SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
2018 North American Managed & Professional Security Services
Competitive Strategy Innovation and Leadership Award
2018
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 2 “We Accelerate Growth”
Contents
Background and Company Performance Industry Challenges ......................................................... 3
Strategy Innovation and Customer Impact ........................................................................... 3
Conclusion........................................................................................................................ 6
Significance of Competitive Strategy Innovation and Leadership .................................................... 7
Understanding Competitive Strategy Innovation and Leadership .................................................... 7
Key Benchmarking Criteria ................................................................................................. 8
Strategy Innovation........................................................................................................... 8
Customer Impact .............................................................................................................. 8
Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices ...... 9
The Intersection between 360-Degree Research and Best Practices Awards....................................10
Research Methodology ......................................................................................................10
About Frost & Sullivan .............................................................................................................10
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 3 “We Accelerate Growth”
Background and Company Performance
Industry Challenges
The practice of cybersecurity is challenging and no company is immune from these
challenges. Topmost of the challenges is the threat actors. They are in relentless pursuit
of victims, show no mercy, and spend money to make money. This “commercialization” of
attack tactics (various types of malware delivery vehicles), technology (e.g., big data
analytics), and procedures (if-then game plans) leave the unprepared victims that much
more vulnerable to exploitation.
In response, organizations have increased their spending on cybersecurity technologies
and staffing. This has not been uniformly effective for two reasons. First, as more security
technologies have been added, the administrative complexity grows leading to sub-
optimized cybersecurity practices, and protection gaps for attackers to exploit. Moreover,
a leading complaint among companies is that they already have too much technology and
they are looking to strengthen their risk management through simplification. Second, the
practice of cybersecurity requires people, process, and technology. But with the demand
for cybersecurity expertise increasing, a bidding war has ensued raising salaries and
weakening retention. Combined, the cost of in-house cybersecurity is rising and personnel
churn undermines an organization’s quest to establish, adapt, and maintain best practice
operations; further undermining their efforts to combat attackers and, for some, hindering
their aspirations in digital transformation.
Third, the attack surface is both distributed and dynamic. Cloud service adoption and
mobile device usage, for example, place more of an organization’s operations and assets
that require protection over a wider surface area. Also, this surface area changes as
organizations leverage information technology (IT) in its varied and evolving forms to
serve their business and customer needs and compete in increasingly borderless markets.
Attackers are well aware of this dynamic and the practicality of the “chain only being as
strong as its weakest link.” Consequently, this broadening and undulating attack surface
places organizations at greater risk unless their cybersecurity practices can expand and
adapt in equal measure.
Cybersecurity is in an era of perpetual change and, at the same time, the strategic
importance of cybersecurity is escalating. For companies, complacency in evolving and
strengthening their cybersecurity practices represents their most significant risk. Failure to
change can lead to dire consequences.
Strategy Innovation and Customer Impact
Supporting our selection of Optiv for this Best Practice recognition, the following criteria
were evaluated.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 4 “We Accelerate Growth”
Competitive Differentiation
The competitive playing field in managed & professional security services is highly diverse.
For a vast number of the market players, security services are an element of their
businesses rather than their business. Optiv, on the other hand, is a Security Solutions
Integrator, that couples deep cyber security expertise with proven planning,
implementation, and management services to optimize client infrastructure, operations,
and governance. Its only business has been security services and all evidence, as
presented in the other recognition criteria, demonstrates this exclusivity of purpose.
As companies are faced with choice on who to partner with in their cybersecurity journeys,
they are justified in asking the variety of providers knocking on their doors, “what is your
cybersecurity pedigree, and are you committed to cybersecurity and do your past and
planned investments reflect unwavering commitment?” Optiv has the proof points to
stamp those questions with an unequivocal affirmative.
Strategic Execution
Cybersecurity, as referenced earlier is complex, and, correspondingly, there is no silver
bullet solution. Rather a broad portfolio of service offerings is essential to address clients’
cybersecurity needs. Moreover, client needs differ and change over time based on several
factors including but not limited to: competitive environment, risk tolerance, maturity of
internal capabilities, regulatory obligations, cyber threats, and engagement needs (e.g.,
strategic projects versus operations).
Through a combination of acquisitions and internal development, Optiv has built one of
the broadest portfolios of service offerings. Steeped in professional security services,
Optiv has also rapidly expanded its managed security services portfolio with material
business success as evident by growing revenues at a pace that exceeds the managed
security services industry in North America.
Recognizing that clients will view cybersecurity from an “issue” perspective, Optiv has also
leveraged its in-house capabilities to construct solutions for an assortment of prevalent
and pressing client issues, such as: cloud security, enterprise security architecture,
advanced threats, Internet of Things (IoT), next-generation operations, security
intelligence, and General Data Protection Regulation (GDPR). And as noted next, Optiv has
shown a proclivity to develop and enhance distinctive service offerings, all intended to
align with and enable the business through security.
Strategy Effectiveness
Broadness in service offerings is essential to be a sought-after provider, but the provider
must also show offer distinctiveness. In that regard, Frost & Sullivan notes Optiv’s
aggressiveness in identifying areas of offer distinction (Identity & Access Management-
IAM, Third-party Risk Management-TPRM, and cyber threat intelligence-as-a-service) and
then building on these offers to deepen alignment with clients’ evolving needs.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 5 “We Accelerate Growth”
Pertaining to IAM, a long-standing Optiv offering, Optiv acquired Advancive LLC, a
provider of IAM services and solutions in April 2016. More recently, Optiv announced the
availability of an Identity Centric Security Workshop to assist clients in improving their
IAM programs, and a Ping Identity – Netskope Integrated Solution to support clients in
context-based authentication and access policy enforcement for cloud applications.
With respect to TPRM, Optiv acquired assets of Evantix, a provider of a Software-as-a-
Service (SaaS) application for managing third-party risk, in May 2016. Five months later,
Optiv announced major enhancements to its TPRM suite with a focus on holistic and
lifecycle attributes. In November 2016, the Evantix 5.0 update was released, focusing on
improved scalability and visibility into risk assessment lifecycles and tracking of
remediation issues. More recently in May 2017, Optiv announced the integration of
BitSight’s risk monitoring ratings into the Evantix platform.
Also in 2017, Optiv launched its cyber threat intelligence-as-a-service offering in January.
And, in another acquire-to-expand move, Optiv acquired Decision Lab, a big data,
automation and orchestration services company, in November 2017. Assuming
consistency with previous acquisitions, we anticipated that additional solution
enhancements in advanced security analytics and big data services will occur in 2018.
Partner Engagement Experience
Cybersecurity complexity has many tentacles and one that should not be overlooked is the
complexity associated with partner engagements. Simply, the more partners a client has
in supporting its cybersecurity endeavors further complicates a likely client scenario of
technology and vendor sprawl in deployed security platforms and appliances. Optiv’s
lengthy tenure in offering security services and serving clients of varied backgrounds,
deep technical expertise, and broad managed and professional security services portfolio
presents potential and existing clients the means to consolidate their partner
engagements. In doing so, partner engagement is simplified and intimacy between
provider and client grows; a benefit in robust partnerships.
Customer Service Experience
With a foundation in professional security services, its physical proximity to clients has
been instrumental to Optiv’s success. That proximity directly contributes to Optiv’s ability
to demonstrate first-hand technical expertise and customer service passion;
demonstrations that are more difficult in remote settings. Moreover, Optiv’s acquisitions,
