Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
October 04, 2021
In this guest post, Kane Lightowler of Palo Alto Networks offers five key steps to deploying effective attack surface management with Zero Trust.
September 29, 2021
Embedded cybersecurity aligns business and technical imperatives and makes clear how they will interact in a fully integrated risk footing.
September 20, 2021
The first step on the Zero Trust journey is identity.
September 12, 2021
Hackers are clever and are always innovating new ways to breach cybersecurity defenses, so no single tactic is likely to afford 100% protection. But....
September 01, 2021
It’s National Cybersecurity Awareness Month – #NCSAM. So what do dodgeball and #phishing have in common? Here are the five Ds of dodgeball and the....
The latest threat detection/response iteration – managed extended detection and response (MXDR) incorporates the strengths of previous offerings.
August 26, 2021
This post overviews the Varonis DatAlert Suite, its capabilities and how it stacks on top of the core Varonis Data Security Platform.
August 17, 2021
Tenable’s Derek Melber explains why security teams should secure existing hardware, operating systems, applications, software and Active Directory.
We leveraged Microsoft’s OAuth authorization flow for a phishing attack. Here’s step-by-step guidance on how to conduct it for security assessment.
August 13, 2021
Few organizations know how to secure cloud data. Visibility, discovery and classification drives costs down while improving the customer experience.
August 12, 2021
Optiv researcher Dan Kiraly examines automated endpoint evaluations in the first technical video of a series.
August 10, 2021
Multiple CVEs involving Active Directory Certificate Services and a new NTLM relay attack can be chained to compromise an Active Directory domain.