Skip to main content
Sort By:

Risk Management and Transformation: Cyber Resilience

Optiv’s Cyber Resilience services offers everything you need to become – and remain – vigilant about your cyber security.

See Details

Risk Management and Transformation: Optimization

Optiv offers tools for security management and monitoring, virtual staffing, and KPIs to ensure your organization is operating at its optimal state.

See Details

Leading Global Retailer Selects Optiv to Optimize Resources and Reduce Risk

Optiv secures a rapidly growing number of employee credentials for leading global retailer.

See Details

Risk Management and Transformation: Privacy and Governance

Optiv’s Privacy and Governance service provides security assessments and strategy to build out your entire procedural framework.

See Details

Let’s Not Talk About the Past

With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you ...

See Details

Identity and Access Management: The Strategic Imperative

Optiv takes a strategic and holistic approach to IAM deployments to mitigate breach risk, meet compliance mandates, and enable digital transformation.

See Details

SecOps vs. DevOps in the Information Age

Information is varied and complex, involving many data types, structures, and protocols for different types of data sets. This increases challenges fo...

See Details

Tales from Trenches: What’s on Your Shelf?

Don’t you hate it when you forget something? Like when you take your kids on a hike and forget a snack, or take your dog for a walk and forget those-o...

See Details

Darknet Done Right

The marriage of a well-managed risk program and a targeted Darknet operation to move towards mitigation of risk is an ROI most mature companies have a...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.