A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image ATT&CK Series: Lateral Movement Techniques June 25, 2019 There are several different methods that adversaries can employ to move throughout a network. However, we will cover two techniques commonly used by.... See Details Blog Image Managing Identity in the Digital World June 19, 2019 Understanding who has access to systems and data has never been more important. The demand for mobility and accessibility which has driven the move to.... See Details Blog Image Endpoint Testing via MITRE ATT&CK June 13, 2019 Endpoint security solution providers continue to race toward the same goal—a multifunctional platform that includes prevention, detection, response.... See Details Blog Image Is Your IDM Technology Healthy? June 12, 2019 So, is your IDM programme healthy? If it is built to implement a holistic and strategic vision for identity governance and administration across your.... See Details Blog Image Blockchain: Why Security Hyper-Vigilance is Recommended June 11, 2019 Blockchain’s long-term role in digital transformation is to be determined, although it’s likely to be a key player. Like other nascent technologies.... See Details Blog Image How to Govern Digital Identities and Access in a DX World June 10, 2019 Recently, the emergence of Identity Governance as-a-Service has helped solve some of these issues and automate the process of governing identities.... See Details Blog Image Protect Yourself from BYOT (Bring Your Own Threat) June 05, 2019 With the increase in mobile and remote work environments, organizations can be at risk or under threat by not securing devices, access and credentials.... See Details Blog Image Four Ways to Reduce Identity and Data Risks in a Digital Economy May 29, 2019 The use of stolen credentials ranks as one of the most commonly seen aspects of cybersecurity incidents, and loss of unencrypted data is one of the.... See Details Blog Image Modernise your Privileged Access Security May 22, 2019 Privileged Access Security should not be viewed mainly as the implementation of a PAS or PAM technology and augmented (or integrated) with other third.... See Details Blog Image Privacy Across the Pond, Part 2 May 15, 2019 From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital.... See Details Blog Image ATT&CK Series: Defense Evasion May 14, 2019 There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often.... See Details Blog Image Business Email Compromise (BEC) Fraud is Exploiting the Cloud May 09, 2019 Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 36 Page 37 Page 38 Page 39 Current page 40 Page 41 Page 42 Page 43 Page 44 … Next page Next › Last page Last »
Image ATT&CK Series: Lateral Movement Techniques June 25, 2019 There are several different methods that adversaries can employ to move throughout a network. However, we will cover two techniques commonly used by.... See Details Blog
Image Managing Identity in the Digital World June 19, 2019 Understanding who has access to systems and data has never been more important. The demand for mobility and accessibility which has driven the move to.... See Details Blog
Image Endpoint Testing via MITRE ATT&CK June 13, 2019 Endpoint security solution providers continue to race toward the same goal—a multifunctional platform that includes prevention, detection, response.... See Details Blog
Image Is Your IDM Technology Healthy? June 12, 2019 So, is your IDM programme healthy? If it is built to implement a holistic and strategic vision for identity governance and administration across your.... See Details Blog
Image Blockchain: Why Security Hyper-Vigilance is Recommended June 11, 2019 Blockchain’s long-term role in digital transformation is to be determined, although it’s likely to be a key player. Like other nascent technologies.... See Details Blog
Image How to Govern Digital Identities and Access in a DX World June 10, 2019 Recently, the emergence of Identity Governance as-a-Service has helped solve some of these issues and automate the process of governing identities.... See Details Blog
Image Protect Yourself from BYOT (Bring Your Own Threat) June 05, 2019 With the increase in mobile and remote work environments, organizations can be at risk or under threat by not securing devices, access and credentials.... See Details Blog
Image Four Ways to Reduce Identity and Data Risks in a Digital Economy May 29, 2019 The use of stolen credentials ranks as one of the most commonly seen aspects of cybersecurity incidents, and loss of unencrypted data is one of the.... See Details Blog
Image Modernise your Privileged Access Security May 22, 2019 Privileged Access Security should not be viewed mainly as the implementation of a PAS or PAM technology and augmented (or integrated) with other third.... See Details Blog
Image Privacy Across the Pond, Part 2 May 15, 2019 From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital.... See Details Blog
Image ATT&CK Series: Defense Evasion May 14, 2019 There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often.... See Details Blog
Image Business Email Compromise (BEC) Fraud is Exploiting the Cloud May 09, 2019 Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses.... See Details Blog