A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Five Steps to Preparing for a Successful Identity and Access Management Solution Deployment November 14, 2017 As adoption of the Internet of Things (IoT) continues at an incredible pace, organizations of all sizes are shifting away from traditional notions of.... See Details Blog Image Can Your Organization Accept the Risk of Being First? November 13, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. For this year’s review, we constructed several use cases that would model.... See Details Blog Image PCI Compliance Every Day – Requirement 10 November 12, 2017 When people think of PCI business as usual (BAU) they do not typically see the requirements in section 10 as having much of anything to do with BAU.... See Details Blog Image Unmanaged PowerShell Binaries and Endpoint Protection November 09, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy.... See Details Blog Image Third-Party Breaches Will Continue Until Morale Improves November 08, 2017 I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one.... See Details Blog Image GDPR Part 3: GDPR and the Information Security Program November 06, 2017 In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security.... See Details Blog Image Using Micro-Segmentation to Protect Your Data – Part 1 November 05, 2017 As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is.... See Details Blog Image Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and.... See Details Blog Image A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's.... See Details Blog Image GDPR Part 2: The Six Information Security Pillars October 30, 2017 In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security.... See Details Blog Image Critical Infrastructure Security October 29, 2017 The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or.... See Details Blog Image Help Keep Your Children Safe Online October 25, 2017 The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 46 Page 47 Page 48 Page 49 Current page 50 Page 51 Page 52 Page 53 Page 54 … Next page Next › Last page Last »
Image Five Steps to Preparing for a Successful Identity and Access Management Solution Deployment November 14, 2017 As adoption of the Internet of Things (IoT) continues at an incredible pace, organizations of all sizes are shifting away from traditional notions of.... See Details Blog
Image Can Your Organization Accept the Risk of Being First? November 13, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. For this year’s review, we constructed several use cases that would model.... See Details Blog
Image PCI Compliance Every Day – Requirement 10 November 12, 2017 When people think of PCI business as usual (BAU) they do not typically see the requirements in section 10 as having much of anything to do with BAU.... See Details Blog
Image Unmanaged PowerShell Binaries and Endpoint Protection November 09, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy.... See Details Blog
Image Third-Party Breaches Will Continue Until Morale Improves November 08, 2017 I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one.... See Details Blog
Image GDPR Part 3: GDPR and the Information Security Program November 06, 2017 In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security.... See Details Blog
Image Using Micro-Segmentation to Protect Your Data – Part 1 November 05, 2017 As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is.... See Details Blog
Image Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and.... See Details Blog
Image A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's.... See Details Blog
Image GDPR Part 2: The Six Information Security Pillars October 30, 2017 In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security.... See Details Blog
Image Critical Infrastructure Security October 29, 2017 The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or.... See Details Blog
Image Help Keep Your Children Safe Online October 25, 2017 The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services