A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Optiv Services Overview October 31, 2019 We optimize and rationalize existing security programs to transform how you procure, consume, integrate, implement and operationalize cybersecurity. See Details Download Image IaaS Security - AWS Native and Third-Party Tools Executive Summary October 11, 2019 This paper helps AWS users with Amazon, Palo Alto Networks and Tenable cloud infrastructure assessment tools. See Details Download Image CDX Orchestration and Automation Service Brief October 09, 2019 Orchestrate and automate technologies, processes and people to run a successful IT and security operation. See Details Download Image IaaS Security - AWS Native and Third-Party Tools October 09, 2019 Many tools are available to assist customers responsible for their own “security in the cloud.” See Details Download Image CDX Analytics and Big Data Service Brief October 09, 2019 Get real-time value extraction from secured data. See Details Download Image Is your cybersecurity tech stack creating more gaps? September 30, 2019 Explore this e-book to learn how to achieve the right level of protection, technology and controls to align security with business initiatives. See Details Download Image Frost & Sullivan Customer Service Leadership Award for Healthcare Managed Cybersecurity Services September 30, 2019 Optiv receives the Customer Service Leadership Award for Healthcare Managed Cybersecurity Services from Frost & Sullivan. See Details Download Image The State of the CISO September 20, 2019 More sophisticated organizations understand the importance of security in reducing organizational risk and maintaining brand value. See Details Download Image 2019 Cyber Threat Intelligence Estimate September 20, 2019 The best-practice recommendations in this report are practical next steps that help immediately improve cybersecurity posture. See Details Download Image NCSAM: Protective Behaviors September 13, 2019 National Cybersecurity Awareness Month stresses keeping software and apps updated, using secure wi-fi and protecting collected. See Details Download Image NCSAM: Personal Accountability September 12, 2019 Workers should be aware of social media safety, privacy settings and mobile application security. See Details Download Image NCSAM: Newsletter September 12, 2019 This employee-focused newsletter discusses several simple practices that will help keep your data private and secure. See Details Download Pagination First page « First Previous page ‹ Previous … Page 32 Page 33 Page 34 Page 35 Current page 36 Page 37 Page 38 Page 39 Page 40 … Next page Next › Last page Last »
Image Optiv Services Overview October 31, 2019 We optimize and rationalize existing security programs to transform how you procure, consume, integrate, implement and operationalize cybersecurity. See Details Download
Image IaaS Security - AWS Native and Third-Party Tools Executive Summary October 11, 2019 This paper helps AWS users with Amazon, Palo Alto Networks and Tenable cloud infrastructure assessment tools. See Details Download
Image CDX Orchestration and Automation Service Brief October 09, 2019 Orchestrate and automate technologies, processes and people to run a successful IT and security operation. See Details Download
Image IaaS Security - AWS Native and Third-Party Tools October 09, 2019 Many tools are available to assist customers responsible for their own “security in the cloud.” See Details Download
Image CDX Analytics and Big Data Service Brief October 09, 2019 Get real-time value extraction from secured data. See Details Download
Image Is your cybersecurity tech stack creating more gaps? September 30, 2019 Explore this e-book to learn how to achieve the right level of protection, technology and controls to align security with business initiatives. See Details Download
Image Frost & Sullivan Customer Service Leadership Award for Healthcare Managed Cybersecurity Services September 30, 2019 Optiv receives the Customer Service Leadership Award for Healthcare Managed Cybersecurity Services from Frost & Sullivan. See Details Download
Image The State of the CISO September 20, 2019 More sophisticated organizations understand the importance of security in reducing organizational risk and maintaining brand value. See Details Download
Image 2019 Cyber Threat Intelligence Estimate September 20, 2019 The best-practice recommendations in this report are practical next steps that help immediately improve cybersecurity posture. See Details Download
Image NCSAM: Protective Behaviors September 13, 2019 National Cybersecurity Awareness Month stresses keeping software and apps updated, using secure wi-fi and protecting collected. See Details Download
Image NCSAM: Personal Accountability September 12, 2019 Workers should be aware of social media safety, privacy settings and mobile application security. See Details Download
Image NCSAM: Newsletter September 12, 2019 This employee-focused newsletter discusses several simple practices that will help keep your data private and secure. See Details Download