A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 37 - 48 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Cybersecurity Technology Investment Trends for a Resilient Business December 16, 2024 As the cyber threat landscape evolves, how are organizations making strategic technology investments to ensure resilience? Read the Blog Image Blog The Impact of Cloud Security Services on the Financial Sector, Health Industry and Critical Infrastructure December 12, 2024 Discover how cloud security services protect the financial, healthcare and infrastructure sectors from cyber threats, ensuring security posture and.... Read the Blog Image Blog Understanding a Zone-Based Incident Recovery Model December 05, 2024 Learn why the Zone-Based Incident Recovery Model is the accepted best practice for organizations to quickly recover from large-scale cyber incidents. Read the Blog Image Blog Updated Guidance for Entra ID Emergency Access Accounts (EAAs) December 05, 2024 Don’t get locked out of your M365 tenant in an emergency. Review our best practices for emergency access accounts in Entra ID. Read the Blog Image Blog KuppingerCole Names Optiv MDR on Google Security Operations Platform a 2024 Product Leader December 04, 2024 KuppingerCole Analysts named Optiv, on Google SecOps' platform, a Product Leader and Overall Challenger in its 2024 Managed Detection and Response.... Read the Blog Image Blog Managed Services: A Cybersecurity Shield for Every Industry November 25, 2024 Cyber threats are more prevalent than ever, posing significant risks to businesses across all industries. As a result, cyber insurance has become a.... Read the Blog Image Blog 6 Tips for a Successful Security Vendor Consolidation November 05, 2024 In the past, organizations didn’t give much thought to security vendor consolidation. However, recent economic conditions and increasing desires to.... Read the Blog Image Blog When Good Tools Do Bad Things: The Rising Threat of ‘Living Off the Land’ Cybersecurity Attacks November 04, 2024 As cybercriminals become increasingly adept at using legitimate tools for malicious purposes, organizations must prioritize advanced cybersecurity.... Read the Blog Image Blog Demystifying Managed Security Services: A Comprehensive Guide November 04, 2024 Discover how managed detection and response services bolster cybersecurity. This comprehensive guide explains the benefits and how to choose an MDR.... Read the Blog Image Blog Strengthening Governance and Leadership in Cybersecurity Transformations November 04, 2024 Organizations are enhancing governance activities to reduce cyber risk. Learn more about key leadership functions and investments to strengthen cyber.... Read the Blog Image Blog Evolving from Prevention to Response: A Real-World Imperative for Cyberspace Defense November 01, 2024 In today’s complex and rapidly evolving threat landscape, organizations are facing an uncomfortable truth: prevention alone is no longer enough to.... Read the Blog Image Blog The Future of Security Automation: How AI, Machine Learning and Automation Are on a Complementary Collision Course October 25, 2024 AI plays an increasingly central role in cybersecurity. Organizations that adopt AI-driven automation now will gain a significant advantage.... Read the Blog Pagination First page « First Previous page ‹ Previous Page 1 Page 2 Page 3 Current page 4 Page 5 Page 6 Page 7 Page 8 Page 9 … Next page Next › Last page Last »
Image Blog Cybersecurity Technology Investment Trends for a Resilient Business December 16, 2024 As the cyber threat landscape evolves, how are organizations making strategic technology investments to ensure resilience?
Image Blog The Impact of Cloud Security Services on the Financial Sector, Health Industry and Critical Infrastructure December 12, 2024 Discover how cloud security services protect the financial, healthcare and infrastructure sectors from cyber threats, ensuring security posture and....
Image Blog Understanding a Zone-Based Incident Recovery Model December 05, 2024 Learn why the Zone-Based Incident Recovery Model is the accepted best practice for organizations to quickly recover from large-scale cyber incidents.
Image Blog Updated Guidance for Entra ID Emergency Access Accounts (EAAs) December 05, 2024 Don’t get locked out of your M365 tenant in an emergency. Review our best practices for emergency access accounts in Entra ID.
Image Blog KuppingerCole Names Optiv MDR on Google Security Operations Platform a 2024 Product Leader December 04, 2024 KuppingerCole Analysts named Optiv, on Google SecOps' platform, a Product Leader and Overall Challenger in its 2024 Managed Detection and Response....
Image Blog Managed Services: A Cybersecurity Shield for Every Industry November 25, 2024 Cyber threats are more prevalent than ever, posing significant risks to businesses across all industries. As a result, cyber insurance has become a....
Image Blog 6 Tips for a Successful Security Vendor Consolidation November 05, 2024 In the past, organizations didn’t give much thought to security vendor consolidation. However, recent economic conditions and increasing desires to....
Image Blog When Good Tools Do Bad Things: The Rising Threat of ‘Living Off the Land’ Cybersecurity Attacks November 04, 2024 As cybercriminals become increasingly adept at using legitimate tools for malicious purposes, organizations must prioritize advanced cybersecurity....
Image Blog Demystifying Managed Security Services: A Comprehensive Guide November 04, 2024 Discover how managed detection and response services bolster cybersecurity. This comprehensive guide explains the benefits and how to choose an MDR....
Image Blog Strengthening Governance and Leadership in Cybersecurity Transformations November 04, 2024 Organizations are enhancing governance activities to reduce cyber risk. Learn more about key leadership functions and investments to strengthen cyber....
Image Blog Evolving from Prevention to Response: A Real-World Imperative for Cyberspace Defense November 01, 2024 In today’s complex and rapidly evolving threat landscape, organizations are facing an uncomfortable truth: prevention alone is no longer enough to....
Image Blog The Future of Security Automation: How AI, Machine Learning and Automation Are on a Complementary Collision Course October 25, 2024 AI plays an increasingly central role in cybersecurity. Organizations that adopt AI-driven automation now will gain a significant advantage....