inclusive of acquired companies’ consultants and practitioners, of Adaptive
Communications (June 2016) and Comm Solutions (March 2017) strengthened Optiv’s
physical presence in the Northeast region of the United States and the November 2017
acquisition of Conexsys accomplished the same in Canada. Additionally, Optiv established
a presence in Bangalore, India, and is increasing its base in Europe, both organically and
inorganically. Reflective of its expanding geographic presence and in response to security
breaches, Optiv can place an experienced analyst on-site with the client in 24-48 hours,
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 6 “We Accelerate Growth”
Optiv believes in fostering a close physical presence with its client base to support the
business relationship as a trusted partner.
Brand Equity
Born out of the 2015 merger of Accuvant and FishNet Security, the Optiv brand was
quickly established. The aforementioned investments in offerings, capabilities, and
geographic presence are clear demonstrations that the company is genuinely intent on
growing and solidifying its brand. Like its clients, complacency is not an Optiv attribute.
Further funding the company’s means was the February 2017 acquisition of Optiv by KKR,
a global investment firm. In summary, all evidence points to an Optiv brand that will
continue to expand and strengthen in the years ahead.
Conclusion
Cybersecurity is a strategic imperative to all companies in this digital age. At the same,
the pace of change in cyber threats, assets that must be protected, and the web of
operational interactivity contributes to a dynamic and complex scenario where few
companies can feel confident in relying exclusively on their own cybersecurity capabilities.
In essence, a trusted partner has become essential. Optiv has the experience and
capabilities of a trusted partner in cybersecurity. Furthermore, Frost & Sullivan’s market
analysis substantives this point as Optiv is the largest pure-play managed and
professional security services provider in North America as measured in 2016 revenues.
And in a market dominated by conglomerates of much larger size, Optiv distinguishes
itself as being among top five in market share where the difference between first and fifth
is less than five percentage points.
With its strong overall performance, Optiv has earned Frost & Sullivan’s 2018 Competitive
Strategy Innovation and Leadership Award in the North America Managed and Professional
Security Services market.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 7 “We Accelerate Growth”
Significance of Competitive Strategy Innovation and
Leadership
Any successful approach to achieving top-line growth must (1) take into account what
competitors are, and are not, doing; (2) meet customer demand with a comprehensive,
value-driven product or service portfolio; and (3) establish a brand that resonates deeply
with customers and stands apart from other providers. Companies must succeed in these
three areas—brand, demand, and positioning—to achieve best-practice levels in
competitive strategy.
Understanding Competitive Strategy Innovation and
Leadership
As discussed above, driving demand, brand strength, and competitive differentiation all
play a critical role in delivering unique value to customers. This three-fold focus, however,
must ideally be complemented by an equally rigorous focus on Strategy Innovation and
Customer Impact.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 8 “We Accelerate Growth”
Key Benchmarking Criteria
For the Competitive Strategy Innovation and Leadership Award, Frost & Sullivan analysts
independently evaluated two key factors—Strategy Innovation and Customer Impact—
according to the criteria identified below.
Strategy Innovation
Criterion 1: Strategy Effectiveness
Requirement: Strategy effectively balances short-term performance needs with long-term
aspirations and vision for the company.
Criterion 2: Strategy Execution
Requirement: Adoption of best-in-class processes supports the efficient and consistent
implementation of business strategy.
Criterion 3: Competitive Differentiation
Requirement: Unique competitive advantages with regard to solution or product are
clearly articulated and well accepted within the industry.
Criterion 4: Executive Team Alignment
Requirement: The executive team is aligned along the organization’s mission, vision,
strategy, and execution.
Criterion 5: Stakeholder Integration
Requirement: Strategy reflects the needs or circumstances of all industry stakeholders,
including competitors, customers, investors, and employees.
Customer Impact
Criterion 1: Price/Performance Value
Requirement: Products or services offer the best value for the price, compared to similar
offerings in the market.
Criterion 2: Customer Purchase Experience
Requirement: Customers feel they are buying the most optimal solution that addresses
both their unique needs and their unique constraints.
Criterion 3: Customer Ownership Experience
Requirement: Customers are proud to own the company’s product or service and have a
positive experience throughout the life of the product or service.
Criterion 4: Customer Service Experience
Requirement: Customer service is accessible, fast, stress-free, and of high quality.
Criterion 5: Brand Equity
Requirement: Customers have a positive view of the brand and exhibit high brand loyalty.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 9 “We Accelerate Growth”
Best Practices Recognition: 10 Steps to Researching,
Identifying, and Recognizing Best Practices
Frost & Sullivan analysts follow a 10-step process to evaluate Award candidates and
assess their fit with select best practice criteria. The reputation and integrity of the
Awards are based on close adherence to this process.
STEP OBJECTIVE KEY ACTIVITIES OUTPUT
1
Monitor,
target, and
screen
Identify Award recipient
candidates from around the
globe
• Conduct in-depth industry
research
• Identify emerging sectors
• Scan multiple geographies
Pipeline of candidates who
potentially meet all best-
practice criteria
2
Perform
360-degree
research
Perform comprehensive,
360-degree research on all
candidates in the pipeline
• Interview thought leaders
and industry practitioners
• Assess candidates’ fit with
best-practice criteria
• Rank all candidates
Matrix positioning all
candidates’ performance
relative to one another
3
Invite
thought
leadership in
best
practices
Perform in-depth
examination of all candidates
• Confirm best-practice criteria
• Examine eligibility of all
candidates
• Identify any information gaps
Detailed profiles of all
ranked candidates
4
Initiate
research
director
review
Conduct an unbiased
evaluation of all candidate
profiles
• Brainstorm ranking options
• Invite multiple perspectives
on candidates’ performance
• Update candidate profiles
Final prioritization of all
eligible candidates and
companion best-practice
positioning paper
5
Assemble
panel of
industry
experts
Present findings to an expert
panel of industry thought
leaders
• Share findings
• Strengthen cases for
candidate eligibility
• Prioritize candidates
Refined list of prioritized
Award candidates
6
Conduct
global
industry
review
Build consensus on Award
candidates’ eligibility
• Hold global team meeting to
review all candidates
• Pressure-test fit with criteria
• Confirm inclusion of all
eligible candidates
Final list of eligible Award
candidates, representing
success stories worldwide
7
Perform
quality check
Develop official Award
consideration materials
• Perform final performance
benchmarking activities
• Write nominations
• Perform quality review
High-quality, accurate, and
creative presentation of
nominees’ successes
8
Reconnect
with panel of
industry
experts
Finalize the selection of the
best-practice Award recipient
• Review analysis with panel
• Build consensus
• Select recipient
Decision on which company
performs best against all
best-practice criteria
9
Communicate
recognition
Inform Award recipient of
Award recognition
• Present Award to the CEO
• Inspire the organization for
continued success
• Celebrate the recipient’s
performance
Announcement of Award
and plan for how recipient
can use the Award to
enhance the brand
10
Take
strategic
action
Upon licensing, company
may share Award news with
stakeholders and customers
• Coordinate media outreach
• Design a marketing plan
• Assess Award’s role in future
strategic planning
Widespread awareness of
recipient’s Award status
among investors, media
personnel, and employees
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 10 “We Accelerate Growth”
The Intersection between 360-Degree Research and Best
Practices Awards
Research Methodology
Frost & Sullivan’s 360-degree research
methodology represents the analytical
rigor of our research process. It offers a
360-degree-view of industry challenges,
trends, and issues by integrating all 7 of
Frost & Sullivan's research methodologies.
Too often, companies make important
growth decisions based on a narrow
understanding of their environment,
leading to errors of both omission and
commission. Successful growth strategies
are founded on a thorough understanding
of market, technical, economic, financial,
customer, best practices, and demographic
analyses. The integration of these research
disciplines into the 360-degree research
methodology provides an evaluation
platform for benchmarking industry
participants and for identifying those performing at best-in-class levels.
About Frost & Sullivan
Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth
and achieve best in class positions in growth, innovation and leadership. The company's
Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined
research and best practice models to drive the generation, evaluation and implementation
of powerful growth strategies. Frost & Sullivan leverages more than 50 years of
experience in partnering with Global 1000 companies, emerging businesses and the
investment community from 45 offices on six continents. To join our Growth Partnership,
please visit http://www.frost.com.
360-DEGREE RESEARCH: SEEING ORDER IN
THE CHAOS

