All resources sponsored by:

Optiv

13 Matches
How Connected are your Cyber Operations and Business Objectives?
sponsored by Optiv
RESOURCE:Take Optiv’s quiz to help identify how well your cyber operations program is positioned with your organization’s overall business goals and objectives—and see how your cybersecurity stacks up against other organizations.
Posted: 06 Dec 2019 | Published: 06 Dec 2019
Get This Now


Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach
sponsored by Optiv
CASE STUDY:In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.
Posted: 06 Dec 2019 | Published: 06 Dec 2019
Get This Now


Adding Advanced Capabilities into Today's SOC
sponsored by Optiv
ANALYST REPORT:View IDC’s Technology Spotlight, sponsored by Optiv Security, to gain a deeper understanding of enterprise SecOps challenges, key SOC market trends, advanced capabilities in a SOC, and more.
Posted: 05 Dec 2019 | Published: 05 Dec 2019
Get This Now


NIST Maturity Report
sponsored by Optiv
RESOURCE:The National Institute of Standards and Technology (NIST) cybersecurity framework exists to help organizations better understand, manage, and decrease cybersecurity risk. How aligned is your security program to this industry-accepted framework? Determine your NIST alignment by taking this quick quiz today.
Posted: 05 Dec 2019 | Published: 05 Dec 2019
Get This Now


Your Cybersecurity Tech Stack Creating More Gaps
sponsored by Optiv
RESOURCE:It’s a common misconception that more tech services mean more security, but the reality is quite the opposite. In fact, a Cisco cybersecurity report reveals a correlation between the number of security vendors and the number of breaches. In this infographic, dive deeper into this issue and explore ways to close the gap.
Posted: 04 Dec 2019 | Published: 04 Dec 2019
Get This Now


Evolve your Security Operations Center
sponsored by Optiv
WEBCAST:Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.
Posted: 04 Dec 2019 | Premiered: Sep 23, 2019
Get This Now


Rethinking Cyber Operations: Creating Clarity Out of Complexity
sponsored by Optiv
WHITE PAPER:Rethinking and evolving cyber operations is key to reducing complexity and achieving a cybersecurity model aligned to organizational risk. Download this white paper for insights into the innovation landscape, key symptoms of lagging cyber operations and a roadmap that organizations can follow to achieve a new cyber operations paradigm.
Posted: 06 Aug 2019 | Published: 06 Aug 2019
Get This Now


Optiv's Managed Security Services Mitigate Risk for Multi-Brand National Retailer
sponsored by Optiv
CASE STUDY:A leading multi-brand national retailer needed to maintain evolving security demands. Learn how Optiv's Managed Security Services (MSS) was able to provide them critical 24x7x365 remote access and infrastructure needed to maximize costs and resources.
Posted: 05 Aug 2019 | Published: 05 Aug 2019
Get This Now


Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program
sponsored by Optiv
RESOURCE:A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.
Posted: 05 Aug 2019 | Published: 24 Jul 2019
Get This Now


Connecting Modern Cyber Operations: A Tailored Approach
sponsored by Optiv
RESOURCE:IT decision makers must begin exploring a more holistic, integrated and measurable solution that helps teams consider all aspects of their unique cybersecurity program. Download this interactive web-page to learn about a tailored approach to cybersecurity.
Posted: 02 Aug 2019 | Published: 02 Aug 2019
Get This Now


Five Steps To A Zero Trust Network
sponsored by Optiv
ANALYST REPORT:This Forrester report gives security and risk leaders best practices and a 5-step road map to realize the benefits of a Zero Trust strategy more quickly. Read on to learn more.
Posted: 02 Aug 2019 | Published: 02 Aug 2019
Get This Now


Adopting Productivity: How SOCs can Evolve to Advanced Fusion Centers
sponsored by Optiv
RESOURCE:In this infographic, learn how security operations centers can evolve to advance fusion centers.
Posted: 01 Aug 2019 | Published: 01 Aug 2019
Get This Now


SOCs vs. AFCs: What's the Difference?
sponsored by Optiv
RESOURCE:Advances in technology have often been perceived as threats rather than opportunities, due to the reactionary nature of the SOC model. But, Advanced Fusion Centers (AFCs) offer a modern approach to cybersecurity replacing this reactive model with an agile one. In this blog, explore the differences between SOCs and AFCs.
Posted: 01 Aug 2019 | Published: 23 Jul 2019
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement