Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Benefits and ROI of IT Security Compliance November 04, 2022 IT and regulatory compliance are necessary to ensure your organization meets the standards for data privacy and security that apply to your industry.... See Details Blog Image AMaaS: Managing the New Perimeter November 01, 2022 Access Management as a Service (AMaaS) addresses the challenges created by remote work and evolving threats. Let our ACT team help with your AM.... See Details Blog Image Optiv Wins a CRN 2022 IoT Innovators Award October 31, 2022 Optiv was named a winner in CRN’s 2022 IoT Innovators Awards for developing innovative IoT solutions and driving effective client implementation. See Details Blog Image Help is on the Way: How Automation Will Boost SOC Performance and Reduce Analyst Burnout October 28, 2022 OC Automation boosts performance and reduces analyst burnout. Learn how our partnership with Devo using AI can automate your SOC. See Details Blog Image Russia/Ukraine Update - September 2022 October 26, 2022 As cyber warfare from the Russia – Ukraine conflict continues, Optiv’s gTIC provides information on timely events and what to expect looking forward. See Details Blog Image Exploiting RCE Vulnerability in Dompdf October 24, 2022 Dompdf versions 1.2.0 are vulnerable to RCE attacks. Web applications that use the dompdf library for pdf generation and reference the remote CSS file.... See Details Blog Image Secure Your Resilience October 21, 2022 Traditional business continuity and disaster recovery plans don't address cyberattacks. Learn how to shore up your cyber resilience during CAM 2022. See Details Blog Image Finding a Life Raft in the Shifting Tides of Cyber Insurance October 18, 2022 Cyber insurance market trends indicate that some cyber risks may not be insurable, especially from extreme events. Learn how the industry is adapting. See Details Blog Image Advanced Persistent Threat (APT) Groups: Boogeyman or Well-Funded Cybercriminal? October 17, 2022 Advanced Persistent Threat Groups are an insidious class of hackers. They have an agenda and are willing to wait, often a long time, before striking.... See Details Blog Image Secure Your Password October 17, 2022 Good password hygiene is a vital security practice. Learn password best practices and other security tips during CAM 2022 from Optiv. See Details Blog Image Secure Your Business: Justifying Cybersecurity Investments in a Stormy Economy October 12, 2022 Optiv subject matter experts discuss rationalizing technology and securing your business in uncertain economic times. See Details Blog Image How to Rationalize Cybersecurity Tools in Turbulent Times October 07, 2022 Amid a strained economy, businesses everywhere are tightening their belts and working to ensure that priority programs and critical infrastructure are.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 2 Page 3 Page 4 Page 5 Current page 6 Page 7 Page 8 Page 9 Page 10 … Next page Next › Last page Last »
Image Benefits and ROI of IT Security Compliance November 04, 2022 IT and regulatory compliance are necessary to ensure your organization meets the standards for data privacy and security that apply to your industry.... See Details Blog
Image AMaaS: Managing the New Perimeter November 01, 2022 Access Management as a Service (AMaaS) addresses the challenges created by remote work and evolving threats. Let our ACT team help with your AM.... See Details Blog
Image Optiv Wins a CRN 2022 IoT Innovators Award October 31, 2022 Optiv was named a winner in CRN’s 2022 IoT Innovators Awards for developing innovative IoT solutions and driving effective client implementation. See Details Blog
Image Help is on the Way: How Automation Will Boost SOC Performance and Reduce Analyst Burnout October 28, 2022 OC Automation boosts performance and reduces analyst burnout. Learn how our partnership with Devo using AI can automate your SOC. See Details Blog
Image Russia/Ukraine Update - September 2022 October 26, 2022 As cyber warfare from the Russia – Ukraine conflict continues, Optiv’s gTIC provides information on timely events and what to expect looking forward. See Details Blog
Image Exploiting RCE Vulnerability in Dompdf October 24, 2022 Dompdf versions 1.2.0 are vulnerable to RCE attacks. Web applications that use the dompdf library for pdf generation and reference the remote CSS file.... See Details Blog
Image Secure Your Resilience October 21, 2022 Traditional business continuity and disaster recovery plans don't address cyberattacks. Learn how to shore up your cyber resilience during CAM 2022. See Details Blog
Image Finding a Life Raft in the Shifting Tides of Cyber Insurance October 18, 2022 Cyber insurance market trends indicate that some cyber risks may not be insurable, especially from extreme events. Learn how the industry is adapting. See Details Blog
Image Advanced Persistent Threat (APT) Groups: Boogeyman or Well-Funded Cybercriminal? October 17, 2022 Advanced Persistent Threat Groups are an insidious class of hackers. They have an agenda and are willing to wait, often a long time, before striking.... See Details Blog
Image Secure Your Password October 17, 2022 Good password hygiene is a vital security practice. Learn password best practices and other security tips during CAM 2022 from Optiv. See Details Blog
Image Secure Your Business: Justifying Cybersecurity Investments in a Stormy Economy October 12, 2022 Optiv subject matter experts discuss rationalizing technology and securing your business in uncertain economic times. See Details Blog
Image How to Rationalize Cybersecurity Tools in Turbulent Times October 07, 2022 Amid a strained economy, businesses everywhere are tightening their belts and working to ensure that priority programs and critical infrastructure are.... See Details Blog