A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 229 - 240 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Leveraging Zero Trust Solution to Ensure Users Have Access to the Right Resources January 04, 2023 A Zero Trust Framework is essential to face today's threat landscape. Optiv and Ping connect you to the technologies to best meet your Zero Trust.... Read the Blog Image Blog Russia/Ukraine Update - December 2022 December 20, 2022 Optiv's December Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay.... Read the Blog Image Blog Making a Positive Impact Where It Counts: 2022 Optiv Chips In Year in Review December 20, 2022 Optiv Chips In is corporate volunteerism in action. We feed families in need, provide support to at-risk teens and sponsor STEM projects in.... Read the Blog Image Blog Solving Metaverse Vulnerabilities and Threats is No Piece of Cake December 15, 2022 Metaverse security concerns are increasing. Variations have been in use for decades in commerce and threat actors have its valuable targets in their.... Read the Blog Image Blog Shift Left(er) December 07, 2022 Shift Left Security focuses on the SDLC process. Shifting further left, where security is part of corporate culture, is critical with increasing cyber.... Read the Blog Image Blog The Clock is Ticking: Is Your Organization Cyber Secure for the Holidays? December 05, 2022 Our Holiday Cybersecurity Tips will help secure your enterprise during this vulnerable season because threat actors don't take holidays. Learn how to.... Read the Blog Image Blog Russia/Ukraine Update - November 2022 November 29, 2022 Optiv's November Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay.... Read the Blog Image Blog Your ‘Forgotten Things’ Are Making You Vulnerable to Cyber Threats November 22, 2022 The Internet of Forgotten Things (IoFT) can leave you exposed. Overlooked devices like old servers or connected medical devices can pose cybersecurity.... Read the Blog Image Blog Sensitive Data in Salesforce? November 18, 2022 In this post we provide details on the Varonis DatAdvantage Cloud platform’s capabilities. We'll cover items such as user activity auditing, identity.... Read the Blog Image Blog Managing Netskope Private Access Using Terraform November 17, 2022 With the release of the Netskope Terraform provider, complete end to end management of publishers and private applications can be integrated into an.... Read the Blog Image Blog Identity Orchestration: Design Seamless End-to-End Digital Experiences November 17, 2022 Identity Orchestration from Ping, in partnership with Optiv, seamlessly weaves together services and applications in a Zero Trust architecture. Learn.... Read the Blog Image Blog A Crossroads for Cyber Insurance: Are You Really Covered? November 16, 2022 Lloyd’s of London’s recent bulletin announced state-sponsored attacks = not covered. If the insurance industry stops covering these, where does this.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 16 Page 17 Page 18 Page 19 Current page 20 Page 21 Page 22 Page 23 Page 24 … Next page Next › Last page Last »
Image Blog Leveraging Zero Trust Solution to Ensure Users Have Access to the Right Resources January 04, 2023 A Zero Trust Framework is essential to face today's threat landscape. Optiv and Ping connect you to the technologies to best meet your Zero Trust....
Image Blog Russia/Ukraine Update - December 2022 December 20, 2022 Optiv's December Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay....
Image Blog Making a Positive Impact Where It Counts: 2022 Optiv Chips In Year in Review December 20, 2022 Optiv Chips In is corporate volunteerism in action. We feed families in need, provide support to at-risk teens and sponsor STEM projects in....
Image Blog Solving Metaverse Vulnerabilities and Threats is No Piece of Cake December 15, 2022 Metaverse security concerns are increasing. Variations have been in use for decades in commerce and threat actors have its valuable targets in their....
Image Blog Shift Left(er) December 07, 2022 Shift Left Security focuses on the SDLC process. Shifting further left, where security is part of corporate culture, is critical with increasing cyber....
Image Blog The Clock is Ticking: Is Your Organization Cyber Secure for the Holidays? December 05, 2022 Our Holiday Cybersecurity Tips will help secure your enterprise during this vulnerable season because threat actors don't take holidays. Learn how to....
Image Blog Russia/Ukraine Update - November 2022 November 29, 2022 Optiv's November Russia-Ukraine cyber warfare update explores the expansion and evolution of cyberattacks as threat actors begin taking sides. Stay....
Image Blog Your ‘Forgotten Things’ Are Making You Vulnerable to Cyber Threats November 22, 2022 The Internet of Forgotten Things (IoFT) can leave you exposed. Overlooked devices like old servers or connected medical devices can pose cybersecurity....
Image Blog Sensitive Data in Salesforce? November 18, 2022 In this post we provide details on the Varonis DatAdvantage Cloud platform’s capabilities. We'll cover items such as user activity auditing, identity....
Image Blog Managing Netskope Private Access Using Terraform November 17, 2022 With the release of the Netskope Terraform provider, complete end to end management of publishers and private applications can be integrated into an....
Image Blog Identity Orchestration: Design Seamless End-to-End Digital Experiences November 17, 2022 Identity Orchestration from Ping, in partnership with Optiv, seamlessly weaves together services and applications in a Zero Trust architecture. Learn....
Image Blog A Crossroads for Cyber Insurance: Are You Really Covered? November 16, 2022 Lloyd’s of London’s recent bulletin announced state-sponsored attacks = not covered. If the insurance industry stops covering these, where does this....