A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 217 - 228 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part III: Oracle WebLogic February 23, 2023 Optiv's gTIC team provides a prioritized software and services list covering exploitation trends and vulnerabilities in Oracle WebLogic. Read the Blog Image Blog Introducing Optiv’s State of Cyber Governance Report February 17, 2023 Read about Optiv's first State of Cyber Governance Report, which shares industry-wide cyber trends, capabilities, and security technology investments. Read the Blog Image Blog Cybersecurity and Cyber Insurance Plans Belong in the Same Basket February 16, 2023 Cyber insurance is going through growing pains. Learn the top security controls you need to maintain coverage and the lowest premiums possible. Read the Blog Image Blog Natively Integrated Security for Palo Alto Networks Ecosystems Cloud Delivered Security Services (CDSS) February 13, 2023 Optiv shares what's new with Palo Alto Networks Cloud Delivered Security Services (CDSS), addressing enterprise and user-level best practices. Read the Blog Image Blog Moving to a Zero Trust Approach? Risk Management Can Help February 08, 2023 Zero Trust (ZT) and risk management go hand in hand. Taking a ZT approach can help you mature your security capabilities and reduce risk. Read the Blog Image Blog Diving Deeper Into Pre-created Computer Accounts February 06, 2023 Optiv's Source Zero team examines how resetting computer accounts can introduce backdoors and bypasses into an Active Directory environment. Read the Blog Image Blog Netskope Endpoint DLP Is Here! February 02, 2023 Netskope leads the industry with Data Loss Prevention (DLP) for managed and unmanaged SaaS apps. Read about their new endpoint DLP capabilities. Read the Blog Image Blog State of Ransomware: 2022 in Review February 01, 2023 Optiv's gTIC team provides a high-level overview of 2022 ransomware activities and trends, as well as mitigation strategies and 2023 predictions. Read the Blog Image Blog Introducing Varonis SaaS January 27, 2023 Varonis SaaS now delivers a familiar experience in a more streamlined, scalable way. Gain accelerated time to benefit and other advantages. Read the Blog Image Blog How to Balance the Zero Trust Journey with the Speed of the Mission January 25, 2023 A Zero Trust Framework is essential to face today's threat landscape. Optiv and Ping connect you to the technologies to best meet your Zero Trust.... Read the Blog Image Blog Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part II: Apache January 17, 2023 Optiv's gTIC team provides a prioritized software and services list that covers exploitation trends and vulnerabilities in popular Apache frameworks. Read the Blog Image Blog What’s New in PCI DSS 4.0? January 04, 2023 PCI DSS v4.0 shifts away from precise technical specifications and toward a broader, more progressive view of implementing security controls. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 15 Page 16 Page 17 Page 18 Current page 19 Page 20 Page 21 Page 22 Page 23 … Next page Next › Last page Last »
Image Blog Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part III: Oracle WebLogic February 23, 2023 Optiv's gTIC team provides a prioritized software and services list covering exploitation trends and vulnerabilities in Oracle WebLogic.
Image Blog Introducing Optiv’s State of Cyber Governance Report February 17, 2023 Read about Optiv's first State of Cyber Governance Report, which shares industry-wide cyber trends, capabilities, and security technology investments.
Image Blog Cybersecurity and Cyber Insurance Plans Belong in the Same Basket February 16, 2023 Cyber insurance is going through growing pains. Learn the top security controls you need to maintain coverage and the lowest premiums possible.
Image Blog Natively Integrated Security for Palo Alto Networks Ecosystems Cloud Delivered Security Services (CDSS) February 13, 2023 Optiv shares what's new with Palo Alto Networks Cloud Delivered Security Services (CDSS), addressing enterprise and user-level best practices.
Image Blog Moving to a Zero Trust Approach? Risk Management Can Help February 08, 2023 Zero Trust (ZT) and risk management go hand in hand. Taking a ZT approach can help you mature your security capabilities and reduce risk.
Image Blog Diving Deeper Into Pre-created Computer Accounts February 06, 2023 Optiv's Source Zero team examines how resetting computer accounts can introduce backdoors and bypasses into an Active Directory environment.
Image Blog Netskope Endpoint DLP Is Here! February 02, 2023 Netskope leads the industry with Data Loss Prevention (DLP) for managed and unmanaged SaaS apps. Read about their new endpoint DLP capabilities.
Image Blog State of Ransomware: 2022 in Review February 01, 2023 Optiv's gTIC team provides a high-level overview of 2022 ransomware activities and trends, as well as mitigation strategies and 2023 predictions.
Image Blog Introducing Varonis SaaS January 27, 2023 Varonis SaaS now delivers a familiar experience in a more streamlined, scalable way. Gain accelerated time to benefit and other advantages.
Image Blog How to Balance the Zero Trust Journey with the Speed of the Mission January 25, 2023 A Zero Trust Framework is essential to face today's threat landscape. Optiv and Ping connect you to the technologies to best meet your Zero Trust....
Image Blog Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part II: Apache January 17, 2023 Optiv's gTIC team provides a prioritized software and services list that covers exploitation trends and vulnerabilities in popular Apache frameworks.
Image Blog What’s New in PCI DSS 4.0? January 04, 2023 PCI DSS v4.0 shifts away from precise technical specifications and toward a broader, more progressive view of implementing security controls.