A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image PCI DSS Report on Compliance (ROC) Completion January 06, 2021 Our team assesses your cardholder data environment against PCI DSS, completes your Report on Compliance and outlines the status for all control areas. See Details Download Image PCI DSS ASV Scanning Services January 05, 2021 Our Approved Scanning Vendor services enable internet-facing asset compliance scanning, fulfilling the PCI ASV external network scanning requirement. See Details Download Image Security Operations: Digital Risk Protection Management December 21, 2020 Our efficient, tailored threat intelligence gathering process provides actionable information to drive an improved security posture. See Details Download Image PCI DSS Compliance Services December 16, 2020 We provide a comprehensive suite of Payment Card Industry Data Security Standard services that help you plan, build and run your compliance program. See Details Download Image 2020 Optiv Yearbook December 07, 2020 2020 – where do we begin?! While people across the globe experienced arguably the most disruptive and stressful global crisis of their lives, we also... See Details Download Image COVID-19 Timeline November 12, 2020 From the abrupt WFH shift to hordes of opportunistic attackers, COVID-19’s deep cybersecurity impact has been unprecedented. This timeline (it’s... See Details Download Image Cybersecurity Awareness Month: IoT's Future Is So Bright We Have to Wear a Welder’s Mask October 26, 2020 IoT is everywhere. Everywhere. Fear not. Here’s how we secured them. See Details Download Image Risk Management and Transformation: Fully Managed Third Party Risk October 22, 2020 Our third-party risk management service mitigates risk by assessing relationships, business profile, cyber and control risk. See Details Download Image Cybersecurity Awareness Month: Securing Internet-Connected Devices in Healthcare October 19, 2020 We understand that your care needs to be reliable and private, and part of that care depends upon technology. See Details Download Image COVID-19: Cybersecurity in Action October 19, 2020 Use our new tool to navigate the ruckus COVID-19 has brought into your world and learn what to do to achieve a resilient cybersecurity strategy. See Details Download Image Threat Management: Enterprise Password Audit October 15, 2020 Our enterprise password audit collects, processes and assesses the primary user account database while leveraging multiple industry standards. See Details Download Image Threat Management: Endpoint Security Assessment October 14, 2020 Our endpoint assessment addresses each step of the attack lifecycle, from payload delivery to data exfiltration. See Details Download Pagination First page « First Previous page ‹ Previous … Page 27 Page 28 Page 29 Page 30 Current page 31 Page 32 Page 33 Page 34 Page 35 … Next page Next › Last page Last »
Image PCI DSS Report on Compliance (ROC) Completion January 06, 2021 Our team assesses your cardholder data environment against PCI DSS, completes your Report on Compliance and outlines the status for all control areas. See Details Download
Image PCI DSS ASV Scanning Services January 05, 2021 Our Approved Scanning Vendor services enable internet-facing asset compliance scanning, fulfilling the PCI ASV external network scanning requirement. See Details Download
Image Security Operations: Digital Risk Protection Management December 21, 2020 Our efficient, tailored threat intelligence gathering process provides actionable information to drive an improved security posture. See Details Download
Image PCI DSS Compliance Services December 16, 2020 We provide a comprehensive suite of Payment Card Industry Data Security Standard services that help you plan, build and run your compliance program. See Details Download
Image 2020 Optiv Yearbook December 07, 2020 2020 – where do we begin?! While people across the globe experienced arguably the most disruptive and stressful global crisis of their lives, we also... See Details Download
Image COVID-19 Timeline November 12, 2020 From the abrupt WFH shift to hordes of opportunistic attackers, COVID-19’s deep cybersecurity impact has been unprecedented. This timeline (it’s... See Details Download
Image Cybersecurity Awareness Month: IoT's Future Is So Bright We Have to Wear a Welder’s Mask October 26, 2020 IoT is everywhere. Everywhere. Fear not. Here’s how we secured them. See Details Download
Image Risk Management and Transformation: Fully Managed Third Party Risk October 22, 2020 Our third-party risk management service mitigates risk by assessing relationships, business profile, cyber and control risk. See Details Download
Image Cybersecurity Awareness Month: Securing Internet-Connected Devices in Healthcare October 19, 2020 We understand that your care needs to be reliable and private, and part of that care depends upon technology. See Details Download
Image COVID-19: Cybersecurity in Action October 19, 2020 Use our new tool to navigate the ruckus COVID-19 has brought into your world and learn what to do to achieve a resilient cybersecurity strategy. See Details Download
Image Threat Management: Enterprise Password Audit October 15, 2020 Our enterprise password audit collects, processes and assesses the primary user account database while leveraging multiple industry standards. See Details Download
Image Threat Management: Endpoint Security Assessment October 14, 2020 Our endpoint assessment addresses each step of the attack lifecycle, from payload delivery to data exfiltration. See Details Download
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?