A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Showing 409 - 420 of 588 results Search Terms Type Type of DownloadArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By Sort by LatestSort by Oldest Image White Paper Cybersecurity Maturity Model Certification (CMMC) February 16, 2021 Our Cybersecurity Maturity Model Certification guides you through business growth, regulatory and contract compliance and operational considerations. See Details Image Service Brief Risk Management Transformation Service January 26, 2021 Our Focused Cyber Risk Strategy Development engagement includes a range of services, including risk, privacy, compliance and vulnerability management. See Details Image Service Brief PCI DSS Report on Compliance (ROC) Completion January 06, 2021 Our team assesses your cardholder data environment against PCI DSS, completes your Report on Compliance and outlines the status for all control areas. See Details Image Service Brief Security Operations: Digital Risk Protection Management December 21, 2020 Our efficient, tailored threat intelligence gathering process provides actionable information to drive an improved security posture. See Details Image Brochure and eBook 2020 Optiv Yearbook December 07, 2020 2020 – where do we begin?! While people across the globe experienced arguably the most disruptive and stressful global crisis of their lives, we also... See Details Image Infographic COVID-19 Timeline November 12, 2020 From the abrupt WFH shift to hordes of opportunistic attackers, COVID-19’s deep cybersecurity impact has been unprecedented. This timeline (it’s... See Details Image Service Brief Cybersecurity Awareness Month: IoT's Future Is So Bright We Have to Wear a Welder’s Mask October 26, 2020 IoT is everywhere. Everywhere. Fear not. Here’s how we secured them. See Details Image Service Brief Risk Management and Transformation: Fully Managed Third Party Risk October 22, 2020 Our third-party risk management service mitigates risk by assessing relationships, business profile, cyber and control risk. See Details Image Service Brief Cybersecurity Awareness Month: Securing Internet-Connected Devices in Healthcare October 19, 2020 We understand that your care needs to be reliable and private, and part of that care depends upon technology. See Details Image Infographic COVID-19: Cybersecurity in Action October 19, 2020 Use our new tool to navigate the ruckus COVID-19 has brought into your world and learn what to do to achieve a resilient cybersecurity strategy. See Details Image Service Brief Threat Management: Enterprise Password Audit October 15, 2020 Our enterprise password audit collects, processes and assesses the primary user account database while leveraging multiple industry standards. See Details Image Service Brief Threat Management: Endpoint Security Assessment October 14, 2020 Our endpoint assessment addresses each step of the attack lifecycle, from payload delivery to data exfiltration. See Details Pagination First page « First Previous page ‹ Previous … Page 31 Page 32 Page 33 Page 34 Page 35 Page 36 Page 37 Page 38 Page 39 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image White Paper Cybersecurity Maturity Model Certification (CMMC) February 16, 2021 Our Cybersecurity Maturity Model Certification guides you through business growth, regulatory and contract compliance and operational considerations.
Image Service Brief Risk Management Transformation Service January 26, 2021 Our Focused Cyber Risk Strategy Development engagement includes a range of services, including risk, privacy, compliance and vulnerability management.
Image Service Brief PCI DSS Report on Compliance (ROC) Completion January 06, 2021 Our team assesses your cardholder data environment against PCI DSS, completes your Report on Compliance and outlines the status for all control areas.
Image Service Brief Security Operations: Digital Risk Protection Management December 21, 2020 Our efficient, tailored threat intelligence gathering process provides actionable information to drive an improved security posture.
Image Brochure and eBook 2020 Optiv Yearbook December 07, 2020 2020 – where do we begin?! While people across the globe experienced arguably the most disruptive and stressful global crisis of their lives, we also...
Image Infographic COVID-19 Timeline November 12, 2020 From the abrupt WFH shift to hordes of opportunistic attackers, COVID-19’s deep cybersecurity impact has been unprecedented. This timeline (it’s...
Image Service Brief Cybersecurity Awareness Month: IoT's Future Is So Bright We Have to Wear a Welder’s Mask October 26, 2020 IoT is everywhere. Everywhere. Fear not. Here’s how we secured them.
Image Service Brief Risk Management and Transformation: Fully Managed Third Party Risk October 22, 2020 Our third-party risk management service mitigates risk by assessing relationships, business profile, cyber and control risk.
Image Service Brief Cybersecurity Awareness Month: Securing Internet-Connected Devices in Healthcare October 19, 2020 We understand that your care needs to be reliable and private, and part of that care depends upon technology.
Image Infographic COVID-19: Cybersecurity in Action October 19, 2020 Use our new tool to navigate the ruckus COVID-19 has brought into your world and learn what to do to achieve a resilient cybersecurity strategy.
Image Service Brief Threat Management: Enterprise Password Audit October 15, 2020 Our enterprise password audit collects, processes and assesses the primary user account database while leveraging multiple industry standards.
Image Service Brief Threat Management: Endpoint Security Assessment October 14, 2020 Our endpoint assessment addresses each step of the attack lifecycle, from payload delivery to data exfiltration.