A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Security Automation and Orchestration Briefing: Technology and Partner Review May 15, 2018 This paper takes an in-depth look at Phantom’s solution and constructing playbooks to triage endpoint and network alerts. See Details Download Image 2018 Cyber Threat Intelligence Estimate May 15, 2018 Read Optiv's analysis of 2017 security themes in this Cyber Threat Intelligence Estimate report. See Details Download Image How to Talk to Your Cloud Team About Cloud Security May 15, 2018 Learn how to get a seat at the table before you have to answer to a breach in the cloud. See Details Download Image Secure Big Data with Orchestration and Automation May 01, 2018 Learn how securing big data is much like conducting an actual symphony. See Details Download Image Cyber Threat Intelligence as-a-Service April 19, 2018 Learn how Optiv’s Cyber Threat Intelligence as-a-Service solution provides you with an advanced "beyond the perimeter" capability as a part of your... See Details Download Image CISO Periodic Table April 16, 2018 Learn about security concerns and threats facing the modern day CISO. See Details Download Image Assessments April 12, 2018 Learn how our assessments at Optiv program allows for organizations to gain the right level of visibility into your information security program. See Details Download Image Frost & Sullivan 2018 Competitive Strategy Innovation and Leadership Award March 28, 2018 Optiv recognized for managed and professional security services. See Details Download Image The Five Steps to Managing Third-Party Risk March 08, 2018 Learn how to manage the many forms of third-party risk. See Details Download Image Identity and Access Management Health Check February 16, 2018 Learn how Optiv can help improve efficiency and optimize performance of your IAM technologies. See Details Download Image Unstructured Data Risk Assessment January 22, 2018 Learn how Optiv can help you assess your risk of a breach related to unstructured data. See Details Download Image What a Hacker Sees: Top 20 CIS Critical Security Controls December 14, 2017 Learn about the top 20 CIS Critical Security Controls (CSC) through the eyes of a hacker. See Details Download Pagination First page « First Previous page ‹ Previous … Page 37 Page 38 Page 39 Page 40 Current page 41 Page 42 Page 43 Page 44 Page 45 … Next page Next › Last page Last »
Image Security Automation and Orchestration Briefing: Technology and Partner Review May 15, 2018 This paper takes an in-depth look at Phantom’s solution and constructing playbooks to triage endpoint and network alerts. See Details Download
Image 2018 Cyber Threat Intelligence Estimate May 15, 2018 Read Optiv's analysis of 2017 security themes in this Cyber Threat Intelligence Estimate report. See Details Download
Image How to Talk to Your Cloud Team About Cloud Security May 15, 2018 Learn how to get a seat at the table before you have to answer to a breach in the cloud. See Details Download
Image Secure Big Data with Orchestration and Automation May 01, 2018 Learn how securing big data is much like conducting an actual symphony. See Details Download
Image Cyber Threat Intelligence as-a-Service April 19, 2018 Learn how Optiv’s Cyber Threat Intelligence as-a-Service solution provides you with an advanced "beyond the perimeter" capability as a part of your... See Details Download
Image CISO Periodic Table April 16, 2018 Learn about security concerns and threats facing the modern day CISO. See Details Download
Image Assessments April 12, 2018 Learn how our assessments at Optiv program allows for organizations to gain the right level of visibility into your information security program. See Details Download
Image Frost & Sullivan 2018 Competitive Strategy Innovation and Leadership Award March 28, 2018 Optiv recognized for managed and professional security services. See Details Download
Image The Five Steps to Managing Third-Party Risk March 08, 2018 Learn how to manage the many forms of third-party risk. See Details Download
Image Identity and Access Management Health Check February 16, 2018 Learn how Optiv can help improve efficiency and optimize performance of your IAM technologies. See Details Download
Image Unstructured Data Risk Assessment January 22, 2018 Learn how Optiv can help you assess your risk of a breach related to unstructured data. See Details Download
Image What a Hacker Sees: Top 20 CIS Critical Security Controls December 14, 2017 Learn about the top 20 CIS Critical Security Controls (CSC) through the eyes of a hacker. See Details Download