Committed to Serving Clients and Partners during COVID-19

First and foremost, our thoughts go out to everyone impacted by the coronavirus pandemic. We also extend heartfelt thanks and gratitude to the government and healthcare workers for their round-the-clock efforts.



We value the health, wellbeing and safety of our employees, clients and partners, along with the people in the communities where we live and operate.



To help keep our communities healthy and Optiv secure, we have implemented the following measures:


  • Business continuity. Our cross-functional crisis management team meets daily to keep pace with the fast-evolving situation. We’re following our tested and documented crisis management and pandemic plan and adhering to all best practices and guidelines from the Center for Disease Control. We also have redundancy built into our technology environment to provide continued operations.
  • Supply chain. We’re managing our business and working closely with partners to adjust our delivery approach, where and if needed, to continue providing technology, services and solutions to clients.
  • Remote workforce. While we already have a largely remote workforce, office employees who can work from home are doing so. 
  • Travel restrictions. All non-essential domestic and international travel is on hold.
  • Events postponed. The March 18 Seattle, April 2 Dallas, April 9 SoCal and April 23 Toronto OptivCon events are being rescheduled to later in 2020. Regional Optiv events through April 2020 are suspended. New dates will be communicated once determined.  



As companies in all industries and of all sizes grapple with one unexpected issue after another, there is one constant: Optiv is here for you. We remain committed to delivering services and solutions that help clients securely meet their rapidly evolving business challenges.



Bookmark this page! We will continue to post updates and client resources here to help you securely meet evolving business challenges.

COVID-19 Resources

Optiv Surge Support Thumbnail




Optiv Surge Support

We provide expertise, staffing and technology to ensure immediate, short-term business continuity or to build inhouse expertise through ongoing security awareness training. With more than 350 industry certifications, our trained professionals can quickly resolve Tier 1, 2 and 3 technical support issues.


Remote Worker Education Thumbnail




Remote Worker Security Awareness

Remote work is increasingly common for a wide range of businesses. While telework can be extremely beneficial for companies and employees alike, it also opens to door to an array of cybersecurity risks. On this page we provide a series of videos aimed at informing workers and companies against common cyber threats.


Pandemic Implications Blog Thumbnail




COVID-19: Charting the Cybersecurity Implications of a Pandemic

This post is the first in a series designed to deliver cybersecurity strategies, best practices and advice to help address today’s unprecedented security challenges. Our hope is that these resources aid you in supporting and securing your business—wherever it may be in its security program maturity.


Caution Download Thumbnail




COVID-19: Overcoming an Abundance of Cybersecurity Caution

COVID-19 inflicts new security challenges on infrastructure capacity and traditional controls. The changes made since the outbreak spotlight resilience planning efforts. Many controls that can normally be enforced in internal network environments will shift to external networks and possibly unmanaged endpoints.


Securing WFH Thumbnail




COVID-19: Securing Work From Home

It’s important for CISOs to consider COVID ramifications on a larger scale and not lose sight of their organizational security roadmap. The factors influencing the decision-making process should be congruent with the organization's mid- and long-term objectives by executing on the existing roadmap.


Securing WFH Checklist Thumbnail




COVID-19: Securing Work From Home Checklist

We recommend employing proven strategies, like expanding what you currently have, creating alternative access methods and redesigning your cybersecurity program at scale. These steps, and the actionable technical steps outlined here, provide the foundational support needed to enable and secure a work from home model.


How Can We Help?