Rationalising and optimising cyber security

Optiv Security has introduced “EnemyPerspectives@Optiv,” an integrated suite of services that allows the modern organisation to evaluate its digital footprint from the perspective of a potential threat actor, from that actor’s intent, and then take prioritised steps to remediate weaknesses. EnemyPerspectives@Optiv is the latest example of how Optiv helps clients build sustainable, risk-centric foundations for implementing proactive and measurable security programs.

  • 5 years ago Posted in
"Today’s organisations continue to accelerate the adoption of digital business models and environments to remain competitive. While transforming business to the latest apps and services provides access to new customers through more targeted data, it also creates a wider attack surface for threat actors to exploit, and puts businesses at greater reputational and financial risk,” said Chad Holmes, Optiv’s chief services and operations officer. “The assumption that plug-and-play security technologies can thwart threat actors is only one piece of the puzzle. We need to turn things around – take a different perspective, the perspective of the attacker – in order to have a more complete view on the risks to our businesses. The attacker sees things differently. They have a different purpose. They may look at part of an enterprise’s IT stack and instead of seeing protection, they see potential.”

Holmes continued, “An organisation needs the right technologies deployed in the right ways, but it also needs insight into where vulnerabilities exist, based on demonstrated threat actor intent and behaviour. EnemyPerspectives@Optiv gives clients a superior program to address current threats with the ability to effectively assess and predict future threats. With this foundation in place, organisations can take the appropriate actions to become cyber resilient and proactively mitigate risk.”?

EnemyPerspectives@Optiv is aligned across three categories:

  • Threat Actor Profiling: Organisations that do not understand threat actors and their intentions are at a much higher risk of breach than those who do. Optiv combines tailored threat intelligence, Threat Emulation, and Breach Response War Games to help clients understand their adversaries, how they are likely to attack, and how best to respond when they do. The War Games are real-life drills where enterprise-wide breach and incident response processes are tested, evaluated and where necessary, improved.
  • Cyber Resiliency: Digital transformation is driving business to depend on information being “always on,” which requires high availability, accurate and fast detection and response to incidents, and minimal business disruption during remediation activities. Gone are the days when incident responders can just “take the network down” to respond to incidents, as such actions can have a drastic impact on business revenue in today’s digital environment. Applications and infrastructure need to remain functional even during incidents. Optiv enables clients to achieve cyber resiliency through a combination of services, including programmatic penetration testing, application security, and cloud-centric services. Optiv’s Orchestration and Automation, and Managed Detection and Response (MDR) services provide organisations with a 360 degree view to allow for fast detection, recovery, and response in today’s fast-moving threat landscape.
  • Incident Response: EnemyPerspectives@Optiv includes services that enable organisations to transform incident response from reactive “firefighting” to proactive defence. Key services include enterprise incident management, breach simulation and digital forensics.
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...