Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary
Network traffic analysis (NTA) and network behavior analysis (NBA) are fairly similar terms that describe technologies that use advanced analytics, machine learning and rule-based techniques to detect suspicious activity on enterprise networks.
NTA tools analyze raw traffic and/or flow records (for example, NetFlow), build models that reflect normal behavior of devices and users who generate traffic over that network, and trigger alerts when network traffic deviates from the normal baseline. NetFlow-type data only indicates which devices are communicating over the network and the volume of their conversations. This data is generally considered to be lower fidelity compared to the raw traffic (the actual content of the conversations themselves). Unfortunately, the raw traffic is increasingly being encrypted, even within the enterprise network. Therefore, network analytics often requires the systems to decrypt ubiquitous SSL/TLS protocols to conduct analysis without the security of the underlying data being compromised. Network analysis tools can be used to monitor both north-south traffic on an enterprise network as well as east-west traffic (sometimes called lateral communications) between systems in a data center.
March 21, 2019
Learn how billions of dollars are being invested in ML for data analysis to improve decision-making or customer satisfaction.
September 21, 2018
The enemy gets a vote. The current Secretary of Defense and retired Marine Corps General James Mattis is fond of this observation. However, in many....