Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Russian Cyber Operations Supplementing Kinetic Military and Shaping Operations (UPDATE) February 23, 2022 This advisory from Optiv’s gTIC covers recent incidents related to Russian military operations in Ukraine and provides cybersecurity recommendations. See Details Blog
Image Cyber Operations Augmenting Russian Military Operations February 10, 2022 This advisory offers recommendations for organizations potentially affected by Russian state-sponsored activity in Ukraine. See Details Blog
Image Aligning Defender ATP Alerts to MITRE ATT&CK - Video Demonstration June 30, 2020 How to prioritize efforts based on alert information from Microsoft Defender ATP, Logic Apps, and Log Analytics. See Details Blog
Image Microsoft Defender ATP Telemetry: Workbook Visualizations (Part 3) June 11, 2020 Part 3 of series: Prioritizing Microsoft Defender ATP endpoint alert telemetry with MITRE ATT&CK. See Details Blog
Image Microsoft Defender ATP Telemetry: Azure Log Analytics Workspace (Part 2) June 11, 2020 This post demonstrates how to pull DATP data into Azure Log Analytics workspaces using a Logic App. See Details Blog
Image Microsoft Defender ATP Telemetry: Viewing MITRE ATT&CK Context (Part 1) June 11, 2020 This post helps prioritize efforts based on alert information you're already receiving from Microsoft #Defender #ATP. See Details Blog
Image IoC and IoA: Indicators of Intelligence January 24, 2019 Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference.... See Details Blog
Image Phishing - The Rest of the Story May 29, 2018 Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this.... See Details Blog
Image Escape and Evasion Egressing Restricted Networks – Part 2 April 02, 2018 Attackers and security assessors alike are utilizing a technique called domain fronting, which masks malicious command and control (C2) traffic. This.... See Details Blog
Image Escape and Evasion Egressing Restricted Networks January 24, 2017 A command kill chain consists of payload delivery, code execution on a target system, and establishing a command and control (C2) channel outside of a.... See Details Blog
Image TTPs Within Cyber Threat Intelligence January 18, 2017 TTPs are the “patterns of activities or methods associated with a specific threat actor or group of threat actors.” See Details Blog
Image Information vs. Cyber Threat Intelligence January 11, 2017 Cyber threat intelligence should always enable decision making and action, but what good is a cyber threat intelligence program if you take no action.... See Details Blog