Skip to main content
home
Contact
Search
HOW CAN WE HELP?

Let us know what you need, and we will have an Optiv professional contact you shortly.

General Inquiries
800-574-0896
info@optiv.com

Incident Response
(888) 732-9407

Invoicing Requests
invoicing@optiv.com

Copy the Below Link To Your RSS Reader

Main navigation

  • Security Solutions
    • Cyber Digital Transformation
      • Analytics and Big Data
      • Cloud Security Solutions
      • Cybersecurity Orchestration and Automation
      • Product Security Services
    • Cybersecurity Maturity Model Certification (CMMC)
    • Identity and Data Management
      • Digital Access Management
      • Identity Governance and Administration
      • Data Governance and Protection
    • Optiv Federal
    • Risk Management and Transformation
      • Cyber Resilience
      • Privacy and Governance
      • Risk Optimization
    • Security Operations
      • Advanced Fusion Center Operations
      • Cyber Authorized Support Services
      • Cyber-as-a-Service
      • Intelligence Operations
      • Managed Detection and Response Services
      • Managed Security Services
    • Security Services
      • Application Security
      • Architecture and Implementation
      • Attack and Penetration
      • Canadian Operations
      • Cybersecurity Education
      • GDPR
      • Software Assurance-as-a-Service
      • Security Program Strategy
      • ThreatDNA and ThreatBEAT
    • Security Technology
      • Application Security Technology
      • Cloud Security Technology
      • Data Security Technology
      • Endpoint Security Technology
      • Identity and Access Management Technology
      • Network Security Technology
      • Security Operations Solutions Technology
    • Threat Management
      • Attack and Penetration
  • Partner Directory
  • Explore Optiv Insights
    • Blog
    • CISO Periodic Table
    • Cybersecurity Dictionary
    • Downloads
    • Press Releases
    • Source Zero
    • Videos
  • Our Story
    • Client Success Stories
    • Events
    • Leadership
    • Locations
    • News and Awards
  • Join the Team
    • Careers
    • Resources
  • Client Portal
Image
OptivFoundry_Blog-List_476x210_5

Copying Updated WinAutomation Databases for RPA With Azure Custom Script Extensions

November 04, 2020

How to copy updated WinAutomation databases for RPA with Azure custom script extensions – part five of a series.

See Details

Blog

Image
OptivFoundry_Blog-List_476x210_4

Robotic Process Automation with WinAutomation

November 04, 2020

Part four in the series: setting up RPA with WinAutomation.

See Details

Blog

Image
OptivFoundry_Blog-List_476x210_7

Tearing Down Azure Resources and Replying to Emails Using Power Automate Flows and Azure Runbooks

November 04, 2020

How to use Power Automate flows and Azure runbooks to tear down Azure resources and reply to emails – Dan Kiraly explains in part 7 of the series.

See Details

Blog

Image
OptivFoundry_Blog-List_476x210_3

Assigning Specific Public IP Addresses With Azure Automation Runbook

November 04, 2020

How to assign a specific public IP address using Azure Automation runbook. Part three in a series.

See Details

Blog

Image
OptivFoundry_Blog-List_476x210_6

Uploading WinAutomation Screenshots to Azure Container Storage Using Invoke-AzVMRunCommand

November 04, 2020

How to upload WinAutomation screenshots to Azure Container Storage using Invoke-AzVMRunCommand – part six in a series.

See Details

Blog

Image
OptivFoundry_Blog-List_476x210_2

Provisioning RPA Test Environments With Azure Automation Runbooks

November 04, 2020

How to provision a test environment for robotic process automation with Azure automation runbooks: part two in a series.

See Details

Blog

Image
OptivFoundry_Blog-List_476x210_1

Using Microsoft Flows and UI Flows for Patch and Software Testing

November 04, 2020

Can user workflow verification be tested in an automated fashion using Microsoft Power Automate Flows, UI Flows and Automation Runbooks?

See Details

Blog

Image
DX-AnalyticsBigData_list_476x210

CDX Analytics and Big Data Service Brief

October 09, 2019

Get real-time value extraction from secured data.

See Details

Download

Image
DX-OA-ServiceBrief_list_476x210

CDX Orchestration and Automation Service Brief

October 09, 2019

Orchestrate and automate technologies, processes and people to run a successful IT and security operation.

See Details

Download

Image
PAN-PrismSecurityFirst_list_476x210

Security First

July 02, 2019

Do you take a security first approach for your cloud programs?

See Details

Download

Image
keeping_credentials_safe_list_476x210

Keeping Credentials Safe: Worldwide in Real-Time

October 15, 2018

If you were to gather ten cyber security experts in a room and ask them what the most common threat actor access point is for today’s enterprise....

See Details

Blog

Image
generic_list_476x210

Synchronize your Security from Core to Cloud

October 03, 2018

Learn how Optiv, together with Fortinet, can help you consolidate your advanced security controls.

See Details

Download

Pagination

  • Current page 1
  • Page 2
  • Next page ››
  • Last page Last »

Footer menu

  • Security Solutions
  • Partner Directory
  • Explore Optiv Insights
  • Our Story
  • Join Optiv Team
  • Client Portal

 

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

© 2020 – 2021. Optiv Security Inc. All Rights Reserved.