A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image What Is SSL Web Inspection and Where Should It Occur? (Part 1) January 24, 2018 SSL inspection is the process of “proxying” a SSL session in order to decrypt the traffic and monitor/inspect it against various controls. Network.... See Details Blog Image The Aftermath of Meltdown and Spectre: Now What? January 16, 2018 The recent unveiling of the widely reported Meltdown and Spectre attacks, which exploit critical vulnerabilities in modern processors, sent many.... See Details Blog Image The Fundamentals of Identity and Access Management January 15, 2018 Identity and access management (IAM) is an exciting world filled with dreams of business enablement while reducing risks and implementing security.... See Details Blog Image Regarding Spectre and Meltdown January 11, 2018 On January 3, 2018, the Graz University of Technology released their papers on identified vulnerabilities dubbed “Meltdown” and “Spectre” via the.... See Details Blog Image Securing the Cloud is About Teamwork December 19, 2017 I spoke about cloud at a conference a few weeks ago, but I still have lots of thoughts on the topic bouncing around in my head. If you haven’t yet.... See Details Blog Image Security vs. End User Experience – Find the Balance December 17, 2017 Have we become so focused on serving our customers that we are willing to cut corners for the sake of speed and convenience, only to subject the.... See Details Blog Image Cyber Threat Intelligence Requires Commitment December 12, 2017 It’s been said that in a breakfast of bacon and eggs, the chicken is involved but the pig is committed. This saying is relevant when implementing a.... See Details Blog Image PCI Requirement Changes Coming in 2018 December 07, 2017 The end of 2017 is quickly approaching, and we thought we should remind you of the PCI requirement changes that are coming next year. Some of these.... See Details Blog Image Want to be a Great Security Leader? You Need a Great Lawyer December 06, 2017 Information security continues to evolve as a profession, and this is certainly evident in the role that legislation, privacy, third-party risk and.... See Details Blog Image The Risk of Cryptocurrencies December 05, 2017 Cryptocurrencies are a libertarian ideal: a monetary system outside the control of big government. The modern digital world provides the necessary.... See Details Blog Image Five Steps to Ensuring a Successful Identity and Access Management Solution Deployment November 28, 2017 After endless cost-benefit meetings, business case rewrites and months of organizational readiness activities, your identity and access management.... See Details Blog Image PCI Compliance Every Day – Requirement 5 November 19, 2017 In this latest post of my PCI compliance blog series, we will explore Requirement 5, which has four distinct requirements that imply they need to be.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 45 Page 46 Page 47 Page 48 Current page 49 Page 50 Page 51 Page 52 Page 53 … Next page Next › Last page Last »
Image What Is SSL Web Inspection and Where Should It Occur? (Part 1) January 24, 2018 SSL inspection is the process of “proxying” a SSL session in order to decrypt the traffic and monitor/inspect it against various controls. Network.... See Details Blog
Image The Aftermath of Meltdown and Spectre: Now What? January 16, 2018 The recent unveiling of the widely reported Meltdown and Spectre attacks, which exploit critical vulnerabilities in modern processors, sent many.... See Details Blog
Image The Fundamentals of Identity and Access Management January 15, 2018 Identity and access management (IAM) is an exciting world filled with dreams of business enablement while reducing risks and implementing security.... See Details Blog
Image Regarding Spectre and Meltdown January 11, 2018 On January 3, 2018, the Graz University of Technology released their papers on identified vulnerabilities dubbed “Meltdown” and “Spectre” via the.... See Details Blog
Image Securing the Cloud is About Teamwork December 19, 2017 I spoke about cloud at a conference a few weeks ago, but I still have lots of thoughts on the topic bouncing around in my head. If you haven’t yet.... See Details Blog
Image Security vs. End User Experience – Find the Balance December 17, 2017 Have we become so focused on serving our customers that we are willing to cut corners for the sake of speed and convenience, only to subject the.... See Details Blog
Image Cyber Threat Intelligence Requires Commitment December 12, 2017 It’s been said that in a breakfast of bacon and eggs, the chicken is involved but the pig is committed. This saying is relevant when implementing a.... See Details Blog
Image PCI Requirement Changes Coming in 2018 December 07, 2017 The end of 2017 is quickly approaching, and we thought we should remind you of the PCI requirement changes that are coming next year. Some of these.... See Details Blog
Image Want to be a Great Security Leader? You Need a Great Lawyer December 06, 2017 Information security continues to evolve as a profession, and this is certainly evident in the role that legislation, privacy, third-party risk and.... See Details Blog
Image The Risk of Cryptocurrencies December 05, 2017 Cryptocurrencies are a libertarian ideal: a monetary system outside the control of big government. The modern digital world provides the necessary.... See Details Blog
Image Five Steps to Ensuring a Successful Identity and Access Management Solution Deployment November 28, 2017 After endless cost-benefit meetings, business case rewrites and months of organizational readiness activities, your identity and access management.... See Details Blog
Image PCI Compliance Every Day – Requirement 5 November 19, 2017 In this latest post of my PCI compliance blog series, we will explore Requirement 5, which has four distinct requirements that imply they need to be.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services