A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image A Visual Landscape of Cybersecurity February 10, 2022 Today’s cyber world is more complex than ever, but some of us thrive on navigating it and turning complexities into advantages. In the spirit of... See Details Download Image Optiv’s Privileged Access Management Services February 07, 2022 Optiv's PAM services provide solutions for privileged access and roll out of industry-proven programs. See Details Download Image InfoSec Fusion and Cyber Resilience February 04, 2022 Divergent security practices (governance, risk, compliance, appsec, network ops, IAM, etc.) can work together to safeguard organizations. See Details Download Image Optiv Assists Federal Agency in PAM Journey February 03, 2022 Optiv helped a federal agency with privileged access management and identity and access management strategies. See Details Download Image Financial Services Ransomware Runbook February 01, 2022 This runbook provides a plan for responding to ransomware, based on our real-world experience. See Details Download Image Optiv Managed Extended Detection and Response (MXDR) February 01, 2022 Optiv MXDR combines intelligence, expertise, advanced automation, and technology to secure your environment globally. See Details Download Image Security Operations: Managed Endpoint Detection and Response (MEDR) Windows Defender January 31, 2022 Optiv’s Managed Endpoint Detection and Response solution augments detection and leverages Microsoft Defender for Endpoint. See Details Download Image Cultivate Technology Adoption With Organizational Change Management January 28, 2022 Process or technology changes can lead to friction. Optiv’s OCM aligns stakeholders for optimal benefits. See Details Download Image Zero Trust Strategies for 2022 Report January 28, 2022 This report from ISMG, Palo Alto Networks and Optiv reveals and discusses Zero Trust insights for 2022. See Details Download Image Data Protection Strategy January 13, 2022 Optimize your data protection stack from inception to production. Our holistic approach breaks issues into simpler pieces and solves them one by one. See Details Download Image Insider Risk Fabric January 12, 2022 Optiv’s end-to-end insider risk fabric approach to risk management leverages PRIs and uses proprietary logic custom-built for industry verticals and... See Details Download Image Optiv HashiCorp Vault Acceleration Program January 10, 2022 Deploy and adopt HashiCorp’s secrets management tool faster and smoother with our Vault Acceleration Program. See Details Download Pagination First page « First Previous page ‹ Previous … Page 21 Page 22 Page 23 Page 24 Current page 25 Page 26 Page 27 Page 28 Page 29 … Next page Next › Last page Last »
Image A Visual Landscape of Cybersecurity February 10, 2022 Today’s cyber world is more complex than ever, but some of us thrive on navigating it and turning complexities into advantages. In the spirit of... See Details Download
Image Optiv’s Privileged Access Management Services February 07, 2022 Optiv's PAM services provide solutions for privileged access and roll out of industry-proven programs. See Details Download
Image InfoSec Fusion and Cyber Resilience February 04, 2022 Divergent security practices (governance, risk, compliance, appsec, network ops, IAM, etc.) can work together to safeguard organizations. See Details Download
Image Optiv Assists Federal Agency in PAM Journey February 03, 2022 Optiv helped a federal agency with privileged access management and identity and access management strategies. See Details Download
Image Financial Services Ransomware Runbook February 01, 2022 This runbook provides a plan for responding to ransomware, based on our real-world experience. See Details Download
Image Optiv Managed Extended Detection and Response (MXDR) February 01, 2022 Optiv MXDR combines intelligence, expertise, advanced automation, and technology to secure your environment globally. See Details Download
Image Security Operations: Managed Endpoint Detection and Response (MEDR) Windows Defender January 31, 2022 Optiv’s Managed Endpoint Detection and Response solution augments detection and leverages Microsoft Defender for Endpoint. See Details Download
Image Cultivate Technology Adoption With Organizational Change Management January 28, 2022 Process or technology changes can lead to friction. Optiv’s OCM aligns stakeholders for optimal benefits. See Details Download
Image Zero Trust Strategies for 2022 Report January 28, 2022 This report from ISMG, Palo Alto Networks and Optiv reveals and discusses Zero Trust insights for 2022. See Details Download
Image Data Protection Strategy January 13, 2022 Optimize your data protection stack from inception to production. Our holistic approach breaks issues into simpler pieces and solves them one by one. See Details Download
Image Insider Risk Fabric January 12, 2022 Optiv’s end-to-end insider risk fabric approach to risk management leverages PRIs and uses proprietary logic custom-built for industry verticals and... See Details Download
Image Optiv HashiCorp Vault Acceleration Program January 10, 2022 Deploy and adopt HashiCorp’s secrets management tool faster and smoother with our Vault Acceleration Program. See Details Download