OPTIV INC in Cybersecurity Software

Features

Optiv offer information security consulting and security services that cover the entire cybersecurity space. From defining strategy and identifying threats to deploying the right technology and ensuring operational readiness. Optiv assists clients plan, develop and execute cybersecurity protection programs.

Key Features

  • Threat and Vulnerability Management, with hands-on expertise that solves specific security challenges by identifying and remediating vulnerabilities and threats
  • Enterprise Incident Management, enabling clients to quickly move from crisis to continuity when an incident occurs
  • Security Architecture and Implementation, navigating complex environments to help clients realize optimal value from their architecture, projects and technology decisions
  • Education and Awareness, including training in information security management and in the behaviors that can reduce risk and improve security.
  • Identity and Access Management, developing intelligent access solutions to reduce risk and drive business.
  • Managed Security Services, serving as a remote extension of a client’s IT team to strengthen defenses and security response
  • Cyber Security Partnerships, a network of cyber security companies with specialized skills to ensure protection from any kind of vulnerability
Show More

USP :

Optiv integrates the deep skills of application security with the knowledge and insight of a broader security solutions. Optiv Security provides a security solution that allows organizations to mitigate risk by taking a planned method to cybersecurity. It’s aligned security programs to achieve specific business outcomes with full suite of service abilities from strategy to technology. It reduces security risks by designing an AppSec program that secures growing application environment and meets compliance requirements. It measures development practices and the efficiency of software development lifecycle (SDLC) frameworks to design a complete application security program.

BUYERS
VENDORS
EXPERTS
2.2
ANALYSTS
 

OPTIV INC detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Breadth and Depth of Product Offerings
1.45
3.00
0.85
Product Features and Functionality
3.60
5.00
2.40
Delivery
3.00
1.15
0.65
Support and Services
3.75
4.60
4.25
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

OPTIV INC has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Asia-Pacific

    21 Participants

  • Niche Quadrant

    All-North America

    25 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Product Maturity / Services
    Professional Services
  • Company Maturity / Mergers and Acquisitions Strategy
    M&A
  • Product Maturity / Support and Services
    Customer Redressal Mechanism/Program
  • Product Maturity / Support and Services
    Level of Support
  • Product Maturity / Professional Services
    Consulting
  • Product Maturity / Professional Services
    Risk & Threat Assessment
  • Product Maturity / Professional Services
    Support and Maintenance
  • Product Maturity / Professional Services
    Training and Education
  • Company Maturity / Vision Alignment
    New Customers Acquired (Last 1 year)
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Security Type
    Application 
  • Product Maturity / Security Type
    Cloud 
  • Product Maturity / Security Type
    Endpoint 
  • Product Maturity / Security Type
    Network 
  • Product Maturity / Channel of Delivery
    Directly
  • Company Maturity / Geographic Footprint
    Direct Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Direct Presence - Europe
  • Company Maturity / Geographic Footprint
    Direct Presence - North America
  • Company Maturity / Geographic Footprint
    Indirect Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Indirect Presence - Europe
WEAKNESSES
  • Product Maturity / Breadth and Depth of Product Offerings
    Licenses
  • Product Maturity / Services
    Managed Services
  • Company Maturity / Breadth of Applications Served
    Industry Vertical Addition
  • Company Maturity / Breadth of Applications Served
    Tailor-made/customized Solutions
  • Company Maturity / Mergers and Acquisitions Strategy
    Joint Ventures
  • Company Maturity / Mergers and Acquisitions Strategy
    New Partnerships and Collaborations
  • Company Maturity / Channel Strategy and Fit
    Business Expansion Strategy
  • Company Maturity / Channel Strategy and Fit
    Distibutors Landscape
  • Company Maturity / Viability
    Growth Rate
  • Product Maturity / Add-on Product/Solutions
    Compliance Management
  • Product Maturity / Add-on Product/Solutions
    Incident Response
  • Product Maturity / Add-on Product/Solutions
    Others
  • Company Maturity / Vision Alignment
    Patents Registered
  • Company Maturity / Vision Alignment
    Product Launches
  • Company Maturity / Vision Alignment
    R&D Spend
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity / Add-on Product/Solutions
    Security Monitoring
  • Product Maturity / Security Type
    Wireless 
  • Company Maturity / Geographic Footprint
    Direct Presence - Latin America
  • Company Maturity / Geographic Footprint
    Direct Presence - Middle East and Africa

Have you EVER used OPTIV INC Products?

Share your experience with potential buyers.

TOP USECASES
TOP FEATURES
  • Product Features and Functionality
    Professional Services
  • Security Type
    Application 
  • End Users
    Others, Please Specify
  • Services
    Professional Services
  • Channel for Delivery of Support Services
    On-Site Support
  • Professional Services
    Training and Education
  • Security Type
    Cloud 
  • Security Type
    Endpoint 
  • Pre Sales Support
    Product Demos
  • Professional Services
    Risk & Threat Assessment

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Looking for Cybersecurity Software? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS