Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Up-to-date information and research on red and blue
team security capabilities, objective tools analysis, new
research and step-by-step solutions.
The Source Zero® platform is a community of Optiv’s skilled individuals doing research and sharing their expertise. The Source Zero Tools are resources that provide actionable support and demonstrations around research initiatives.
November 04, 2020
How to use Power Automate flows and Azure runbooks to tear down Azure resources and reply to emails – Dan Kiraly explains in part 7 of the series.
How to assign a specific public IP address using Azure Automation runbook. Part three in a series.
How to upload WinAutomation screenshots to Azure Container Storage using Invoke-AzVMRunCommand – part six in a series.
How to provision a test environment for robotic process automation with Azure automation runbooks: part two in a series.
Can user workflow verification be tested in an automated fashion using Microsoft Power Automate Flows, UI Flows and Automation Runbooks?
September 30, 2020
Hackers can use the username structure and deployed technologies in an online document’s metadata to successfully breach the perimeter.
September 16, 2020
Palo Alto Networks Prisma Compute can help minimize the risk of deploying untrusted images.
September 11, 2020
Moving functionality from Java to native implementations in Android increases obscurity but not security.
September 02, 2020
Two experienced red teamers describe successful engagements and how to counter attack chains.
August 25, 2020
A quick walkthrough of the general steps taken to solve an iOS CTF.
August 24, 2020
The standalone script can be used directly with Frida in order to monitor basic BLE traffic between a mobile device (central) and a BLE peripheral.
Introducing Source Zero
Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.