Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
March 15, 2022
Optiv Zero Trust is risk-based, identity-driven security for the modern network.
March 14, 2022
Threat detection and response should be intelligence-based, bespoke and responsive. Our tailored ADR helps you find and neutralize threats quickly.
February 23, 2022
In this video, James Turgal and Nycki Brooks stress the need for U.S. organizations to understand the cyber attack strategies of nation-state...
January 20, 2022
Optiv’s Jeff Stewart explains the cloud security services journey’s five phases: discovery, design, construct, simplify and accelerate.
October 05, 2021
To thrive in a new digital future you must be able to see far (C-FAR): establish CLARITY, cultivate FORESIGHT, create AGILITY and build RESILIENCE.
September 07, 2021
Cybersecurity Awareness Month Week 2: the growing challenges of IoT in work-from-home environments.
July 13, 2021
Optiv’s James Turgal and Wendy Overton discuss the most efficient ways to address insider risk. (Hint: you gotta eliminate silos.)
May 27, 2021
I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for...
The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi...
Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other...
In this talk, I will introduce the concepts of web scraping, how they apply to paste sites, and specific tools that I have used to gather data...
Many web applications use email as a mechanism for user verification, password resets, real time notifications and much more. But security testers and...