Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
An Introduction to Zero Trust
No single product or vendor can provide you with an end-to-end zero trust solution. In this video, Jerry Chapman explains that we can help you integrate the various components, break down silos and create an effective zero trust architecture.
Hi, I'm Jerry Chapman - I'm a technical director in the identity and data management practice. I'm also a Forester certified zero trust strategists. So the question I get is what is zero trust? Zero trust really is a modern security model that takes the least privileged mode of security and updates that, and creates a more of a trust, nothing, and create an earned trust type of environment. And then finally, it's, it's micro perimeters, not micro-segmentation where you're taking a subnetting off your, your, your network. It's about creating a micro perimeter about your, around your resources and your assets within your environment. So the next thing I get a lot of conversation around is Y zero trust. The first thing, when you think of why zero trust need to consider the legacy perimeter, well, the legacy perimeter is gone. We're not there anymore where we're really in the cafe style network. So you don't have trusted networks that were sitting on.
The second piece is around cloud adoption. Cloud adoption really, really focuses on getting into, into the cloud. But when we do that, wherever we're really increasing our, our threat landscape, adding vulnerabilities and creating more complexity to our, our infrastructure. And then the third piece is data and data growth. Just the exponential growth of data in our environment just causes. We really have to protect that more and really need to spend more time around that. So getting to a zero trust framework may seem complex, but it's actually easier when you consider the sum of its parts here at Optiv. We've got four core principles that we think about with zero trust. First, establishing a micro perimeter around the asset. Secondly, establishing a secure context or identity-based context to the resource, third, creating secure or enhanced security for that asset. For example, multifactor authentication, biometrics, or anything like that, that enhances or steps up with indication to the, to the asset.
And then finally continuously reviewing the identity and the secure connection to the asset. So not a single solution or a single vendor is going to provide you as your trust environment or a zero trust architecture. You really have to use multiple vendors, use a, an Optiv as an SSI to help integrate these components, to break down those silos and to create that zero trust architecture. And finally, zero trust is a journey. It's an evolution. It's a continuous process. Optiv can help you go down this path to get you to zero trust. Well, thank you for your time today. Hope you got a lot out of this and stay tuned for future zero trust videos.
November 20, 2019
The increasingly popular Zero Trust information security model maintains strict access controls by not trusting anyone or any action by default – and....
April 14, 2020
Unifying identity and data programs, aligned with Zero Trust, can help you accomplish several important goals.
April 09, 2019
Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their....