Skip to main content
Contact
Search
HOW CAN WE HELP?

Let us know what you need, and we will have an Optiv professional contact you shortly.

General Inquiries
800-574-0896
info@optiv.com

Incident Response
(888) 732-9407

Invoicing Requests
invoicing@optiv.com

Copy the Below Link To Your RSS Reader

Main navigation

  • Security Solutions
    • Cyber Digital Transformation
      • Analytics and Big Data
      • Cloud Security Solutions
      • Cybersecurity Orchestration and Automation
      • Product Security Services
    • Cybersecurity Maturity Model Certification (CMMC)
    • Identity and Data Management
      • Digital Access Management
      • Identity Governance and Administration
      • Data Governance and Protection
    • Optiv Federal
    • Risk Management and Transformation
      • Cyber Resilience
      • Privacy and Governance
      • Risk Optimization
    • Security Operations
      • Advanced Fusion Center Operations
      • Cyber Authorized Support Services
      • Cyber-as-a-Service
      • Intelligence Operations
      • Managed Detection and Response Services
      • Managed Security Services
    • Security Services
      • Application Security
      • Architecture and Implementation
      • Attack and Penetration
      • Canadian Operations
      • Cybersecurity Education
      • GDPR
      • PCI Compliance Management and Consulting Services
      • Software Assurance-as-a-Service
      • Security Program Strategy
      • ThreatDNA and ThreatBEAT
    • Security Technology
      • Application Security Technology
      • Cloud Security Technology
      • Data Security Technology
      • Endpoint Security Technology
      • Identity and Access Management Technology
      • Network Security Technology
      • Security Operations Solutions Technology
    • Threat Management
      • Attack and Penetration
  • Partner Directory
  • Explore Optiv Insights
    • Blog
    • CISO Periodic Table
    • Cybersecurity Dictionary
    • Downloads
    • Press Releases
    • Source Zero
    • Videos
  • Our Story
    • Client Success Stories
    • Events
    • Leadership
    • Locations
    • News and Awards
    • Optiv Chips In
  • Join the Team
    • Careers
    • Resources
  • Client Portal
Image
gen_blog_list_item

IoT and the Impact on Wireless Networks

February 13, 2017

Traditionally, wireless networks were considered a luxury, as well as highly unreliable and unsecure. Over the past 10 years, wireless networks have....

See Details

Blog

Image
generic_list

Dominate Data Center Security

February 01, 2017

This eBook offers a six step guide to gain complete visibility and protection in your data center.

See Details

Download

Image
gen_blog_list_item

Cloud Networking... The Preferred Choice for The Future

November 30, 2016

As our universe becomes more robust and, its inhabitants become increasingly more aware of the stability of WAN, it is most certain that the future....

See Details

Blog

Image
gen_blog_list_item

Microsoft Architecture for Identity & Access Management (IAM) - Part 2 - Federation

October 21, 2012

Federation has become one of many standards applied to Single Sign-On (SSO) by organizations; this would include locally hosted claims-aware....

See Details

Blog

Image
gen_blog_list_item

Microsoft Architecture for Identity & Access Management (IAM) - Part 1 - Overview

September 04, 2012

For the past year and a half, Microsoft has created and gone to market with a suite of products that allow for Identity and Access Management (IAM)....

See Details

Blog

Footer menu

  • Security Solutions
  • Partner Directory
  • Explore Optiv Insights
  • Our Story
  • Join Optiv Team
  • Client Portal

 

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

© 2020 – 2021. Optiv Security Inc. All Rights Reserved.