Subscribe To Our Daily Enewsletter:

Posts by Optiv

Outsourced Business Functions: Should You Trust that Third-Party?

Information security organizations must evolve to support outsourced business services and partner ecosystems — which increase the probability of a breach. Optiv Security explains the modern-day risks and mitigation strategies.

SDN: How Micro-Segmentation Can Protect Data – Part 2 of 2

Firewalls, enhanced workload visibility and automated deception/incident response (IR) solutions integrate with software-defined networking (SDN) and software-defined data center (SDDC) solutions. Optiv Security explains why.

SDN: How Micro-Segmentation Can Protect Data – Part 1 of 2

As software-defined networking (SDN) technologies become more prevalent, micro-segmentation is emerging as a critical step for security in virtualized environments. Optiv Security explains why.

Six Essential Elements of a Basic Security Foundation

Here are six essential elements of a basic security foundation your company can work on today, according to Optiv Security.

How to Establish Baseline Cloud Security Controls

Optiv describes a set of cloud critical controls. They’re based on a combination of the Cloud Security Alliance’s Cloud Control Matrix (CCM), Center for Internet Security (CIS) consensus-based benchmark & Optiv market experience.

The Fundamentals of Identity and Access Management

What’s the state of IAM (identity and access management) within an organization? Follow these seven IAM assessment tips from Optiv Security.