Skip to main content
home
Contact
Search
HOW CAN WE HELP?

Let us know what you need, and we will have an Optiv professional contact you shortly.

General Inquiries
800-574-0896
info@optiv.com

Incident Response
(888) 732-9407

Invoicing Requests
invoicing@optiv.com

Copy the Below Link To Your RSS Reader

Main navigation

  • Security Solutions
    • Cyber Digital Transformation
      • Analytics and Big Data
      • Cloud Security Solutions
      • Cybersecurity Orchestration and Automation
      • Product Security Services
    • Cybersecurity Maturity Model Certification (CMMC)
    • Identity and Data Management
      • Digital Access Management
      • Identity Governance and Administration
      • Data Governance and Protection
    • Optiv Federal
    • Risk Management and Transformation
      • Cyber Resilience
      • Privacy and Governance
      • Risk Optimization
    • Security Operations
      • Advanced Fusion Center Operations
      • Cyber Authorized Support Services
      • Cyber-as-a-Service
      • Intelligence Operations
      • Managed Detection and Response Services
      • Managed Security Services
    • Security Services
      • Application Security
      • Architecture and Implementation
      • Attack and Penetration
      • Canadian Operations
      • Cybersecurity Education
      • GDPR
      • Software Assurance-as-a-Service
      • Security Program Strategy
      • ThreatDNA and ThreatBEAT
    • Security Technology
      • Application Security Technology
      • Cloud Security Technology
      • Data Security Technology
      • Endpoint Security Technology
      • Identity and Access Management Technology
      • Network Security Technology
      • Security Operations Solutions Technology
    • Threat Management
      • Attack and Penetration
  • Partner Directory
  • Explore Optiv Insights
    • Blog
    • CISO Periodic Table
    • Cybersecurity Dictionary
    • Downloads
    • Press Releases
    • Source Zero
    • Videos
  • Our Story
    • Client Success Stories
    • Events
    • Leadership
    • Locations
    • News and Awards
  • Join the Team
    • Careers
    • Resources
  • Client Portal
Image
partner-imperva-ecommerce-476px

Black Friday, Cybersecurity, COVID: Ecommerce is Under Attack

December 15, 2020

An integrated application security platform will help retailers operate efficiently and securely throughout the holidays and beyond.

See Details

Blog

Image
partner-extra-hop-#3-476px

Your 2021 Security Strategy: NDR or XDR?

December 09, 2020

By working with cloud providers to open up packets to security vendors, network detection/response enables comprehensive visibility in the cloud.

See Details

Blog

Image
key-principles-in-building-operational-476px_v2

Key Principles in Building Operational Resilience

December 02, 2020

This post articulates the five key principles for building operational resilience across the organization.

See Details

Blog

Image
partner-extrahop-476px

Insecure API Cloud Computing: The Causes and Solutions

November 16, 2020

While cloud APIs can streamline processes, they can also invite in new security risks. ExtraHop’s Matt Cauthorn offers best practices to stay secure.

See Details

Blog

Image
Partner_SecureAuth_Blog_Images_476px

Getting Started with Risk-Based Authentication

October 30, 2020

By layering MFA with contextual risk-checks, organizations can mitigate IAM threats and better focus on digital initiatives and business outcomes.

See Details

Blog

Image
PartnerBlog_CheckPoint_List-Section-Thumbail-Image_476x210

The Push and Pull of Access, Visibility, Compliance—and Automation

October 15, 2020

Application threat modeling decomposes application architecture into security-relevant components to reveal threats and potential risks.

See Details

Blog

Image
Partner_Ping-Keep-Me-Safe-Make-Me-Happy002_Blog_List-Images_476x210

Keep Me Safe, Make Me Happy (Part 3)

September 15, 2020

Making identity the center of both security and experience helps customers feel empowered and protected.

See Details

Blog

Image
reeduce-complexity-1-476px

Reduce Complexity to Bolster Your Cybersecurity

August 31, 2020

Nearly 70% of security leaders see consolidating vendors as a way to improve security.

See Details

Blog

Image
forcepoint_476x210

Data Protection Best Practices for a New Remote Workforce

August 18, 2020

Forcepoint’s Romeo Gain outlines how to build an effective data protection action plan.

See Details

Blog

Image
Security-Gateways-Blog_list_476x210_v2

Assessing the Needs for Today’s Modern Security Gateways

July 16, 2020

This guide offers tips to assess requisite capabilities for modern security gateways.

See Details

Blog

Image
Rapid7_Cloud-Security-Fundamentals_list_476x210

Cloud Security Requires a New Mindset

July 07, 2020

To take advantage of the cloud‘s benefits, adapt your organization to your new reality.

See Details

Blog

Image
keep_me_safe_list_476x210

Keep Me Safe, Make Me Happy (Part 2)

June 15, 2020

Secure the customer experience by acknowledging that customers want you to make them happy and keep them safe.

See Details

Blog

Pagination

  • Current page 1
  • Page 2
  • Next page ››
  • Last page Last »

Footer menu

  • Security Solutions
  • Partner Directory
  • Explore Optiv Insights
  • Our Story
  • Join Optiv Team
  • Client Portal

 

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

© 2020 – 2021. Optiv Security Inc. All Rights Reserved.