Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Up-to-date information and research on red and blue
team security capabilities, objective tools analysis, new
research and step-by-step solutions.
The Source Zero® platform is a community of Optiv’s skilled individuals doing research and sharing their expertise. The Source Zero Tools are resources that provide actionable support and demonstrations around research initiatives.
2022 Source Zero Con Videos
View the 2022 Source Zero Con Content On-Demand.
May 26, 2021
The talk will highlight some of the common mistakes made by developers while coding mobile applications and how attackers can exploit them. We will...
As enterprises modernize their wireless technology, new attacks have developed on the horizon. The presentation will cover WiFi terminology, various...
With a heavy focus on monitoring, host based detection and attack prevention, much of a legacy attack surface still remains. MitM attacks utilizing...
May 25, 2021
In this session I will demonstrate the use of open source software Judge Jury and Executable to acquire forensic data into a database where we will...
Using Microsoft Automation to bridge technology gaps and fully automate vulnerability discovery to remediation with the assistance of RPA.
This talk is built from the background of how the EIM practice rapidly collected and consolidated threat intelligence from myriad sources following...
In this session I will cover adventures in reverse engineering intel 8051 assembly code for the engine control unit on an old Bosch Motronic unit.
Burp Suite is one of the most popular tools in a hacker's toolkit. From security researchers to bug bounty hunters, Burp is used by information...
EDR products are becoming a necessary solution in the security stack. In this session you will learn the short comings of EDR, so you can make...
High level overview of the most popular cloud platforms GCP, Azure, and AWS. Explain the benefits and why companies are moving services and data into...
May 12, 2021
This article explores gaps that allow for the undetected execution of code on systems protected by Microsoft Defender Advanced Threat Protection.
April 23, 2021
We encourage clients to understand and adopt Palo Alto’s powerful credential theft prevention feature.
Introducing Source Zero
Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.