A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Modernise your Privileged Access Security May 22, 2019 Privileged Access Security should not be viewed mainly as the implementation of a PAS or PAM technology and augmented (or integrated) with other third.... See Details Blog Image Privacy Across the Pond, Part 2 May 15, 2019 From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital.... See Details Blog Image ATT&CK Series: Defense Evasion May 14, 2019 There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often.... See Details Blog Image Business Email Compromise (BEC) Fraud is Exploiting the Cloud May 09, 2019 Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses.... See Details Blog Image Privacy Across the Pond, Part 1 May 08, 2019 From privacy to identity to work-life flow — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital Identity and Data.... See Details Blog Image ATT&CK Series: Execution May 07, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be.... See Details Blog Image Organizations Shift from Identity and Access Management to Identity and Data Management May 01, 2019 With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to.... See Details Blog Image ATT&CK Series: Credential Access April 25, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be.... See Details Blog Image MythBusters: Debunking Five Common Identity and Data Management Myths April 17, 2019 Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP.... See Details Blog Image That Time I Clicked on a Phish April 16, 2019 Even the savviest of us can “fall for” a phishing email. Here are a few things to look for to help spot them quicker. See Details Blog Image Indecent Proposal? When Identity, Privacy and Ethics Collide April 10, 2019 Users expect data privacy – and regulations require it. Yet, security measures require full visibility into all data in the business ecosystem. This.... See Details Blog Image Network Trust: How to Maintain and Establish it in Your Perimeter April 09, 2019 Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 37 Page 38 Page 39 Page 40 Current page 41 Page 42 Page 43 Page 44 Page 45 … Next page Next › Last page Last »
Image Modernise your Privileged Access Security May 22, 2019 Privileged Access Security should not be viewed mainly as the implementation of a PAS or PAM technology and augmented (or integrated) with other third.... See Details Blog
Image Privacy Across the Pond, Part 2 May 15, 2019 From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital.... See Details Blog
Image ATT&CK Series: Defense Evasion May 14, 2019 There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often.... See Details Blog
Image Business Email Compromise (BEC) Fraud is Exploiting the Cloud May 09, 2019 Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses.... See Details Blog
Image Privacy Across the Pond, Part 1 May 08, 2019 From privacy to identity to work-life flow — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital Identity and Data.... See Details Blog
Image ATT&CK Series: Execution May 07, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be.... See Details Blog
Image Organizations Shift from Identity and Access Management to Identity and Data Management May 01, 2019 With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to.... See Details Blog
Image ATT&CK Series: Credential Access April 25, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be.... See Details Blog
Image MythBusters: Debunking Five Common Identity and Data Management Myths April 17, 2019 Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP.... See Details Blog
Image That Time I Clicked on a Phish April 16, 2019 Even the savviest of us can “fall for” a phishing email. Here are a few things to look for to help spot them quicker. See Details Blog
Image Indecent Proposal? When Identity, Privacy and Ethics Collide April 10, 2019 Users expect data privacy – and regulations require it. Yet, security measures require full visibility into all data in the business ecosystem. This.... See Details Blog
Image Network Trust: How to Maintain and Establish it in Your Perimeter April 09, 2019 Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their.... See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?