A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Features of a Threat Intelligence Platform February 14, 2019 A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including.... See Details Blog Image Security in 2019: Getting Ahead of the Game February 07, 2019 The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government.... See Details Blog Image It’s Not Always About the Perimeter – A Look at Domain Reconnaissance January 29, 2019 In this information age, security threats are commonplace and can be devastating to a business. The ability to quickly and accurately detect cyber.... See Details Blog Image IoC and IoA: Indicators of Intelligence January 24, 2019 Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference.... See Details Blog Image Let’s Not Talk About the Past December 20, 2018 With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you.... See Details Blog Image SecOps vs. DevOps in the Information Age December 18, 2018 Information is varied and complex, involving many data types, structures, and protocols for different types of data sets. This increases challenges.... See Details Blog Image Tales from Trenches: What’s on Your Shelf? December 13, 2018 Don’t you hate it when you forget something? Like when you take your kids on a hike and forget a snack, or take your dog for a walk and forget those.... See Details Blog Image Darknet Done Right December 11, 2018 The marriage of a well-managed risk program and a targeted Darknet operation to move towards mitigation of risk is an ROI most mature companies have.... See Details Blog Image Is There a Trans-Atlantic Cyber Divide? The 5 Things That Differentiate Us Can Make Us Stronger December 06, 2018 Having just returned from the U.S. to Europe, we recently met for breakfast around the corner from the new London HQ of Optiv Security, a market.... See Details Blog Image It’s 2018. Password Journals are Still a Thing. November 29, 2018 I was in a store the other day and saw something that, being in cyber security, stopped me fast: A Password Journal. Seriously. A place to write down.... See Details Blog Image Keeping Who-ville Cyber Secure This Holiday Season November 27, 2018 If we were to relate the Grinch to cyber security terms, we’d call him a quintessential threat actor. His sole focus is finding a way to stop.... See Details Blog Image Take a Deep Breath…and Be Thankful November 20, 2018 Ah, Thanksgiving. Time to breathe, greet the holidays and revel in a few days off, time with family, and…what’s that call on your cell? “Suspicious.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 39 Page 40 Page 41 Page 42 Current page 43 Page 44 Page 45 Page 46 Page 47 … Next page Next › Last page Last »
Image Features of a Threat Intelligence Platform February 14, 2019 A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including.... See Details Blog
Image Security in 2019: Getting Ahead of the Game February 07, 2019 The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government.... See Details Blog
Image It’s Not Always About the Perimeter – A Look at Domain Reconnaissance January 29, 2019 In this information age, security threats are commonplace and can be devastating to a business. The ability to quickly and accurately detect cyber.... See Details Blog
Image IoC and IoA: Indicators of Intelligence January 24, 2019 Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference.... See Details Blog
Image Let’s Not Talk About the Past December 20, 2018 With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you.... See Details Blog
Image SecOps vs. DevOps in the Information Age December 18, 2018 Information is varied and complex, involving many data types, structures, and protocols for different types of data sets. This increases challenges.... See Details Blog
Image Tales from Trenches: What’s on Your Shelf? December 13, 2018 Don’t you hate it when you forget something? Like when you take your kids on a hike and forget a snack, or take your dog for a walk and forget those.... See Details Blog
Image Darknet Done Right December 11, 2018 The marriage of a well-managed risk program and a targeted Darknet operation to move towards mitigation of risk is an ROI most mature companies have.... See Details Blog
Image Is There a Trans-Atlantic Cyber Divide? The 5 Things That Differentiate Us Can Make Us Stronger December 06, 2018 Having just returned from the U.S. to Europe, we recently met for breakfast around the corner from the new London HQ of Optiv Security, a market.... See Details Blog
Image It’s 2018. Password Journals are Still a Thing. November 29, 2018 I was in a store the other day and saw something that, being in cyber security, stopped me fast: A Password Journal. Seriously. A place to write down.... See Details Blog
Image Keeping Who-ville Cyber Secure This Holiday Season November 27, 2018 If we were to relate the Grinch to cyber security terms, we’d call him a quintessential threat actor. His sole focus is finding a way to stop.... See Details Blog
Image Take a Deep Breath…and Be Thankful November 20, 2018 Ah, Thanksgiving. Time to breathe, greet the holidays and revel in a few days off, time with family, and…what’s that call on your cell? “Suspicious.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services