A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 73 - 84 of 784 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Safely Enabling Generative AI with Zero Trust and Security Service Edge (SSE) Capabilities July 17, 2024 Generative AI has had a firestorm of attention, and security teams are reacting quickly as employees, contractors and business partners leverage the.... Read the Blog Image Blog Make Threat Hunting Easier with Endpoint Detection and Response (EDR) July 09, 2024 With a strategic endpoint detection and response (EDR) solution, organizations trade complexity and cost for easier and more effective threat hunting. Read the Blog Image Blog Risk to Resilience – Prioritizing Security in Your Cloud Transformation July 03, 2024 Migrating your organization to the cloud offers organizations a multitude of compelling benefits. Read Optiv's latest blog on starting your cloud.... Read the Blog Image Blog Top Cybersecurity Trends for Global Enterprises in 2024 July 03, 2024 Discover the top cybersecurity trends for global enterprises in 2024, from the resurgence of social engineering to the skills gap challenge and learn.... Read the Blog Image Blog Building a Proactive and Adaptive Cybersecurity Strategy: Insights for Enterprise Success July 01, 2024 Adjust to evolving threats with a proactive and adaptive cybersecurity strategy. Key insights that help you build resilient defenses. Read the Blog Image Blog Cybersecurity Maturity Requires Evolving Endpoint Protection June 26, 2024 Five features boards should ensure are part of their endpoint protection platform. Read the Blog Image Blog Why it Pays to Have a Comprehensive API Security Strategy June 17, 2024 In an era dominated by digital connectivity and technological advancements, APIs play a pivotal role in facilitating seamless communication and data.... Read the Blog Image Blog Got DSPM? June 07, 2024 How can data security posture management (DSPM) help enhance company maturity? Optiv explains how DSPM can go beyond data discovery. Read the Blog Image Blog A Survivor’s Guide to Tackling the “New PAM” June 07, 2024 Today's numerous Privileged Access Management (PAM) options can be overwhelming. Optiv simplifies the complexity to help you develop a focused PAM.... Read the Blog Image Blog Fostering Empathetic Communication in Vulnerability Management June 06, 2024 Communication skills are often overlooked in vulnerability management. See Optiv's advice for approaching VM concerns with empathy to improve.... Read the Blog Image Blog SASE: A Comprehensive, Unified Solution Against Cyber Threats June 05, 2024 SASE represents a shift in how organizations approach network and security architecture. Read Optiv's latest blog on SASE to see why the need for a.... Read the Blog Image Blog Navigating OT Networking and Security in the Cloud Era June 03, 2024 As threats in the OT space evolve, how can security teams adapt the classic Purdue model to address business and compliance needs? Optiv shares key.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 3 Page 4 Page 5 Page 6 Current page 7 Page 8 Page 9 Page 10 Page 11 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Safely Enabling Generative AI with Zero Trust and Security Service Edge (SSE) Capabilities July 17, 2024 Generative AI has had a firestorm of attention, and security teams are reacting quickly as employees, contractors and business partners leverage the....
Image Blog Make Threat Hunting Easier with Endpoint Detection and Response (EDR) July 09, 2024 With a strategic endpoint detection and response (EDR) solution, organizations trade complexity and cost for easier and more effective threat hunting.
Image Blog Risk to Resilience – Prioritizing Security in Your Cloud Transformation July 03, 2024 Migrating your organization to the cloud offers organizations a multitude of compelling benefits. Read Optiv's latest blog on starting your cloud....
Image Blog Top Cybersecurity Trends for Global Enterprises in 2024 July 03, 2024 Discover the top cybersecurity trends for global enterprises in 2024, from the resurgence of social engineering to the skills gap challenge and learn....
Image Blog Building a Proactive and Adaptive Cybersecurity Strategy: Insights for Enterprise Success July 01, 2024 Adjust to evolving threats with a proactive and adaptive cybersecurity strategy. Key insights that help you build resilient defenses.
Image Blog Cybersecurity Maturity Requires Evolving Endpoint Protection June 26, 2024 Five features boards should ensure are part of their endpoint protection platform.
Image Blog Why it Pays to Have a Comprehensive API Security Strategy June 17, 2024 In an era dominated by digital connectivity and technological advancements, APIs play a pivotal role in facilitating seamless communication and data....
Image Blog Got DSPM? June 07, 2024 How can data security posture management (DSPM) help enhance company maturity? Optiv explains how DSPM can go beyond data discovery.
Image Blog A Survivor’s Guide to Tackling the “New PAM” June 07, 2024 Today's numerous Privileged Access Management (PAM) options can be overwhelming. Optiv simplifies the complexity to help you develop a focused PAM....
Image Blog Fostering Empathetic Communication in Vulnerability Management June 06, 2024 Communication skills are often overlooked in vulnerability management. See Optiv's advice for approaching VM concerns with empathy to improve....
Image Blog SASE: A Comprehensive, Unified Solution Against Cyber Threats June 05, 2024 SASE represents a shift in how organizations approach network and security architecture. Read Optiv's latest blog on SASE to see why the need for a....
Image Blog Navigating OT Networking and Security in the Cloud Era June 03, 2024 As threats in the OT space evolve, how can security teams adapt the classic Purdue model to address business and compliance needs? Optiv shares key....