A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
All News and Stories Title Topic of Interest All TopicsAppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Is There a Fundamental Difference in How Identity is Underst… May 07, 2019 13 Ways to Explain Complex Tech Issues to Other Departments May 01, 2019 The Right Conversations to Have with Your CISO April 30, 2019 Why Identity is a Process, Not a Project April 23, 2019 The Know-Your-Enemies Approach to Cybersecurity April 22, 2019 One Year On, What Has Been the Impact of GDPR on Data Securi… April 16, 2019 Securing Serverless Computing, the Latest Cloud Paradigm [Q… April 10, 2019 Banks Become Target for Growing Cybercrime Syndicates April 09, 2019 Pagination First page « First Previous page ‹ Previous … Page 12 Page 13 Page 14 Page 15 Current page 16 Page 17 Page 18 Page 19 Page 20 … Next page Next › Last page Last »