Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Integrated Threat Management: Activities to Boost Your Security Posture August 18, 2022 This post illustrates how the integration of multiple threat management activities can be incorporated into a comprehensive risk strategy. See Details Blog Image Deploying IaC Securely, and the Risks of an Insecure Template August 05, 2022 Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to.... See Details Blog Image The Ripples of Executive Order 14028: 5 Questions Your Board Should Be Asking Now August 03, 2022 EO 14028 seeks to ensure American critical infrastructure is protected with robust cybersecurity practices. Is your board prepared? See Details Blog Image 2022 Cybersecurity & Resilience Guide August 01, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. See Details Blog Image Redefinition of SASE July 29, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. See Details Blog Image What’s In Your Cloud? July 28, 2022 Varonis DatAdvantage Cloud (DAC) ensures proper visibility into your cloud SaaS footprint. Optiv's assessments take DAC to the next level. Schedule.... See Details Blog Image Beyond the Buzz: Building Cyber Resilience July 25, 2022 This post by James Turgal discusses the importance of cyber resilience and how to build it across people, processes and technology. See Details Blog Image gTIC Prioritized List + MITRE Tactics July 21, 2022 Optiv's® Global Threat Intelligence Center (gTIC) observed, collected, and analyzed multiple data points and information derived from Optiv's own.... See Details Blog Image Finally, a Shift in Data Security Strategy Designed to Match the Real-World Threat Landscape July 20, 2022 In this blog post, Optiv partner Imperva outlines the function, benefits and "must haves" of a data security fabric solution. See Details Blog Image New SEC Cybersecurity Rules Focus on Board Accountability July 18, 2022 This post covers a proposed rule set from the SEC that will require cybersecurity disclosures within mandated annual and quarterly reporting. See Details Blog Image Cyber-Risk Quantification (CRQ): Lessons Learned July 18, 2022 Learn how to successfully implement cyber risk quantification from early adopters and industry surveys. See Details Blog Image Optiv Future Point Explores Future Tech Pain Points and Solutions July 14, 2022 Optiv's Future Point is an unique initiative to explore tech pain points and solutions from our suite & that of our partners to secure your business. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 4 Page 5 Page 6 Page 7 Current page 8 Page 9 Page 10 Page 11 Page 12 … Next page Next › Last page Last »
Image Integrated Threat Management: Activities to Boost Your Security Posture August 18, 2022 This post illustrates how the integration of multiple threat management activities can be incorporated into a comprehensive risk strategy. See Details Blog
Image Deploying IaC Securely, and the Risks of an Insecure Template August 05, 2022 Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to.... See Details Blog
Image The Ripples of Executive Order 14028: 5 Questions Your Board Should Be Asking Now August 03, 2022 EO 14028 seeks to ensure American critical infrastructure is protected with robust cybersecurity practices. Is your board prepared? See Details Blog
Image 2022 Cybersecurity & Resilience Guide August 01, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. See Details Blog
Image Redefinition of SASE July 29, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. See Details Blog
Image What’s In Your Cloud? July 28, 2022 Varonis DatAdvantage Cloud (DAC) ensures proper visibility into your cloud SaaS footprint. Optiv's assessments take DAC to the next level. Schedule.... See Details Blog
Image Beyond the Buzz: Building Cyber Resilience July 25, 2022 This post by James Turgal discusses the importance of cyber resilience and how to build it across people, processes and technology. See Details Blog
Image gTIC Prioritized List + MITRE Tactics July 21, 2022 Optiv's® Global Threat Intelligence Center (gTIC) observed, collected, and analyzed multiple data points and information derived from Optiv's own.... See Details Blog
Image Finally, a Shift in Data Security Strategy Designed to Match the Real-World Threat Landscape July 20, 2022 In this blog post, Optiv partner Imperva outlines the function, benefits and "must haves" of a data security fabric solution. See Details Blog
Image New SEC Cybersecurity Rules Focus on Board Accountability July 18, 2022 This post covers a proposed rule set from the SEC that will require cybersecurity disclosures within mandated annual and quarterly reporting. See Details Blog
Image Cyber-Risk Quantification (CRQ): Lessons Learned July 18, 2022 Learn how to successfully implement cyber risk quantification from early adopters and industry surveys. See Details Blog
Image Optiv Future Point Explores Future Tech Pain Points and Solutions July 14, 2022 Optiv's Future Point is an unique initiative to explore tech pain points and solutions from our suite & that of our partners to secure your business. See Details Blog