A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Secure Data Lake Deployment June 15, 2018 Integrated production-ready data lake securely deployed securely in as little as two weeks. See Details Download Image Who Moved My Governance June 05, 2018 Your sensitive corporate data has been moved and without proper access control, it’s on the loose! How can you get it under control? See Details Download Image Drafting Your Data Protection Officer May 30, 2018 Learn who to draft for the General Data Protection Regulation (GDPR) season. See Details Download Image Security Automation and Orchestration Briefing: Technology and Partner Review May 15, 2018 This paper takes an in-depth look at Phantom’s solution and constructing playbooks to triage endpoint and network alerts. See Details Download Image 2018 Cyber Threat Intelligence Estimate May 15, 2018 Read Optiv's analysis of 2017 security themes in this Cyber Threat Intelligence Estimate report. See Details Download Image How to Talk to Your Cloud Team About Cloud Security May 15, 2018 Learn how to get a seat at the table before you have to answer to a breach in the cloud. See Details Download Image Secure Big Data with Orchestration and Automation May 01, 2018 Learn how securing big data is much like conducting an actual symphony. See Details Download Image Cyber Threat Intelligence as-a-Service April 19, 2018 Learn how Optiv’s Cyber Threat Intelligence as-a-Service solution provides you with an advanced "beyond the perimeter" capability as a part of your... See Details Download Image CISO Periodic Table April 16, 2018 Learn about security concerns and threats facing the modern day CISO. See Details Download Image Assessments April 12, 2018 Learn how our assessments at Optiv program allows for organizations to gain the right level of visibility into your information security program. See Details Download Image Frost & Sullivan 2018 Competitive Strategy Innovation and Leadership Award March 28, 2018 Optiv recognized for managed and professional security services. See Details Download Image The Five Steps to Managing Third-Party Risk March 08, 2018 Learn how to manage the many forms of third-party risk. See Details Download Pagination First page « First Previous page ‹ Previous … Page 37 Page 38 Page 39 Page 40 Current page 41 Page 42 Page 43 Page 44 Page 45 … Next page Next › Last page Last »
Image Secure Data Lake Deployment June 15, 2018 Integrated production-ready data lake securely deployed securely in as little as two weeks. See Details Download
Image Who Moved My Governance June 05, 2018 Your sensitive corporate data has been moved and without proper access control, it’s on the loose! How can you get it under control? See Details Download
Image Drafting Your Data Protection Officer May 30, 2018 Learn who to draft for the General Data Protection Regulation (GDPR) season. See Details Download
Image Security Automation and Orchestration Briefing: Technology and Partner Review May 15, 2018 This paper takes an in-depth look at Phantom’s solution and constructing playbooks to triage endpoint and network alerts. See Details Download
Image 2018 Cyber Threat Intelligence Estimate May 15, 2018 Read Optiv's analysis of 2017 security themes in this Cyber Threat Intelligence Estimate report. See Details Download
Image How to Talk to Your Cloud Team About Cloud Security May 15, 2018 Learn how to get a seat at the table before you have to answer to a breach in the cloud. See Details Download
Image Secure Big Data with Orchestration and Automation May 01, 2018 Learn how securing big data is much like conducting an actual symphony. See Details Download
Image Cyber Threat Intelligence as-a-Service April 19, 2018 Learn how Optiv’s Cyber Threat Intelligence as-a-Service solution provides you with an advanced "beyond the perimeter" capability as a part of your... See Details Download
Image CISO Periodic Table April 16, 2018 Learn about security concerns and threats facing the modern day CISO. See Details Download
Image Assessments April 12, 2018 Learn how our assessments at Optiv program allows for organizations to gain the right level of visibility into your information security program. See Details Download
Image Frost & Sullivan 2018 Competitive Strategy Innovation and Leadership Award March 28, 2018 Optiv recognized for managed and professional security services. See Details Download
Image The Five Steps to Managing Third-Party Risk March 08, 2018 Learn how to manage the many forms of third-party risk. See Details Download
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?