Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
March 22, 2021
MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability.
March 18, 2021
Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence.
March 16, 2021
Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future.
March 10, 2021
Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack.
February 26, 2021
Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages.
February 19, 2021
Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community.
February 18, 2021
Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure.
February 17, 2021
Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks.
February 10, 2021
Concerned about the recent Florida water system hack? We can help assess and secure your IoT and OT infrastructure.
February 04, 2021
This post addresses key areas organizations should evaluate when reviewing or building out third-party risk management programs.
February 03, 2021
Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote.
February 02, 2021
This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product.