A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Russia/Ukraine Update - November 2022 November 29, 2022 Optiv's November Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay.... See Details Blog Image Your ‘Forgotten Things’ Are Making You Vulnerable to Cyber Threats November 22, 2022 The Internet of Forgotten Things (IoFT) can leave you exposed. Overlooked devices like old servers or connected medical devices can pose cybersecurity.... See Details Blog Image Sensitive Data in Salesforce? November 18, 2022 In this post we provide details on the Varonis DatAdvantage Cloud platform’s capabilities. We'll cover items such as user activity auditing, identity.... See Details Blog Image Managing Netskope Private Access Using Terraform November 17, 2022 With the release of the Netskope Terraform provider, complete end to end management of publishers and private applications can be integrated into an.... See Details Blog Image Identity Orchestration: Design Seamless End-to-End Digital Experiences November 17, 2022 Identity Orchestration from Ping, in partnership with Optiv, seamlessly weaves together services and applications in a Zero Trust architecture. Learn.... See Details Blog Image A Crossroads for Cyber Insurance: Are You Really Covered? November 16, 2022 Lloyd’s of London’s recent bulletin announced state-sponsored attacks = not covered. If the insurance industry stops covering these, where does this.... See Details Blog Image Operational Efficiency with Palo Alto Networks Autonomous Digital Experience Manager (ADEM) November 08, 2022 ADEM from Palo Alto Networks provides performance insights for remote and on-prem users. Proactively discover issues before they become big problems. See Details Blog Image Break Silos And Prevent Cyberattacks By... Talking? November 07, 2022 If cybersecurity wasn’t top of mind for businesses before COVID-19, it’s now prioritized in a remote-first world that’s digitizing at full speed. The.... See Details Blog Image Benefits and ROI of IT Security Compliance November 04, 2022 IT and regulatory compliance are necessary to ensure your organization meets the standards for data privacy and security that apply to your industry.... See Details Blog Image AMaaS: Managing the New Perimeter November 01, 2022 Access Management as a Service (AMaaS) addresses the challenges created by remote work and evolving threats. Let our ACT team help with your AM.... See Details Blog Image Optiv Wins a CRN 2022 IoT Innovators Award October 31, 2022 Optiv was named a winner in CRN’s 2022 IoT Innovators Awards for developing innovative IoT solutions and driving effective client implementation. See Details Blog Image Help is on the Way: How Automation Will Boost SOC Performance and Reduce Analyst Burnout October 28, 2022 OC Automation boosts performance and reduces analyst burnout. Learn how our partnership with Devo using AI can automate your SOC. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 15 Page 16 Page 17 Page 18 Current page 19 Page 20 Page 21 Page 22 Page 23 … Next page Next › Last page Last »
Image Russia/Ukraine Update - November 2022 November 29, 2022 Optiv's November Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay.... See Details Blog
Image Your ‘Forgotten Things’ Are Making You Vulnerable to Cyber Threats November 22, 2022 The Internet of Forgotten Things (IoFT) can leave you exposed. Overlooked devices like old servers or connected medical devices can pose cybersecurity.... See Details Blog
Image Sensitive Data in Salesforce? November 18, 2022 In this post we provide details on the Varonis DatAdvantage Cloud platform’s capabilities. We'll cover items such as user activity auditing, identity.... See Details Blog
Image Managing Netskope Private Access Using Terraform November 17, 2022 With the release of the Netskope Terraform provider, complete end to end management of publishers and private applications can be integrated into an.... See Details Blog
Image Identity Orchestration: Design Seamless End-to-End Digital Experiences November 17, 2022 Identity Orchestration from Ping, in partnership with Optiv, seamlessly weaves together services and applications in a Zero Trust architecture. Learn.... See Details Blog
Image A Crossroads for Cyber Insurance: Are You Really Covered? November 16, 2022 Lloyd’s of London’s recent bulletin announced state-sponsored attacks = not covered. If the insurance industry stops covering these, where does this.... See Details Blog
Image Operational Efficiency with Palo Alto Networks Autonomous Digital Experience Manager (ADEM) November 08, 2022 ADEM from Palo Alto Networks provides performance insights for remote and on-prem users. Proactively discover issues before they become big problems. See Details Blog
Image Break Silos And Prevent Cyberattacks By... Talking? November 07, 2022 If cybersecurity wasn’t top of mind for businesses before COVID-19, it’s now prioritized in a remote-first world that’s digitizing at full speed. The.... See Details Blog
Image Benefits and ROI of IT Security Compliance November 04, 2022 IT and regulatory compliance are necessary to ensure your organization meets the standards for data privacy and security that apply to your industry.... See Details Blog
Image AMaaS: Managing the New Perimeter November 01, 2022 Access Management as a Service (AMaaS) addresses the challenges created by remote work and evolving threats. Let our ACT team help with your AM.... See Details Blog
Image Optiv Wins a CRN 2022 IoT Innovators Award October 31, 2022 Optiv was named a winner in CRN’s 2022 IoT Innovators Awards for developing innovative IoT solutions and driving effective client implementation. See Details Blog
Image Help is on the Way: How Automation Will Boost SOC Performance and Reduce Analyst Burnout October 28, 2022 OC Automation boosts performance and reduces analyst burnout. Learn how our partnership with Devo using AI can automate your SOC. See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services