Merged from Accuvant and FishNet Security, Optiv helps its clients to enhance security and ensures uninterrupted flow of information by planning and supporting structured as well as coordinated functions. The company focuses on security architecture by optimizing the critical security requirements, principles, and operating models for improving overall organization performance. It implements cybersecurity solutions in three steps—planning, configuration, and deployment. After the deployment stage, Optiv provides the information regarding the usage and maintenance of the systems along with documentation about configurations, findings, and recommendations to the clients to run their enterprises securely efficiently and effectively.
Optiv’s risk management approach involves six steps— Identifying and assessing the probable risk events, making a cost-benefit analysis of response alternatives, selecting a suitable and feasible response, re-assessing probability and impact of that response, and continuous monitoring of risky events. The company helps its clients to incorporate Governance, Risk and Compliance (GRC) technology which automates the management and maintenance of GRC programs.
Our unique ability to deliver security programs that combine products and services, people, processes, strategies, and tactics allows us to tightly partner with our clients
“Our unique ability to deliver security programs that combine products and services, people, processes, strategies, and tactics allows us to tightly partner with our clients, assemble the right solution for their specific needs, and apply it to their business priorities,” says Burns. In one instance, a growing manufacturing firm through Merger and Acquisition activities awas challenged with embryonic security architecture and was ambiguous about compliance objectives. The firm wanted to enhance its current operations through heightened security infrastructure. Optiv established a governance committee which delineated the security objectives and determined the required security capabilities for each activity. Then it evaluated the existing security practices in the firm so as to ascertain the capabilities and prioritized the security activities and future practices to mitigate risks. As a result, the firm was able to implement a sound security infrastructure which streamlined its overall operations.
For the future, Optiv is planning to diversify its operations all around the globe. “Our plan is to continue to expand our company’s presence in Colorado, Kansas, across the country, and ultimately around the world so that we can more effectively meet the largest organizations needs,” concludes Burns.