A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Secure Software Development Lifecycle (SDLC) Hardening April 14, 2022 Increase efficiency, lower costs and reduce risks by implementing a secure software development lifecycle (SDLC). See Details Download Image 2021 Incident Threat Response Timeline April 13, 2022 2021 saw dozens of highly damaging cyber attacks. This animated timeline highlights the most critical and notes Optiv’s response. See Details Download Image Payment Card Industry (PCI) Advisory Services April 12, 2022 Our PCI Advisory Services can build around your specific context, helping you to untangle competing requirements from multiple regulations. See Details Download Image Active Directory Assessment April 04, 2022 Learn how Optiv can help you assess your existing Active Directory environment. See Details Download Image Optiv Netskope Maturity Services April 01, 2022 Optiv's Maturity Services improve security posture programmatically. Regular updates reduce your organization's risk so you can focus on business. See Details Download Image Microsoft E5 Implementation Services March 09, 2022 Optiv’s Microsoft E5 Implementation Services integrate tools that protect your business, bolster regulatory compliance and defend against attacks. See Details Download Image Qualys Health Check Service March 07, 2022 Optiv and Qualys have partnered to provide health checks for your Qualys vulnerability management platform. See Details Download Image Governance and Operating Model February 14, 2022 Our proven model helps build and operationalize effective, efficient and sustainable governance to support cybersecurity initiatives. See Details Download Image A Visual Future of Cybersecurity February 10, 2022 This ebook looks at technologies and innovations that will affect cybersecurity in the coming years, including AI, quantum computing and IoT. See Details Download Image A Visual Landscape of Cybersecurity February 10, 2022 Today’s cyber world is more complex than ever, but some of us thrive on navigating it and turning complexities into advantages. In the spirit of... See Details Download Image Optiv’s Privileged Access Management Services February 07, 2022 Optiv's PAM services provide solutions for privileged access and roll out of industry-proven programs. See Details Download Image InfoSec Fusion and Cyber Resilience February 04, 2022 Divergent security practices (governance, risk, compliance, appsec, network ops, IAM, etc.) can work together to safeguard organizations. See Details Download Pagination First page « First Previous page ‹ Previous … Page 18 Page 19 Page 20 Page 21 Current page 22 Page 23 Page 24 Page 25 Page 26 … Next page Next › Last page Last »
Image Secure Software Development Lifecycle (SDLC) Hardening April 14, 2022 Increase efficiency, lower costs and reduce risks by implementing a secure software development lifecycle (SDLC). See Details Download
Image 2021 Incident Threat Response Timeline April 13, 2022 2021 saw dozens of highly damaging cyber attacks. This animated timeline highlights the most critical and notes Optiv’s response. See Details Download
Image Payment Card Industry (PCI) Advisory Services April 12, 2022 Our PCI Advisory Services can build around your specific context, helping you to untangle competing requirements from multiple regulations. See Details Download
Image Active Directory Assessment April 04, 2022 Learn how Optiv can help you assess your existing Active Directory environment. See Details Download
Image Optiv Netskope Maturity Services April 01, 2022 Optiv's Maturity Services improve security posture programmatically. Regular updates reduce your organization's risk so you can focus on business. See Details Download
Image Microsoft E5 Implementation Services March 09, 2022 Optiv’s Microsoft E5 Implementation Services integrate tools that protect your business, bolster regulatory compliance and defend against attacks. See Details Download
Image Qualys Health Check Service March 07, 2022 Optiv and Qualys have partnered to provide health checks for your Qualys vulnerability management platform. See Details Download
Image Governance and Operating Model February 14, 2022 Our proven model helps build and operationalize effective, efficient and sustainable governance to support cybersecurity initiatives. See Details Download
Image A Visual Future of Cybersecurity February 10, 2022 This ebook looks at technologies and innovations that will affect cybersecurity in the coming years, including AI, quantum computing and IoT. See Details Download
Image A Visual Landscape of Cybersecurity February 10, 2022 Today’s cyber world is more complex than ever, but some of us thrive on navigating it and turning complexities into advantages. In the spirit of... See Details Download
Image Optiv’s Privileged Access Management Services February 07, 2022 Optiv's PAM services provide solutions for privileged access and roll out of industry-proven programs. See Details Download
Image InfoSec Fusion and Cyber Resilience February 04, 2022 Divergent security practices (governance, risk, compliance, appsec, network ops, IAM, etc.) can work together to safeguard organizations. See Details Download