A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Blog Protect Yourself from BYOT (Bring Your Own Threat) June 05, 2019 With the increase in mobile and remote work environments, organizations can be at risk or under threat by not securing devices, access and credentials....
Image Blog MythBusters: Debunking Five Common Identity and Data Management Myths April 17, 2019 Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP....
Image Blog Network Trust: How to Maintain and Establish it in Your Perimeter April 09, 2019 Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their....
Image Blog Let’s Not Talk About the Past December 20, 2018 With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you....
Image Blog It’s 2018. Password Journals are Still a Thing. November 29, 2018 I was in a store the other day and saw something that, being in cyber security, stopped me fast: A Password Journal. Seriously. A place to write down....
Image Blog Take a Deep Breath…and Be Thankful November 20, 2018 Ah, Thanksgiving. Time to breathe, greet the holidays and revel in a few days off, time with family, and…what’s that call on your cell? “Suspicious....
Image Blog Skills Gap – Hiring When There’s No People September 13, 2018 While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are....
Image Blog Testing Password Reset Token Predictability with the Reset-A-Tron Burp Extension April 17, 2018 Most web applications provide a 'forgot my password' feature where a recovery or reset token is delivered to the associated account email address....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Optiv Worldwide September 21, 2017 Deemed the “Silicon Valley of India,” Bangalore is a major hub for many of the top multinational information technology firms, software companies, and....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Pete Arzamendi August 24, 2017 Whether it’s cyber security or his passion for Jiu-Jitsu, Pete Arzamendi enjoys the art of combat and the constant search for attacks throughout the....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Keyana Jones August 09, 2017 Keyana’s mantra of ‘unlocking tomorrow’ is clear when she enters the room at the Opt-In New Employee Training session. She wastes no time dispersing....