A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Post-Assessment Remediation Assists With Vulnerabilities September 20, 2021 Optiv's Post-Assessment Remediation assists with vulnerabilities identified from a penetration test or other security assessment. See Details Download Image Digital Transformation Services September 20, 2021 Digital transformation (DX) complexity requires a new approach to security. Optiv’s holistic, strategic digital DX solution can help. See Details Download Image Optiv Managed Third-Party Risk Management September 17, 2021 As part of third-party risk management, we monitor risks based on services and vendor data. See Details Download Image Cybersecurity Awareness Month (CAM) 2021 September 16, 2021 CAM 2021’s theme: Do your part and #BeCyberSmart. Let’s make cybersecurity awareness resonate beyond October. See Details Download Image Cybersecurity Field Guide #5: Ransomware: Yesterday, Today, Tomorrow September 16, 2021 This guide details the contemporary ransomware landscape and provides a glimpse into the dynamics driving its near-future evolution. See Details Download Image Cybersecurity Field Guide #6: Zero Trust Guiding Principles September 16, 2021 This guide provides an intro and dives into Optiv's Zero Trust principles and how to visualize your Zero Trust journey. See Details Download Image Cybersecurity Field Guide #4: Best Practices for Automated Vulnerability Remediation September 15, 2021 This field guide explores the current state of vulnerability remediation and provides guidance on emerging automated solutions. See Details Download Image Cybersecurity Field Guide #2: How to Survive an Attack September 15, 2021 This Field Guide illustrates how to develop, test and continually improve your CSIRP. See Details Download Image HITRUST Common Security and Privacy Framework September 15, 2021 HITRUST helps clients create, access, store and transmit information safely and securely, while increasing transparency. See Details Download Image Cybersecurity Field Guide #1.0: What to Do When Everything Change September 14, 2021 This guide helps navigate cybersecurity’s complexities in a world where innovations and threats arise seemingly daily. See Details Download Image Security Operations: Advanced Fusion Center Operations September 13, 2021 Reduce cost, mitigate risk and improve operational security with Optiv’s Advanced Fusion Center Operations solution. See Details Download Image Security Strategy Retainer September 08, 2021 Leverage and customize the entire suite of Optiv’s capabilities with our Security Strategy Retainer. See Details Download Pagination First page « First Previous page ‹ Previous … Page 22 Page 23 Page 24 Page 25 Current page 26 Page 27 Page 28 Page 29 Page 30 … Next page Next › Last page Last »
Image Post-Assessment Remediation Assists With Vulnerabilities September 20, 2021 Optiv's Post-Assessment Remediation assists with vulnerabilities identified from a penetration test or other security assessment. See Details Download
Image Digital Transformation Services September 20, 2021 Digital transformation (DX) complexity requires a new approach to security. Optiv’s holistic, strategic digital DX solution can help. See Details Download
Image Optiv Managed Third-Party Risk Management September 17, 2021 As part of third-party risk management, we monitor risks based on services and vendor data. See Details Download
Image Cybersecurity Awareness Month (CAM) 2021 September 16, 2021 CAM 2021’s theme: Do your part and #BeCyberSmart. Let’s make cybersecurity awareness resonate beyond October. See Details Download
Image Cybersecurity Field Guide #5: Ransomware: Yesterday, Today, Tomorrow September 16, 2021 This guide details the contemporary ransomware landscape and provides a glimpse into the dynamics driving its near-future evolution. See Details Download
Image Cybersecurity Field Guide #6: Zero Trust Guiding Principles September 16, 2021 This guide provides an intro and dives into Optiv's Zero Trust principles and how to visualize your Zero Trust journey. See Details Download
Image Cybersecurity Field Guide #4: Best Practices for Automated Vulnerability Remediation September 15, 2021 This field guide explores the current state of vulnerability remediation and provides guidance on emerging automated solutions. See Details Download
Image Cybersecurity Field Guide #2: How to Survive an Attack September 15, 2021 This Field Guide illustrates how to develop, test and continually improve your CSIRP. See Details Download
Image HITRUST Common Security and Privacy Framework September 15, 2021 HITRUST helps clients create, access, store and transmit information safely and securely, while increasing transparency. See Details Download
Image Cybersecurity Field Guide #1.0: What to Do When Everything Change September 14, 2021 This guide helps navigate cybersecurity’s complexities in a world where innovations and threats arise seemingly daily. See Details Download
Image Security Operations: Advanced Fusion Center Operations September 13, 2021 Reduce cost, mitigate risk and improve operational security with Optiv’s Advanced Fusion Center Operations solution. See Details Download
Image Security Strategy Retainer September 08, 2021 Leverage and customize the entire suite of Optiv’s capabilities with our Security Strategy Retainer. See Details Download
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?