A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Threat Management: Attack Surface Management Services August 07, 2020 Our Attack Surface Management program continuously identifies and tests your new or changing attack surface. See Details Download Image Identity Governance and Administration July 19, 2020 Optiv’s IGA experts specialize in managing identities while keeping the user’s experience front of mind. See Details Download Image Microsoft Defender ATP White Paper July 17, 2020 Microsoft ATP performs on par with their competitors when Controlled Folder Access is enabled. See Details Download Image A Visual History of Cybersecurity July 15, 2020 From Commodore 64 to COVID-19, from ARPANET to 2020, the most unprecedented year most of us can remember, our new Visual History of Cybersecurity... See Details Download Image Cyber Program Development June 30, 2020 Our Cyber Program Development evaluates business drivers, maps them to cyber requirements and identifies where existing capabilities can be optimized. See Details Download Image IoT Security Services June 26, 2020 Our solutions identify, segment and protect IoT devices and the data they produce. See Details Download Image Risk Assessments Service Brief June 26, 2020 Our risk assessments provide a holistic view of cyber risk throughout your organization or agency. See Details Download Image Enterprise Incident Management Service Brief June 25, 2020 Our Enterprise Incident Management solutions prepare, validate and support your Incident Response/Management Program. See Details Download Image Driving Cybersecurity Performance June 18, 2020 This research will help your firm optimize its cybersecurity resources for the challenging times ahead. See Details Download Image Virtual CISO Services June 11, 2020 We provide CISO-level support for organizations needing guidance on strategic plans, business alignment and more. See Details Download Image Risk Management: Work From Home Assessment June 08, 2020 Optiv’s Work from Home Assessment identifies, reviews and prioritizes strategic risks associated with remote workforces. See Details Download Image Azure Native Security Services and Third-Party Solutions May 20, 2020 Explore our IaaS Security – Azure Native and Third-Party Tools White Paper to understand Azure security capabilities to better defend against the most... See Details Download Pagination First page « First Previous page ‹ Previous … Page 31 Page 32 Page 33 Page 34 Current page 35 Page 36 Page 37 Page 38 Page 39 … Next page Next › Last page Last »
Image Threat Management: Attack Surface Management Services August 07, 2020 Our Attack Surface Management program continuously identifies and tests your new or changing attack surface. See Details Download
Image Identity Governance and Administration July 19, 2020 Optiv’s IGA experts specialize in managing identities while keeping the user’s experience front of mind. See Details Download
Image Microsoft Defender ATP White Paper July 17, 2020 Microsoft ATP performs on par with their competitors when Controlled Folder Access is enabled. See Details Download
Image A Visual History of Cybersecurity July 15, 2020 From Commodore 64 to COVID-19, from ARPANET to 2020, the most unprecedented year most of us can remember, our new Visual History of Cybersecurity... See Details Download
Image Cyber Program Development June 30, 2020 Our Cyber Program Development evaluates business drivers, maps them to cyber requirements and identifies where existing capabilities can be optimized. See Details Download
Image IoT Security Services June 26, 2020 Our solutions identify, segment and protect IoT devices and the data they produce. See Details Download
Image Risk Assessments Service Brief June 26, 2020 Our risk assessments provide a holistic view of cyber risk throughout your organization or agency. See Details Download
Image Enterprise Incident Management Service Brief June 25, 2020 Our Enterprise Incident Management solutions prepare, validate and support your Incident Response/Management Program. See Details Download
Image Driving Cybersecurity Performance June 18, 2020 This research will help your firm optimize its cybersecurity resources for the challenging times ahead. See Details Download
Image Virtual CISO Services June 11, 2020 We provide CISO-level support for organizations needing guidance on strategic plans, business alignment and more. See Details Download
Image Risk Management: Work From Home Assessment June 08, 2020 Optiv’s Work from Home Assessment identifies, reviews and prioritizes strategic risks associated with remote workforces. See Details Download
Image Azure Native Security Services and Third-Party Solutions May 20, 2020 Explore our IaaS Security – Azure Native and Third-Party Tools White Paper to understand Azure security capabilities to better defend against the most... See Details Download
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services