Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
September 16, 2020
Palo Alto Networks Prisma Compute can help minimize the risk of deploying untrusted images.
July 22, 2020
An attacker could use a poisoned docker image to break out of a container.
September 24, 2019
In this post, we will look at ATT&CK’s Impact Phase as it affects availability and integrity. There are several different techniques adversaries can....
September 10, 2019
In this post, we will address some of the MITRE ATT&CK’s Collection techniques and tactics, from an attacker’s point of view to harvest organizational....
August 06, 2019
In this post, we will review ATT&CK’s Command and Control techniques from an attacker’s point of view. The techniques covered here are not inclusive....
July 16, 2019
In this post, we will address some of the MITRE ATT&CK’s Exfiltration techniques and tactics, from an attacker’s point of view, that may be used to....
June 25, 2019
There are several different methods that adversaries can employ to move throughout a network. However, we will cover two techniques commonly used by....
June 13, 2019
Endpoint security solution providers continue to race toward the same goal—a multifunctional platform that includes prevention, detection, response....
May 14, 2019
There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often....
May 07, 2019
Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be....
April 25, 2019
April 02, 2019
In this post, we will cover ATT&CK’s Persistence techniques and tactics that an attacker may employ to maintain their presence following initial....