Experiencing a Breach? Newsletter
Main Menu 2
    • Solutions
      • Application Security & Threat
      • AI Security
      • Cloud Security
      • Data Protection
      • Detection & Response
      • Identity Modernization
      • Remediation
      • Resiliency
      • Risk & Privacy
      • Securing Digital Transformation
      • Technology Consolidation
      • Zero Trust
    • Secure Business Outcomes
      • Build Resilience
      • Ensure Compliance
      • Maximize Effectiveness
      • Protect Your Business
    • Government Solutions
      • Optiv + ClearShark
      • Security Technology
      • Professional Services
      • Federal Contracts
    • Industry
      • Canada Operations
      • Healthcare
      • State, Local and Education (SLED)
    • Strategy
      • CMMC
      • Cyber Education
      • Cyber Fraud Strategy (Kill-Chain)
      • Cyber Recovery (CRS)
      • Cyber Strategy & Roadmap
      • Digital Transformation
      • Enterprise Resilience
      • Mergers & Acquisitions
      • SEC Disclosure Readiness
      • Security Maturity
      • Security Operations
      • Security Program Landscape
    • Infrastructure
      • Endpoint Security
      • IOT
      • Network Security
      • Operational Technology
      • Physical Security
    • Identity
      • Digital Access Management
      • Identity Advisory Services (Identity Services)
      • Identity Governance & Administration
      • Privileged Access Management
    • Technology Services
      • Authorized Support Program
      • NSAR
      • OTAV (Bake off)
      • SIEM Services
      • Technology Management
      • Technology Rationalization
    • Application Security
      • AppSec Advisory Services
      • AppSec Assessment
      • AppSec Technology Services
    • Managed Services
      • Co-Managed SIEM
      • Fusion Center/Next Gen SOC
      • Managed Detection and Response (MDR)
      • Managed PAM
      • Vulnerability Management
    • Threat
      • Attack & Penetration Testing
      • Attacker Simulation/Red & Purple Team
      • Incident Readiness
      • Incident Response
      • Ransomware
      • Remediation Services
      • Threat Intelligence
    • Risk
      • Compliance
      • Insider Risk Management
      • PCI DSS Compliance
      • Program Development
      • Risk Automation & Reporting
      • Third-Party Risk Management
    • Data Governance Privacy & Protection
      • Data Governance
      • Data Privacy
      • Data Protection
    • Transformation Services
      • Big Data, Analytics & Artificial Intelligence
      • Cloud Migration & Strategy
      • Connected Devices
      • Data Architecture Transformation (Data Fabric)
      • Orchestration & Automation
      • Software Development
    • View All Services
    • Technology Partners
      • Find a Partner
      • Partner Ecosystem
    • A Single Partner for Everything You Need

       

      With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface.

       

      Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.

    • Discover
      • Blog
      • CISO Periodic Table
      • Cybersecurity Dictionary
      • Downloads
      • Field Guides
      • LinkedIn Live Library
      • Newsletter
      • Videos
    • Source Zero
      • Blog
      • Tools
      • Videos
      • Source Zero Con 2023
    • Image
      Optiv-Ponemon Report 2024-list-image@2x.jpg
      2024 Cybersecurity Threat and Risk Management Report
      Optiv and Ponemon surveyed cybersecurity professionals on their prioritized governance and risk management practices. Read our findings.
      Download Now
      Image
      Security-map-list-image@2x.jpg
      Navigating the Security Technology Landscape
      Navigating the Security Technology Landscape: A Guide to Technologies and Providers white paper is a resource designed to help technology buyers achieve better, more specific security outcomes.
      Download Now
      Image
      future-trends-list-image
      A Visual Future of Cybersecurity
      This ebook looks at technologies and innovations that will affect cybersecurity in the coming years, including AI, quantum computing and IoT.
      Download Now
    • Information
      • About Us
      • Awards
      • Careers
      • Events
      • Executive Briefing Program
      • Leadership
      • Locations
      • Our Approach
      • Success Stories
    • In the News
      • Optiv Newsroom
    • ESG
      • Security and Protecting
      • Expanding Talent and Opportunity
      • Building Community
      • Optiv Chips In
    • We Are Optiv

       

      Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.

       

      However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.

  • Contact
  • Experiencing a Breach? Newsletter
  • Contact Us

Optiv Blog

Image
gen_blog_list_item

Five Steps to Ensuring a Successful Identity and Access Management Solution Deployment

November 28, 2017

After endless cost-benefit meetings, business case rewrites and months of organizational readiness activities, your identity and access management....

See Details

Blog

Image
gen_blog_list_item

PCI Compliance Every Day – Requirement 5

November 19, 2017

In this latest post of my PCI compliance blog series, we will explore Requirement 5, which has four distinct requirements that imply they need to be....

See Details

Blog

Image
gen_blog_list_item

Five Steps to Preparing for a Successful Identity and Access Management Solution Deployment

November 14, 2017

As adoption of the Internet of Things (IoT) continues at an incredible pace, organizations of all sizes are shifting away from traditional notions of....

See Details

Blog

Image
EndpointProtection_blog_list_item_476x210

Can Your Organization Accept the Risk of Being First?

November 13, 2017

Optiv recently completed our 2017 endpoint security solution evaluation. For this year’s review, we constructed several use cases that would model....

See Details

Blog

Image
gen_blog_list_item

PCI Compliance Every Day – Requirement 10

November 12, 2017

When people think of PCI business as usual (BAU) they do not typically see the requirements in section 10 as having much of anything to do with BAU....

See Details

Blog

Image
gen_blog_list_item

Unmanaged PowerShell Binaries and Endpoint Protection

November 09, 2017

Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy....

See Details

Blog

Image
gen_blog_list_item

Third-Party Breaches Will Continue Until Morale Improves

November 08, 2017

I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one....

See Details

Blog

Image
gen_blog_list_item

GDPR Part 3: GDPR and the Information Security Program

November 06, 2017

In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security....

See Details

Blog

Image
gen_blog_list_item

Using Micro-Segmentation to Protect Your Data – Part 1

November 05, 2017

As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is....

See Details

Blog

Image
gen_blog_list_item

Orchestration & Automation (O&A) Methodology

November 02, 2017

O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and....

See Details

Blog

Image
security_superheroes_list_476x210

A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau

November 01, 2017

“There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's....

See Details

Blog

Image
gen_blog_list_item

GDPR Part 2: The Six Information Security Pillars

October 30, 2017

In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security....

See Details

Blog

Pagination

  • First page « First
  • Previous page ‹ Previous
  • …
  • Page 48
  • Page 49
  • Page 50
  • Page 51
  • Current page 52
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • …
  • Next page Next ›
  • Last page Last »
Footer
  • Home
  • Solutions
  • Services
  • Partners
  • Insights
  • About Us
  • Careers

 

© 2020 – 2025. Optiv Security Inc. All Rights Reserved.  Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Compliance | Sitemap

Subscribe to Our Newsletter

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

Secure greatness®