A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Level Up Your Cloud Security Program October 06, 2020 Together, Optiv and Netskope help clients stay ahead of threats by implementing a real-time, cloud-native and data-centric security program. See Details Download Image Security Solutions for SLED Agencies October 06, 2020 We help SLED agencies plan, build and run successful cybersecurity programs that optimize operations, reduce risk and align with business goals. See Details Download Image Cybersecurity Awareness Month: Everything is Interconnected October 05, 2020 IoT is ubiquitous. No, bigger than that. How big and why do you care if it’s secure? Whack. It’s about to impact both your users and environment. See Details Download Image Cybersecurity Awareness Month: See Jane Secure October 05, 2020 See how Jane secures her organization and defends against cyberattacks caused by reckless cybersecurity practices. See Details Download Image Vulnerability Management Program: Remediation Services October 04, 2020 Our Threat Vulnerability Management Remediation provides results-based, technical vulnerability remediation to minimize the attack surface. See Details Download Image PCI Compliance eBook October 01, 2020 Our comprehensive suite of services help you plan, build and run your PCI compliance program. See Details Download Image Web Application Security Assessment September 30, 2020 Our assessment helps identify/prioritize the highest severity risks affecting your web applications and supporting infrastructure. See Details Download Image Cybersecurity Awareness Month (CAM) 2020 September 30, 2020 October is Cybersecurity Awareness Month. We’ll be providing resources to drive heightened awareness and translate awareness into action. See Details Download Image Texas Department of Information Resources (DIR) Certified Training September 21, 2020 We offer four programs approved by the Texas DIR. See Details Download Image Identity Modernization for Okta Workforce August 25, 2020 Working with Okta, we can enable a simplified and modernized workforce access management platform. See Details Download Image Enterprise IoT Vulnerability Management : Part 1 August 20, 2020 This white paper explains how to bring IoT and embedded devices into your vulnerability management program. See Details Download Image Managed Cloud Services August 20, 2020 Our Managed Cloud Security service applies continuous adaptive risk and threat analysis to cloud environments. See Details Download Pagination First page « First Previous page ‹ Previous … Page 28 Page 29 Page 30 Page 31 Current page 32 Page 33 Page 34 Page 35 Page 36 … Next page Next › Last page Last »
Image Level Up Your Cloud Security Program October 06, 2020 Together, Optiv and Netskope help clients stay ahead of threats by implementing a real-time, cloud-native and data-centric security program. See Details Download
Image Security Solutions for SLED Agencies October 06, 2020 We help SLED agencies plan, build and run successful cybersecurity programs that optimize operations, reduce risk and align with business goals. See Details Download
Image Cybersecurity Awareness Month: Everything is Interconnected October 05, 2020 IoT is ubiquitous. No, bigger than that. How big and why do you care if it’s secure? Whack. It’s about to impact both your users and environment. See Details Download
Image Cybersecurity Awareness Month: See Jane Secure October 05, 2020 See how Jane secures her organization and defends against cyberattacks caused by reckless cybersecurity practices. See Details Download
Image Vulnerability Management Program: Remediation Services October 04, 2020 Our Threat Vulnerability Management Remediation provides results-based, technical vulnerability remediation to minimize the attack surface. See Details Download
Image PCI Compliance eBook October 01, 2020 Our comprehensive suite of services help you plan, build and run your PCI compliance program. See Details Download
Image Web Application Security Assessment September 30, 2020 Our assessment helps identify/prioritize the highest severity risks affecting your web applications and supporting infrastructure. See Details Download
Image Cybersecurity Awareness Month (CAM) 2020 September 30, 2020 October is Cybersecurity Awareness Month. We’ll be providing resources to drive heightened awareness and translate awareness into action. See Details Download
Image Texas Department of Information Resources (DIR) Certified Training September 21, 2020 We offer four programs approved by the Texas DIR. See Details Download
Image Identity Modernization for Okta Workforce August 25, 2020 Working with Okta, we can enable a simplified and modernized workforce access management platform. See Details Download
Image Enterprise IoT Vulnerability Management : Part 1 August 20, 2020 This white paper explains how to bring IoT and embedded devices into your vulnerability management program. See Details Download
Image Managed Cloud Services August 20, 2020 Our Managed Cloud Security service applies continuous adaptive risk and threat analysis to cloud environments. See Details Download