A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Can Your Organization Accept the Risk of Being First? November 13, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. For this year’s review, we constructed several use cases that would model.... See Details Blog Image PCI Compliance Every Day – Requirement 10 November 12, 2017 When people think of PCI business as usual (BAU) they do not typically see the requirements in section 10 as having much of anything to do with BAU.... See Details Blog Image Unmanaged PowerShell Binaries and Endpoint Protection November 09, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy.... See Details Blog Image Third-Party Breaches Will Continue Until Morale Improves November 08, 2017 I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one.... See Details Blog Image GDPR Part 3: GDPR and the Information Security Program November 06, 2017 In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security.... See Details Blog Image Using Micro-Segmentation to Protect Your Data – Part 1 November 05, 2017 As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is.... See Details Blog Image Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and.... See Details Blog Image A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's.... See Details Blog Image GDPR Part 2: The Six Information Security Pillars October 30, 2017 In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security.... See Details Blog Image Critical Infrastructure Security October 29, 2017 The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or.... See Details Blog Image Help Keep Your Children Safe Online October 25, 2017 The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the.... See Details Blog Image GDPR Part 1: A Legal, IT, or Information Security Issue? October 24, 2017 The General Data Protection Regulation (GDPR) is a new regulation affecting organizations that reside in the European Union (EU) or merely transmit EU.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 46 Page 47 Page 48 Page 49 Current page 50 Page 51 Page 52 Page 53 Page 54 … Next page Next › Last page Last »
Image Can Your Organization Accept the Risk of Being First? November 13, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. For this year’s review, we constructed several use cases that would model.... See Details Blog
Image PCI Compliance Every Day – Requirement 10 November 12, 2017 When people think of PCI business as usual (BAU) they do not typically see the requirements in section 10 as having much of anything to do with BAU.... See Details Blog
Image Unmanaged PowerShell Binaries and Endpoint Protection November 09, 2017 Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy.... See Details Blog
Image Third-Party Breaches Will Continue Until Morale Improves November 08, 2017 I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one.... See Details Blog
Image GDPR Part 3: GDPR and the Information Security Program November 06, 2017 In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security.... See Details Blog
Image Using Micro-Segmentation to Protect Your Data – Part 1 November 05, 2017 As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is.... See Details Blog
Image Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and.... See Details Blog
Image A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's.... See Details Blog
Image GDPR Part 2: The Six Information Security Pillars October 30, 2017 In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security.... See Details Blog
Image Critical Infrastructure Security October 29, 2017 The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or.... See Details Blog
Image Help Keep Your Children Safe Online October 25, 2017 The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the.... See Details Blog
Image GDPR Part 1: A Legal, IT, or Information Security Issue? October 24, 2017 The General Data Protection Regulation (GDPR) is a new regulation affecting organizations that reside in the European Union (EU) or merely transmit EU.... See Details Blog