A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 277 - 288 of 786 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Redefinition of SASE July 29, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. Read the Blog Image Blog What’s In Your Cloud? July 28, 2022 Varonis DatAdvantage Cloud (DAC) ensures proper visibility into your cloud SaaS footprint. Optiv's assessments take DAC to the next level. Schedule.... Read the Blog Image Blog Beyond the Buzz: Building Cyber Resilience July 25, 2022 This post by James Turgal discusses the importance of cyber resilience and how to build it across people, processes and technology. Read the Blog Image Blog Finally, a Shift in Data Security Strategy Designed to Match the Real-World Threat Landscape July 20, 2022 In this blog post, Optiv partner Imperva outlines the function, benefits and "must haves" of a data security fabric solution. Read the Blog Image Blog New SEC Cybersecurity Rules Focus on Board Accountability July 18, 2022 This post covers a proposed rule set from the SEC that will require cybersecurity disclosures within mandated annual and quarterly reporting. Read the Blog Image Blog Cyber-Risk Quantification (CRQ): Lessons Learned July 18, 2022 Learn how to successfully implement cyber risk quantification from early adopters and industry surveys. Read the Blog Image Blog Taking Your Zero Trust Strategy to the Endpoint July 11, 2022 Organizations need to create Zero Trust policies and ensure they have quality endpoint management. Tanium services supported by Optiv will help. Read the Blog Image Blog Cyber Recovery Considerations: How to Keep the Lights On July 08, 2022 This post examines today's risky digital landscape and introduces a cyber recovery solution to help evolve traditional business continuity plans. Read the Blog Image Blog Bi-Partisan U.S. Federal Privacy Bill Gains Momentum July 01, 2022 This post discusses ADPAA, a federal law focused on consumer privacy rights that's progressed to a bipartisan draft with traction in Congress. Read the Blog Image Blog Russia/Ukraine Update - June 2022 June 30, 2022 Cyber attacks in the Russia-Ukraine conflict continue to mount. Get updates about WhisperGate, CaddyWiper and other exploits from Optiv's gTIC. Read the Blog Image Blog ISMG Optiv Interview: Cyber Recovery Solution June 17, 2022 In this ISMG interview at RSAC 2022, Optiv’s Jessica Hetrick discusses the meaning of cyber recovery. Read the Blog Image Blog ISMG Optiv Panel: Rationalizing Data Investments June 09, 2022 The more data you use, the more data you find you’ll need. This leads to hard decisions about what investments to make in data projects, technology.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 20 Page 21 Page 22 Page 23 Current page 24 Page 25 Page 26 Page 27 Page 28 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Redefinition of SASE July 29, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections.
Image Blog What’s In Your Cloud? July 28, 2022 Varonis DatAdvantage Cloud (DAC) ensures proper visibility into your cloud SaaS footprint. Optiv's assessments take DAC to the next level. Schedule....
Image Blog Beyond the Buzz: Building Cyber Resilience July 25, 2022 This post by James Turgal discusses the importance of cyber resilience and how to build it across people, processes and technology.
Image Blog Finally, a Shift in Data Security Strategy Designed to Match the Real-World Threat Landscape July 20, 2022 In this blog post, Optiv partner Imperva outlines the function, benefits and "must haves" of a data security fabric solution.
Image Blog New SEC Cybersecurity Rules Focus on Board Accountability July 18, 2022 This post covers a proposed rule set from the SEC that will require cybersecurity disclosures within mandated annual and quarterly reporting.
Image Blog Cyber-Risk Quantification (CRQ): Lessons Learned July 18, 2022 Learn how to successfully implement cyber risk quantification from early adopters and industry surveys.
Image Blog Taking Your Zero Trust Strategy to the Endpoint July 11, 2022 Organizations need to create Zero Trust policies and ensure they have quality endpoint management. Tanium services supported by Optiv will help.
Image Blog Cyber Recovery Considerations: How to Keep the Lights On July 08, 2022 This post examines today's risky digital landscape and introduces a cyber recovery solution to help evolve traditional business continuity plans.
Image Blog Bi-Partisan U.S. Federal Privacy Bill Gains Momentum July 01, 2022 This post discusses ADPAA, a federal law focused on consumer privacy rights that's progressed to a bipartisan draft with traction in Congress.
Image Blog Russia/Ukraine Update - June 2022 June 30, 2022 Cyber attacks in the Russia-Ukraine conflict continue to mount. Get updates about WhisperGate, CaddyWiper and other exploits from Optiv's gTIC.
Image Blog ISMG Optiv Interview: Cyber Recovery Solution June 17, 2022 In this ISMG interview at RSAC 2022, Optiv’s Jessica Hetrick discusses the meaning of cyber recovery.
Image Blog ISMG Optiv Panel: Rationalizing Data Investments June 09, 2022 The more data you use, the more data you find you’ll need. This leads to hard decisions about what investments to make in data projects, technology....