A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Vulnerability Management Migration June 06, 2022 Optiv helps you migrate to a new vulnerability management (VM) platform while staying focused on your business. See Details Download Image Cybersecurity Field Guide #10.0: Forging Operational Resilience June 03, 2022 To survive and thrive in the complex digital future, enterprises must build cybersecurity resilience. This guide offers in-depth approaches. See Details Download Image Cyber Recovery Solution (CRS) Is More Than Business Continuity May 26, 2022 Cyberattacks happen. Optiv CRS can help you get back to business. See Details Download Image Cybersecurity Field Guide #9.0: Payment Card Industry DSS v4.0 May 25, 2022 This field guide explains the changes in the PCI Data Security Standard (PCI DSS) version 4.0 and helps organizations prepare for migration. See Details Download Image Insider Risk and Zero Trust May 24, 2022 Zero Trust aligns with and enhances insider risk capabilities in several ways. See Details Download Image Cyber Recovery Solution May 20, 2022 Our Cyber Recovery Solution (CRS) prepares you for the increasing threat of ransomware and cyber attacks. See Details Download Image Advisory, Integration Focus of Digital Access Management May 19, 2022 Optiv’s Data Access Management services leverage identity and access management advisory and integration expertise to ensure successful outcomes. See Details Download Image Cyber Resilience May 17, 2022 Protect and secure critical data. Avoid business interruptions and loss. Optiv’s Cyber Resilience service can help. See Details Download Image Privileged Access Management as-a-Service May 09, 2022 Rely on Optiv's experts to deliver a purpose-built Privileged Access Management solution based on best practices so you can focus on your objectives. See Details Download Image Your Privileged Accounts Need Constant Attention and Protection April 28, 2022 Holistically secure your privileged credentials with less time and effort by leveraging PAM as-a-Service. See Details Download Image Secure Software Development Lifecycle (SDLC) Hardening April 14, 2022 Increase efficiency, lower costs and reduce risks by implementing a secure software development lifecycle (SDLC). See Details Download Image 2021 Incident Threat Response Timeline April 13, 2022 2021 saw dozens of highly damaging cyber attacks. This animated timeline highlights the most critical and notes Optiv’s response. See Details Download Pagination First page « First Previous page ‹ Previous … Page 17 Page 18 Page 19 Page 20 Current page 21 Page 22 Page 23 Page 24 Page 25 … Next page Next › Last page Last »
Image Vulnerability Management Migration June 06, 2022 Optiv helps you migrate to a new vulnerability management (VM) platform while staying focused on your business. See Details Download
Image Cybersecurity Field Guide #10.0: Forging Operational Resilience June 03, 2022 To survive and thrive in the complex digital future, enterprises must build cybersecurity resilience. This guide offers in-depth approaches. See Details Download
Image Cyber Recovery Solution (CRS) Is More Than Business Continuity May 26, 2022 Cyberattacks happen. Optiv CRS can help you get back to business. See Details Download
Image Cybersecurity Field Guide #9.0: Payment Card Industry DSS v4.0 May 25, 2022 This field guide explains the changes in the PCI Data Security Standard (PCI DSS) version 4.0 and helps organizations prepare for migration. See Details Download
Image Insider Risk and Zero Trust May 24, 2022 Zero Trust aligns with and enhances insider risk capabilities in several ways. See Details Download
Image Cyber Recovery Solution May 20, 2022 Our Cyber Recovery Solution (CRS) prepares you for the increasing threat of ransomware and cyber attacks. See Details Download
Image Advisory, Integration Focus of Digital Access Management May 19, 2022 Optiv’s Data Access Management services leverage identity and access management advisory and integration expertise to ensure successful outcomes. See Details Download
Image Cyber Resilience May 17, 2022 Protect and secure critical data. Avoid business interruptions and loss. Optiv’s Cyber Resilience service can help. See Details Download
Image Privileged Access Management as-a-Service May 09, 2022 Rely on Optiv's experts to deliver a purpose-built Privileged Access Management solution based on best practices so you can focus on your objectives. See Details Download
Image Your Privileged Accounts Need Constant Attention and Protection April 28, 2022 Holistically secure your privileged credentials with less time and effort by leveraging PAM as-a-Service. See Details Download
Image Secure Software Development Lifecycle (SDLC) Hardening April 14, 2022 Increase efficiency, lower costs and reduce risks by implementing a secure software development lifecycle (SDLC). See Details Download
Image 2021 Incident Threat Response Timeline April 13, 2022 2021 saw dozens of highly damaging cyber attacks. This animated timeline highlights the most critical and notes Optiv’s response. See Details Download