What Can We Help You Find?
What Can We Help You Find?

May 15, 2019
From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital....
Blog

May 14, 2019
There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often....
Blog

May 09, 2019
Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses....
Blog

May 08, 2019
From privacy to identity to work-life flow — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital Identity and Data....
Blog

May 07, 2019
Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be....
Blog

May 02, 2019
Optiv Data Solutions for Business and Security provides day-zero integration of platforms and services, quickly enabling clients to focus on the...
Download

May 01, 2019
With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to....
Blog

April 30, 2019
A leading management consulting firm needed to create a unified platform in the cloud to increase performance at scale.
Download

April 30, 2019
Our Privileged Access Managed Service is for organizations short on resources for managing their PAM environments.
Download

April 25, 2019
Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be....
Blog

April 17, 2019
Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP....
Blog

April 16, 2019
Optiv’s Managed Security Services provides you with cost effective approach to remotely secure your environment.
Download