A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image ATT&CK’s Initial Access Adversarial Tactic October 05, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations.... See Details Blog
Image Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series) September 28, 2018 This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20 July 30, 2017 Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 14 November 03, 2016 The processes and tools used to track/control/prevent/correct secure access to critical assets (e.g., information, resources, and systems) according.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 13 October 20, 2016 Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data. See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 12 September 21, 2016 Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data. See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 8 July 07, 2016 Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 7 June 22, 2016 Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 6 June 16, 2016 Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack. See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 5 June 09, 2016 The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 4 June 02, 2016 Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 3 May 31, 2016 Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that.... See Details Blog