A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image IDM Assessment Service Brief November 06, 2019 Optiv’s IDM Assessment offerings align programs and deployments with business goals and best practices. See Details Download Image Optiv Services Overview October 31, 2019 We optimize and rationalize existing security programs to transform how you procure, consume, integrate, implement and operationalize cybersecurity. See Details Download Image IaaS Security - AWS Native and Third-Party Tools Executive Summary October 11, 2019 This paper helps AWS users with Amazon, Palo Alto Networks and Tenable cloud infrastructure assessment tools. See Details Download Image CDX Orchestration and Automation Service Brief October 09, 2019 Orchestrate and automate technologies, processes and people to run a successful IT and security operation. See Details Download Image IaaS Security - AWS Native and Third-Party Tools October 09, 2019 Many tools are available to assist customers responsible for their own “security in the cloud.” See Details Download Image CDX Analytics and Big Data Service Brief October 09, 2019 Get real-time value extraction from secured data. See Details Download Image Is your cybersecurity tech stack creating more gaps? September 30, 2019 Explore this e-book to learn how to achieve the right level of protection, technology and controls to align security with business initiatives. See Details Download Image Frost & Sullivan Customer Service Leadership Award for Healthcare Managed Cybersecurity Services September 30, 2019 Optiv receives the Customer Service Leadership Award for Healthcare Managed Cybersecurity Services from Frost & Sullivan. See Details Download Image The State of the CISO September 20, 2019 More sophisticated organizations understand the importance of security in reducing organizational risk and maintaining brand value. See Details Download Image 2019 Cyber Threat Intelligence Estimate September 20, 2019 The best-practice recommendations in this report are practical next steps that help immediately improve cybersecurity posture. See Details Download Image NCSAM: Protective Behaviors September 13, 2019 National Cybersecurity Awareness Month stresses keeping software and apps updated, using secure wi-fi and protecting collected. See Details Download Image NCSAM: Personal Accountability September 12, 2019 Workers should be aware of social media safety, privacy settings and mobile application security. See Details Download Pagination First page « First Previous page ‹ Previous … Page 34 Page 35 Page 36 Page 37 Current page 38 Page 39 Page 40 Page 41 Page 42 … Next page Next › Last page Last »
Image IDM Assessment Service Brief November 06, 2019 Optiv’s IDM Assessment offerings align programs and deployments with business goals and best practices. See Details Download
Image Optiv Services Overview October 31, 2019 We optimize and rationalize existing security programs to transform how you procure, consume, integrate, implement and operationalize cybersecurity. See Details Download
Image IaaS Security - AWS Native and Third-Party Tools Executive Summary October 11, 2019 This paper helps AWS users with Amazon, Palo Alto Networks and Tenable cloud infrastructure assessment tools. See Details Download
Image CDX Orchestration and Automation Service Brief October 09, 2019 Orchestrate and automate technologies, processes and people to run a successful IT and security operation. See Details Download
Image IaaS Security - AWS Native and Third-Party Tools October 09, 2019 Many tools are available to assist customers responsible for their own “security in the cloud.” See Details Download
Image CDX Analytics and Big Data Service Brief October 09, 2019 Get real-time value extraction from secured data. See Details Download
Image Is your cybersecurity tech stack creating more gaps? September 30, 2019 Explore this e-book to learn how to achieve the right level of protection, technology and controls to align security with business initiatives. See Details Download
Image Frost & Sullivan Customer Service Leadership Award for Healthcare Managed Cybersecurity Services September 30, 2019 Optiv receives the Customer Service Leadership Award for Healthcare Managed Cybersecurity Services from Frost & Sullivan. See Details Download
Image The State of the CISO September 20, 2019 More sophisticated organizations understand the importance of security in reducing organizational risk and maintaining brand value. See Details Download
Image 2019 Cyber Threat Intelligence Estimate September 20, 2019 The best-practice recommendations in this report are practical next steps that help immediately improve cybersecurity posture. See Details Download
Image NCSAM: Protective Behaviors September 13, 2019 National Cybersecurity Awareness Month stresses keeping software and apps updated, using secure wi-fi and protecting collected. See Details Download
Image NCSAM: Personal Accountability September 12, 2019 Workers should be aware of social media safety, privacy settings and mobile application security. See Details Download