Skip to main content
Sort By:

2018 Cyber Threat Intelligence Estimate

Read Optiv's analysis of 2017 security themes in this Cyber Threat Intelligence Estimate report.

See Details

Security Program Foundation Assessment

Optiv’s complimentary Security Program Foundation Assessment helps you take inventory of your current technology and provides actionable next steps to...

See Details

Cloud Application Security Assessment

Optiv Cloud Application Security Assessment reduces security risks around your application’s cloud implementation. With a thorough analysis of the clo...

See Details

Application Security Program Management

Learn how to implement and maintain an effective AppSec program.

See Details

API Security Assessment

Optiv API Security Assessment reduces risk by ensuring all application APIs are thoroughly tested and secure.

See Details

Always On Penetration Testing

Optiv’s Always-On Penetration Testing provides clients with an imminent and guaranteed attack to keep network defenders ready to act and focused.

See Details

Who Moved My Governance

Your sensitive corporate data has been moved and without proper access control, it’s on the loose! How can you get it under control?

See Details

Breach Response Wargame

Optiv’s Breach Response Wargame will walk your organization through a step-by-step breach simulation utilizing real-time attacks.

See Details

Attack Service Management

Attack Surface Management goes beyond traditional vulnerability management to provide recommendations through offensive security services on which vul...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.