What Can We Help You Find?

July 21, 2016
Manage (track/control/correct) the ongoing operational use of ports, protocols and services on networked devices in order to minimize windows of....
Blog

July 07, 2016
Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to....
Blog

June 30, 2016
An organization’s biggest threat may not come from far away hackers but from its own employees. Your first line of defense is to develop a cyber....
Blog

June 23, 2016
Recently, Optiv’s Global Threat Intelligence Center (gTIC) identified an active phishing campaign against the education sector, in which attackers are....
Blog

June 22, 2016
Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email....
Blog

June 21, 2016
Denver – June 21, 2016 – Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced the appointment of former...
Press Release

June 16, 2016
Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack.
Blog

June 16, 2016
Learn how the adversarial advantage in the cloud poses certain disadvantages and tips to overcome these challenges.
Download

June 16, 2016
Explore Optiv’s eight keys to success infographic to make the most of your move to cloud and protect your business.
Download

June 14, 2016
College students are five times more likely to become victims of identity theft than any other demographic, according to The Financial Times. Experts....
Blog

Optiv Security’s JD Sherry to Present on Cloud Security at Gartner Security & Risk Management Summit
June 13, 2016
Denver – June 13, 2016 – Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced that JD Sherry, vice...
Press Release

June 10, 2016
Optiv’s enterprise risk and compliance services help you identify, mitigate and manage your organization’s cyber security risk.
Download