Skip to main content
Contact
Search
HOW CAN WE HELP?

Let us know what you need, and we will have an Optiv professional contact you shortly.

General Inquiries
800-574-0896
info@optiv.com

Incident Response
(888) 732-9407

Invoicing Requests
invoicing@optiv.com

Main navigation

  • Security Solutions
    • Cyber Digital Transformation
      • Analytics and Big Data
      • Cloud Security Solutions
      • Cybersecurity Orchestration and Automation
      • Product Security Services
    • Cybersecurity Maturity Model Certification (CMMC)
    • Identity and Data Management
      • Digital Access Management
      • Identity Governance and Administration
      • Data Governance and Protection
    • Optiv Federal
    • Risk Management and Transformation
      • Cyber Resilience
      • Privacy and Governance
      • Risk Optimization
    • Security Operations
      • Advanced Fusion Center Operations
      • Cyber Authorized Support Services
      • Cyber-as-a-Service
      • Intelligence Operations
      • Managed Detection and Response Services
      • Managed Security Services
    • Security Services
      • Application Security
      • Architecture and Implementation
      • Attack and Penetration
      • Canadian Operations
      • Cybersecurity Education
      • GDPR
      • PCI Compliance Management and Consulting Services
      • Software Assurance-as-a-Service
      • ThreatDNA and ThreatBEAT
    • Security Technology
      • Application Security Technology
      • Cloud Security Technology
      • Data Security Technology
      • Endpoint Security Technology
      • Identity and Access Management Technology
      • Network Security Technology
      • Security Operations Solutions Technology
    • Threat Management
      • Attack and Penetration
  • Partner Directory
  • Explore Optiv Insights
    • Blog
    • CISO Periodic Table
    • Cybersecurity Dictionary
    • Downloads
    • Press Releases
    • Source Zero
    • Videos
  • Our Story
    • Client Success Stories
    • Events
    • Leadership
    • Locations
    • News and Awards
    • Optiv Chips In
  • Join the Team
    • Careers
    • Resources
  • Client Portal
Image
negative_threat_modelzero_trust_list_bk4

MobileIron MDM Contains Static Key Allowing Account Enumeration

March 22, 2021

MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability.

See Details

Blog

Image
Endpoint_Protection_and_EDR_list_BK7

Attacking the JNI Boundary with Frida

September 11, 2020

Moving functionality from Java to native implementations in Android increases obscurity but not security.

See Details

Blog

Image
Palo Alto Tech Tips for Global Protect Cloud Service

Palo Alto Tech Tips for Global Protect Cloud Service

February 08, 2018

Learn how to reduce the complexity and costs of securing your remote networks and mobile users.

See Details

Video

Image
gen_blog_list_item

Identity Protection Tips for Your Graduate

June 13, 2016

College students are five times more likely to become victims of identity theft than any other demographic, according to The Financial Times. Experts....

See Details

Blog

Footer menu

  • Security Solutions
  • Partner Directory
  • Explore Optiv Insights
  • Our Story
  • Join Optiv Team
  • Client Portal

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

© 2020 – 2021. Optiv Security Inc. All Rights Reserved.