/Ukraine Update - December 2022 December 20, 2022 Optiv's December Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay.... See Details Blog
Image Making a Positive Impact Where It Counts: 2022 Optiv Chips In Year in Review December 20, 2022 Optiv Chips In is corporate volunteerism in action. We feed families in need, provide support to at-risk teens and sponsor STEM projects in.... See Details Blog
Image Solving Metaverse Vulnerabilities and Threats is No Piece of Cake December 15, 2022 Metaverse security concerns are increasing. Variations have been in use for decades in commerce and threat actors have its valuable targets in their.... See Details Blog
Image Shift Left(er) December 07, 2022 Shift Left Security focuses on the SDLC process. Shifting further left, where security is part of corporate culture, is critical with increasing cyber.... See Details Blog
Image The Clock is Ticking: Is Your Organization Cyber Secure for the Holidays? December 05, 2022 Our Holiday Cybersecurity Tips will help secure your enterprise during this vulnerable season because threat actors don't take holidays. Learn how to.... See Details Blog
Image Russia/Ukraine Update - November 2022 November 29, 2022 Optiv's November Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay.... See Details Blog
Image Your ‘Forgotten Things’ Are Making You Vulnerable to Cyber Threats November 22, 2022 The Internet of Forgotten Things (IoFT) can leave you exposed. Overlooked devices like old servers or connected medical devices can pose cybersecurity.... See Details Blog
Image Sensitive Data in Salesforce? November 18, 2022 In this post we provide details on the Varonis DatAdvantage Cloud platform’s capabilities. We'll cover items such as user activity auditing, identity.... See Details Blog