A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Zero Trust Readiness Assessment April 22, 2021 Optiv’s Zero Trust Readiness Assessment helps clients create a roadmap to mature their Zero Trust capabilities. See Details Download Image Accelerating Vulnerability Remediation April 09, 2021 In this paper, we describe a methodology for transforming vulnerability management to reduce the MTTR. See Details Download Image Insider Risk Management March 31, 2021 We're here to support you on your journey to a robust and holistic Insider Risk program with actionable next steps. See Details Download Image Cloud Security Assessment for Azure March 31, 2021 Our Cloud Security Assessment identifies challenges, defining business goals, maturity levels and outcomes in building a roadmap to program success. See Details Download Image Cloud Security Assessment for Microsoft 365 March 31, 2021 Our Cloud Security Assessment identifies challenges, defining business goals, maturity levels and outcomes in building a roadmap to program success. See Details Download Image Cybersecurity Education Services March 19, 2021 Our employee training programs help you meet compliance requirements, minimize risks and maximize data security. See Details Download Image Cybersecurity Maturity Model Certification (CMMC) February 16, 2021 Our Cybersecurity Maturity Model Certification guides you through business growth, regulatory and contract compliance and operational considerations. See Details Download Image Risk Management Transformation Service January 26, 2021 Our Focused Cyber Risk Strategy Development engagement includes a range of services, including risk, privacy, compliance and vulnerability management. See Details Download Image PCI Executive Workshop January 07, 2021 Our PCI Executive Workshop addresses payment card industry standards, applicable PCI obligations, business processes and data handling. See Details Download Image PCI DSS Report on Compliance (ROC) Completion January 06, 2021 Our team assesses your cardholder data environment against PCI DSS, completes your Report on Compliance and outlines the status for all control areas. See Details Download Image PCI DSS ASV Scanning Services January 05, 2021 Our Approved Scanning Vendor services enable internet-facing asset compliance scanning, fulfilling the PCI ASV external network scanning requirement. See Details Download Image Security Operations: Digital Risk Protection Management December 21, 2020 Our efficient, tailored threat intelligence gathering process provides actionable information to drive an improved security posture. See Details Download Pagination First page « First Previous page ‹ Previous … Page 26 Page 27 Page 28 Page 29 Current page 30 Page 31 Page 32 Page 33 Page 34 … Next page Next › Last page Last »
Image Zero Trust Readiness Assessment April 22, 2021 Optiv’s Zero Trust Readiness Assessment helps clients create a roadmap to mature their Zero Trust capabilities. See Details Download
Image Accelerating Vulnerability Remediation April 09, 2021 In this paper, we describe a methodology for transforming vulnerability management to reduce the MTTR. See Details Download
Image Insider Risk Management March 31, 2021 We're here to support you on your journey to a robust and holistic Insider Risk program with actionable next steps. See Details Download
Image Cloud Security Assessment for Azure March 31, 2021 Our Cloud Security Assessment identifies challenges, defining business goals, maturity levels and outcomes in building a roadmap to program success. See Details Download
Image Cloud Security Assessment for Microsoft 365 March 31, 2021 Our Cloud Security Assessment identifies challenges, defining business goals, maturity levels and outcomes in building a roadmap to program success. See Details Download
Image Cybersecurity Education Services March 19, 2021 Our employee training programs help you meet compliance requirements, minimize risks and maximize data security. See Details Download
Image Cybersecurity Maturity Model Certification (CMMC) February 16, 2021 Our Cybersecurity Maturity Model Certification guides you through business growth, regulatory and contract compliance and operational considerations. See Details Download
Image Risk Management Transformation Service January 26, 2021 Our Focused Cyber Risk Strategy Development engagement includes a range of services, including risk, privacy, compliance and vulnerability management. See Details Download
Image PCI Executive Workshop January 07, 2021 Our PCI Executive Workshop addresses payment card industry standards, applicable PCI obligations, business processes and data handling. See Details Download
Image PCI DSS Report on Compliance (ROC) Completion January 06, 2021 Our team assesses your cardholder data environment against PCI DSS, completes your Report on Compliance and outlines the status for all control areas. See Details Download
Image PCI DSS ASV Scanning Services January 05, 2021 Our Approved Scanning Vendor services enable internet-facing asset compliance scanning, fulfilling the PCI ASV external network scanning requirement. See Details Download
Image Security Operations: Digital Risk Protection Management December 21, 2020 Our efficient, tailored threat intelligence gathering process provides actionable information to drive an improved security posture. See Details Download