Optiv | Company Profile - Revenue, Headcount, Tech Stack, Contacts

Company Directory for Optiv

Optiv

Overview

Optiv is a cybersecurity advisory and solutions company specializing in risk management and security services. It provides a comprehensive approach to managing cyber risk, serving as a single-source provider for all cybersecurity needs by leveraging an extensive ecosystem of people, products, partners, and programs to help clients secure their operations and achieve business objectives.

The company's offerings include cybersecurity advisory services, managed security services, and managed detection and response. Optiv supports the deployment and operation of cybersecurity programs, with a focus on reducing organizational cyber risk. Their portfolio, including a wide range of cybersecurity technologies and infrastructure solutions, caters to federal leaders and organizations across industries requiring scalable cybersecurity services.

Basic Information

Industry computer & network security
Founded 2015
Revenue 650M
Headquarters 1144 15th Street, Suite 2900, Denver, Colorado 80202, United States
Languages English
Parent Organization KKR
Alexa Ranking 407405

Contact Details

Key Focus Areas & Initiatives

  • Security program strategy
  • Security architecture & implementation
  • General data protection regulation
  • Enterprise incident management
  • Managed XDR
  • Security intelligence
  • Cloud security
  • Threat & vulnerability management
  • Advanced threat detection
  • Identity management
  • Nextgen security operations
  • Zero trust architecture
  • Managed security services
  • Internet of Things security
  • Enterprise security architecture
  • Security education & awareness
  • Third-party risk management
  • Enterprise risk & compliance
  • Threat attack simulation
  • Security incident response
  • Cyber risk assessment
  • Risk management
  • Digital transformation
  • Security incident management tools
  • Security governance frameworks
  • Security program governance
  • Cyber fraud strategy
  • B2B cybersecurity advisory
  • Security automation tools
  • Compliance & regulatory guidance
  • Vulnerability management
  • Cybersecurity strategy consulting
  • Professional services
  • Security operations
  • Endpoint security
  • Penetration testing services
  • Red team testing
  • Incident readiness & response
  • Cloud migration support
  • Big data analytics for security
  • DevOps security
  • Orchestration and automation
  • Cyber fraud prevention
  • Remote security management
  • Regulatory compliance solutions
  • Healthcare and financial services cybersecurity

Technologies Used

  • ADAPT
  • AI
  • AWS Auto Scaling
  • AWS Key Management Service (KMS)
  • AWS Trusted Advisor
  • Adform DMP
  • Adobe Media Optimizer
  • Akamai DNS
  • AlgoSec
  • Amazon EC2
  • Amazon GuardDuty
  • Amazon S3
  • Amazon Simple Queue Service (SQS)
  • Amazon Virtual Private Cloud (Amazon VPC)
  • Amazon Web Services (AWS)
  • Axonius
  • Azure Active Directory
  • Azure Analysis Services
  • Azure Linux Virtual Machines
  • Azure Virtual Machines
  • BeyondTrust
  • Bizible
  • Cedexis Radar
  • Cisco ASA 5555
  • Cisco AppDynamics
  • Cisco Firepower 9300
  • Cisco Software-Defined Access
  • Cisco Unified Intelligence Center
  • Cisco WebEx Teams
  • Citrix
  • Cortex XDR
  • Crowd
  • CrowdStrike
  • CyberArk
  • Darktrace/OT
  • Datadog Cloud SIEM
  • Delinea
  • Elasticsearch
  • Exabeam Security Management Platform
  • Excel4Apps
  • ExtraHop
  • Facebook Custom Audiences
  • Facebook Login (Connect)
  • Facebook Widget
  • FireEye
  • FireMon Asset Manager
  • FortiGate SWG
  • Frame
  • FullStory
  • Gem
  • Google
  • Google AdWords Conversion
  • Google Cloud Platform
  • Google Play
  • Google Tag Manager
  • IBM ILOG CPLEX Optimization Studio
  • IBM Security QRadar SIEM
  • ISO+™
  • Intel
  • Jira
  • Junip
  • Linkedin Login
  • Linkedin Marketing Solutions
  • Linkedin Widget
  • LiveZilla
  • LogRhythm SIEM
  • Mapbox
  • Marketo
  • McAfee Total Protection for Data Loss (DLP)
  • Micro
  • Microsoft 365
  • Microsoft Active Directory Federation Services
  • Microsoft Azure
  • Microsoft Azure Monitor
  • Microsoft Defender for Cloud
  • Microsoft Entra ID
  • Microsoft Excel
  • Microsoft Office
  • Microsoft Office 365
  • Microsoft PowerPoint
  • Microsoft Project
  • Microsoft Windows Defender Antivirus
  • Microsoft Windows Server 2012
  • Mobile Friendly
  • Netskope
  • Nginx
  • Ning
  • ON24
  • Okta
  • OneTrust
  • OneTrust Tech Risk & Compliance
  • Oracle Database Security
  • Outlook
  • PHP
  • Palo Alto Networks
  • Palo Alto Next-Generation Firewall (NGFW)
  • Palo Alto Prisma Cloud
  • Ping Identity
  • Pipedrive
  • PowerBI Tiles
  • Proofpoint CASB
  • Python
  • Qualys Penetration Testing
  • Rapid7
  • Remote
  • SAM
  • SAS Enterprise Guide
  • SailPoint
  • SailPoint IdentityIQ
  • SailPoint IdentityNow
  • Salesforce
  • Salesforce CRM Analytics
  • Saviynt
  • Sectigo Certificate Manager
  • Security
  • SentinelOne
  • ServiceNow
  • SharePoint
  • Siemens PROFIBUS
  • Siemens SIMATIC S7
  • Skybox Security
  • Slack
  • Snort
  • SourceFire
  • SpingMetrics
  • Splunk
  • Splunk Enterprise Security
  • Splunk SOAR
  • StackStorm
  • Tanium
  • Tenable.sc
  • Terraform
  • Tor
  • Trend Micro XDR
  • Tufin Orchestration Suite
  • Twitter Advertising
  • UltraDns
  • VMware SD-WAN
  • Varnish
  • Vena
  • Vimeo
  • Visio
  • WP-Oauth
  • Wiz
  • WordPress.org
  • Workday Recruit
  • Zivver Email Encryption
  • Zscaler
  • Zscaler ZTNA
  • iTunes

Affiliated Organizations & Regional Branches

Read more