A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary SOC 2 What is SOC 2? Developed by the American Institute of Certified Public Accountants (AICPA), SOC 2 requires establishment and adherence to policies and procedures surrounding the security, availability, processing, integrity and confidentiality of customer data. More specifically, SOC 2 ensures that cybersecurity measures reflect up-to-date cloud requirements. SOC 2 evaluates organizations on five “trust service principles”: Security – Does the system safeguard against unauthorized access? Availability – Is the system (including its products and services) accessible to users? Processing Integrity – In essence, does the system work? Does it “deliver the right content to the right person at the right time”? Confidentiality – Does the system assure data is accessible only to authorized parties? Privacy – Does the system rigorously safeguard and govern the collection, use, retention, disclosure and disposal of personally identifiable information (PII)? Image Related Services Data Privacy Data Protection Data Governance Cloud Security Share: Contact Us