Security Roundup: GDPR Countdown, KnowBe4 Exploit Discovery, Optiv Tools

GDPR Compliance

… still be successfully phished.”

Optiv Rolls Out New Cybersecurity Assessment Services

Optiv Security recently unveiled a new portfolio of more than 60 assessment services designed to help organizations rationalize infrastructure, optimize operations, and build risk-centric cybersecurity programs that are manageable, measurable and effective.

Assessments@Optiv addresses every aspect of security and risk, with strategic guidance to help organizations prioritize the assessments that best fit specific business needs, the company said. The assessments are organized across all major industry frameworks, and security initiatives — from architecture and implementation, attack and penetration, and enterprise incident management to application security, strategy, risk and compliance, and identity and access management.

Optiv's J.R. Cunningham

Optiv’s J.R. Cunningham

J.R. Cunningham, Optiv’s vice president of product management, tells us the assessments provide clarity on precisely what problems need to be solved and where technology is best deployed.

“Our partners appreciate this approach for two reasons: first, it enables them to not waste time trying to fit products into problems that aren’t clearly understood or identified, and our assessment activities help to ensure the security product stack is functioning properly throughout its life cycle,” he said. “This is designed to lead to more effective security technology and enable the client and technology partner to fine-tune the use of security technology throughout its life cycle.”

Optiv’s clients and partners are asking the company to provide clarity in an increasingly complex world of cybersecurity, Cunningham said

“Having a portfolio of deep and wide assessments enables us to help our clients to precisely understand their current state, which helps to simplify the road map in their individual security journey,” he said. “This simplified road map provides the client with those critical next steps and enables them to precisely approach the security technology market with specific use cases for the problems they wish to solve.”

Pages: Previous 1 2 3 4

Leave a comment

Your email address will not be published. Required fields are marked *

The ID is: 101045