A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 625 - 636 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Want to be a Great Security Leader? You Need a Great Lawyer December 06, 2017 Information security continues to evolve as a profession, and this is certainly evident in the role that legislation, privacy, third-party risk and.... Read the Blog Image Blog The Risk of Cryptocurrencies December 05, 2017 Cryptocurrencies are a libertarian ideal: a monetary system outside the control of big government. The modern digital world provides the necessary.... Read the Blog Image Blog Five Steps to Ensuring a Successful Identity and Access Management Solution Deployment November 28, 2017 After endless cost-benefit meetings, business case rewrites and months of organizational readiness activities, your identity and access management.... Read the Blog Image Blog PCI Compliance Every Day – Requirement 5 November 19, 2017 In this latest post of my PCI compliance blog series, we will explore Requirement 5, which has four distinct requirements that imply they need to be.... Read the Blog Image Blog Five Steps to Preparing for a Successful Identity and Access Management Solution Deployment November 14, 2017 As adoption of the Internet of Things (IoT) continues at an incredible pace, organizations of all sizes are shifting away from traditional notions of.... Read the Blog Image Blog Can Your Organization Accept the Risk of Being First? November 13, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. For this year’s review, we constructed several use cases that would model.... Read the Blog Image Blog PCI Compliance Every Day – Requirement 10 November 12, 2017 When people think of PCI business as usual (BAU) they do not typically see the requirements in section 10 as having much of anything to do with BAU.... Read the Blog Image Blog Unmanaged PowerShell Binaries and Endpoint Protection November 09, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy.... Read the Blog Image Blog Third-Party Breaches Will Continue Until Morale Improves November 08, 2017 I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one.... Read the Blog Image Blog GDPR Part 3: GDPR and the Information Security Program November 06, 2017 In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security.... Read the Blog Image Blog Using Micro-Segmentation to Protect Your Data – Part 1 November 05, 2017 As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is.... Read the Blog Image Blog Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 49 Page 50 Page 51 Page 52 Current page 53 Page 54 Page 55 Page 56 Page 57 … Next page Next › Last page Last »
Image Blog Want to be a Great Security Leader? You Need a Great Lawyer December 06, 2017 Information security continues to evolve as a profession, and this is certainly evident in the role that legislation, privacy, third-party risk and....
Image Blog The Risk of Cryptocurrencies December 05, 2017 Cryptocurrencies are a libertarian ideal: a monetary system outside the control of big government. The modern digital world provides the necessary....
Image Blog Five Steps to Ensuring a Successful Identity and Access Management Solution Deployment November 28, 2017 After endless cost-benefit meetings, business case rewrites and months of organizational readiness activities, your identity and access management....
Image Blog PCI Compliance Every Day – Requirement 5 November 19, 2017 In this latest post of my PCI compliance blog series, we will explore Requirement 5, which has four distinct requirements that imply they need to be....
Image Blog Five Steps to Preparing for a Successful Identity and Access Management Solution Deployment November 14, 2017 As adoption of the Internet of Things (IoT) continues at an incredible pace, organizations of all sizes are shifting away from traditional notions of....
Image Blog Can Your Organization Accept the Risk of Being First? November 13, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. For this year’s review, we constructed several use cases that would model....
Image Blog PCI Compliance Every Day – Requirement 10 November 12, 2017 When people think of PCI business as usual (BAU) they do not typically see the requirements in section 10 as having much of anything to do with BAU....
Image Blog Unmanaged PowerShell Binaries and Endpoint Protection November 09, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy....
Image Blog Third-Party Breaches Will Continue Until Morale Improves November 08, 2017 I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one....
Image Blog GDPR Part 3: GDPR and the Information Security Program November 06, 2017 In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security....
Image Blog Using Micro-Segmentation to Protect Your Data – Part 1 November 05, 2017 As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is....
Image Blog Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and....