Weitere ähnliche Inhalte

Was ist angesagt?

CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powellCWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powellCapgemini
 
Dissertation - Cyber Security
Dissertation - Cyber Security Dissertation - Cyber Security
Dissertation - Cyber Security Alysha Paulsen
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudCapgemini
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Kevin Duffey
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesKevin Duffey
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Indexaccenture
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitLluis Altes
 
7 Experts on Transforming Customer Experience with Data Insights (1)
7 Experts on Transforming Customer Experience with Data Insights (1)7 Experts on Transforming Customer Experience with Data Insights (1)
7 Experts on Transforming Customer Experience with Data Insights (1)Mighty Guides, Inc.
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Enterprise Management Associates
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Kevin Duffey
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Navdeep Arora
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwCACCASG Community Manager
 

Was ist angesagt? (20)

CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powellCWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
 
Dissertation - Cyber Security
Dissertation - Cyber Security Dissertation - Cyber Security
Dissertation - Cyber Security
 
The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 
The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Index
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company split
 
7 Experts on Transforming Customer Experience with Data Insights (1)
7 Experts on Transforming Customer Experience with Data Insights (1)7 Experts on Transforming Customer Experience with Data Insights (1)
7 Experts on Transforming Customer Experience with Data Insights (1)
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
 

Ähnlich wie Optiv Security Award Write Up

State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016Tim Grieveson
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfMr. Business Magazine
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...RapidValue
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 

Ähnlich wie Optiv Security Award Write Up (20)

State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Digital Insurance
Digital InsuranceDigital Insurance
Digital Insurance
 
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Forrester Emerging MSSP Wave
Forrester Emerging MSSP WaveForrester Emerging MSSP Wave
Forrester Emerging MSSP Wave
 

Mehr von Claudia Toscano

Compliancequest Award Write Up
Compliancequest Award Write UpCompliancequest Award Write Up
Compliancequest Award Write UpClaudia Toscano
 
Siemens Healthineers Award Write Up
Siemens Healthineers Award Write UpSiemens Healthineers Award Write Up
Siemens Healthineers Award Write UpClaudia Toscano
 
Proofpoint Email Security Award Write Up
Proofpoint  Email Security Award Write UpProofpoint  Email Security Award Write Up
Proofpoint Email Security Award Write UpClaudia Toscano
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpClaudia Toscano
 
WENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGWENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGClaudia Toscano
 
Intermedia Award Write Up
Intermedia Award Write UpIntermedia Award Write Up
Intermedia Award Write UpClaudia Toscano
 
NanoXplore Award Write Up
NanoXplore Award Write UpNanoXplore Award Write Up
NanoXplore Award Write UpClaudia Toscano
 
Zf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpZf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpClaudia Toscano
 
INTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpINTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpClaudia Toscano
 
Zonar Systems Award Write Up
Zonar Systems Award Write UpZonar Systems Award Write Up
Zonar Systems Award Write UpClaudia Toscano
 

Mehr von Claudia Toscano (20)

Compliancequest Award Write Up
Compliancequest Award Write UpCompliancequest Award Write Up
Compliancequest Award Write Up
 
Flex Award Write Up
Flex Award Write UpFlex Award Write Up
Flex Award Write Up
 
Guardhat Award Write Up
Guardhat Award Write UpGuardhat Award Write Up
Guardhat Award Write Up
 
Siemens Healthineers Award Write Up
Siemens Healthineers Award Write UpSiemens Healthineers Award Write Up
Siemens Healthineers Award Write Up
 
Proofpoint Email Security Award Write Up
Proofpoint  Email Security Award Write UpProofpoint  Email Security Award Write Up
Proofpoint Email Security Award Write Up
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write Up
 
WENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGWENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KG
 
Biamp Award Write Up
Biamp Award Write UpBiamp Award Write Up
Biamp Award Write Up
 
Intermedia Award Write Up
Intermedia Award Write UpIntermedia Award Write Up
Intermedia Award Write Up
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
GenCell Award Write Up
GenCell Award Write UpGenCell Award Write Up
GenCell Award Write Up
 
Huawei Award Write Up
Huawei Award Write UpHuawei Award Write Up
Huawei Award Write Up
 
NanoXplore Award Write Up
NanoXplore Award Write UpNanoXplore Award Write Up
NanoXplore Award Write Up
 
3M Award Write Up
3M Award Write Up3M Award Write Up
3M Award Write Up
 
3M Award Write Up
3M Award Write Up3M Award Write Up
3M Award Write Up
 
Zf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpZf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write Up
 
Koxka Award Write Up
Koxka Award Write UpKoxka Award Write Up
Koxka Award Write Up
 
Optum Award Write Up
Optum Award Write UpOptum Award Write Up
Optum Award Write Up
 
INTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpINTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write Up
 
Zonar Systems Award Write Up
Zonar Systems Award Write UpZonar Systems Award Write Up
Zonar Systems Award Write Up
 

Kürzlich hochgeladen

BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 

Kürzlich hochgeladen (20)

BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

Optiv Security Award Write Up

  • 1. 2018 North American Managed & Professional Security Services Competitive Strategy Innovation and Leadership Award 2018
  • 2. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 2 “We Accelerate Growth” Contents Background and Company Performance Industry Challenges ......................................................... 3 Strategy Innovation and Customer Impact ........................................................................... 3 Conclusion........................................................................................................................ 6 Significance of Competitive Strategy Innovation and Leadership .................................................... 7 Understanding Competitive Strategy Innovation and Leadership .................................................... 7 Key Benchmarking Criteria ................................................................................................. 8 Strategy Innovation........................................................................................................... 8 Customer Impact .............................................................................................................. 8 Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices ...... 9 The Intersection between 360-Degree Research and Best Practices Awards....................................10 Research Methodology ......................................................................................................10 About Frost & Sullivan .............................................................................................................10
  • 3. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 3 “We Accelerate Growth” Background and Company Performance Industry Challenges The practice of cybersecurity is challenging and no company is immune from these challenges. Topmost of the challenges is the threat actors. They are in relentless pursuit of victims, show no mercy, and spend money to make money. This “commercialization” of attack tactics (various types of malware delivery vehicles), technology (e.g., big data analytics), and procedures (if-then game plans) leave the unprepared victims that much more vulnerable to exploitation. In response, organizations have increased their spending on cybersecurity technologies and staffing. This has not been uniformly effective for two reasons. First, as more security technologies have been added, the administrative complexity grows leading to sub- optimized cybersecurity practices, and protection gaps for attackers to exploit. Moreover, a leading complaint among companies is that they already have too much technology and they are looking to strengthen their risk management through simplification. Second, the practice of cybersecurity requires people, process, and technology. But with the demand for cybersecurity expertise increasing, a bidding war has ensued raising salaries and weakening retention. Combined, the cost of in-house cybersecurity is rising and personnel churn undermines an organization’s quest to establish, adapt, and maintain best practice operations; further undermining their efforts to combat attackers and, for some, hindering their aspirations in digital transformation. Third, the attack surface is both distributed and dynamic. Cloud service adoption and mobile device usage, for example, place more of an organization’s operations and assets that require protection over a wider surface area. Also, this surface area changes as organizations leverage information technology (IT) in its varied and evolving forms to serve their business and customer needs and compete in increasingly borderless markets. Attackers are well aware of this dynamic and the practicality of the “chain only being as strong as its weakest link.” Consequently, this broadening and undulating attack surface places organizations at greater risk unless their cybersecurity practices can expand and adapt in equal measure. Cybersecurity is in an era of perpetual change and, at the same time, the strategic importance of cybersecurity is escalating. For companies, complacency in evolving and strengthening their cybersecurity practices represents their most significant risk. Failure to change can lead to dire consequences. Strategy Innovation and Customer Impact Supporting our selection of Optiv for this Best Practice recognition, the following criteria were evaluated.
  • 4. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 4 “We Accelerate Growth” Competitive Differentiation The competitive playing field in managed & professional security services is highly diverse. For a vast number of the market players, security services are an element of their businesses rather than their business. Optiv, on the other hand, is a Security Solutions Integrator, that couples deep cyber security expertise with proven planning, implementation, and management services to optimize client infrastructure, operations, and governance. Its only business has been security services and all evidence, as presented in the other recognition criteria, demonstrates this exclusivity of purpose. As companies are faced with choice on who to partner with in their cybersecurity journeys, they are justified in asking the variety of providers knocking on their doors, “what is your cybersecurity pedigree, and are you committed to cybersecurity and do your past and planned investments reflect unwavering commitment?” Optiv has the proof points to stamp those questions with an unequivocal affirmative. Strategic Execution Cybersecurity, as referenced earlier is complex, and, correspondingly, there is no silver bullet solution. Rather a broad portfolio of service offerings is essential to address clients’ cybersecurity needs. Moreover, client needs differ and change over time based on several factors including but not limited to: competitive environment, risk tolerance, maturity of internal capabilities, regulatory obligations, cyber threats, and engagement needs (e.g., strategic projects versus operations). Through a combination of acquisitions and internal development, Optiv has built one of the broadest portfolios of service offerings. Steeped in professional security services, Optiv has also rapidly expanded its managed security services portfolio with material business success as evident by growing revenues at a pace that exceeds the managed security services industry in North America. Recognizing that clients will view cybersecurity from an “issue” perspective, Optiv has also leveraged its in-house capabilities to construct solutions for an assortment of prevalent and pressing client issues, such as: cloud security, enterprise security architecture, advanced threats, Internet of Things (IoT), next-generation operations, security intelligence, and General Data Protection Regulation (GDPR). And as noted next, Optiv has shown a proclivity to develop and enhance distinctive service offerings, all intended to align with and enable the business through security. Strategy Effectiveness Broadness in service offerings is essential to be a sought-after provider, but the provider must also show offer distinctiveness. In that regard, Frost & Sullivan notes Optiv’s aggressiveness in identifying areas of offer distinction (Identity & Access Management- IAM, Third-party Risk Management-TPRM, and cyber threat intelligence-as-a-service) and then building on these offers to deepen alignment with clients’ evolving needs.
  • 5. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 5 “We Accelerate Growth” Pertaining to IAM, a long-standing Optiv offering, Optiv acquired Advancive LLC, a provider of IAM services and solutions in April 2016. More recently, Optiv announced the availability of an Identity Centric Security Workshop to assist clients in improving their IAM programs, and a Ping Identity – Netskope Integrated Solution to support clients in context-based authentication and access policy enforcement for cloud applications. With respect to TPRM, Optiv acquired assets of Evantix, a provider of a Software-as-a- Service (SaaS) application for managing third-party risk, in May 2016. Five months later, Optiv announced major enhancements to its TPRM suite with a focus on holistic and lifecycle attributes. In November 2016, the Evantix 5.0 update was released, focusing on improved scalability and visibility into risk assessment lifecycles and tracking of remediation issues. More recently in May 2017, Optiv announced the integration of BitSight’s risk monitoring ratings into the Evantix platform. Also in 2017, Optiv launched its cyber threat intelligence-as-a-service offering in January. And, in another acquire-to-expand move, Optiv acquired Decision Lab, a big data, automation and orchestration services company, in November 2017. Assuming consistency with previous acquisitions, we anticipated that additional solution enhancements in advanced security analytics and big data services will occur in 2018. Partner Engagement Experience Cybersecurity complexity has many tentacles and one that should not be overlooked is the complexity associated with partner engagements. Simply, the more partners a client has in supporting its cybersecurity endeavors further complicates a likely client scenario of technology and vendor sprawl in deployed security platforms and appliances. Optiv’s lengthy tenure in offering security services and serving clients of varied backgrounds, deep technical expertise, and broad managed and professional security services portfolio presents potential and existing clients the means to consolidate their partner engagements. In doing so, partner engagement is simplified and intimacy between provider and client grows; a benefit in robust partnerships. Customer Service Experience With a foundation in professional security services, its physical proximity to clients has been instrumental to Optiv’s success. That proximity directly contributes to Optiv’s ability to demonstrate first-hand technical expertise and customer service passion; demonstrations that are more difficult in remote settings. Moreover, Optiv’s acquisitions, inclusive of acquired companies’ consultants and practitioners, of Adaptive Communications (June 2016) and Comm Solutions (March 2017) strengthened Optiv’s physical presence in the Northeast region of the United States and the November 2017 acquisition of Conexsys accomplished the same in Canada. Additionally, Optiv established a presence in Bangalore, India, and is increasing its base in Europe, both organically and inorganically. Reflective of its expanding geographic presence and in response to security breaches, Optiv can place an experienced analyst on-site with the client in 24-48 hours,
  • 6. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 6 “We Accelerate Growth” Optiv believes in fostering a close physical presence with its client base to support the business relationship as a trusted partner. Brand Equity Born out of the 2015 merger of Accuvant and FishNet Security, the Optiv brand was quickly established. The aforementioned investments in offerings, capabilities, and geographic presence are clear demonstrations that the company is genuinely intent on growing and solidifying its brand. Like its clients, complacency is not an Optiv attribute. Further funding the company’s means was the February 2017 acquisition of Optiv by KKR, a global investment firm. In summary, all evidence points to an Optiv brand that will continue to expand and strengthen in the years ahead. Conclusion Cybersecurity is a strategic imperative to all companies in this digital age. At the same, the pace of change in cyber threats, assets that must be protected, and the web of operational interactivity contributes to a dynamic and complex scenario where few companies can feel confident in relying exclusively on their own cybersecurity capabilities. In essence, a trusted partner has become essential. Optiv has the experience and capabilities of a trusted partner in cybersecurity. Furthermore, Frost & Sullivan’s market analysis substantives this point as Optiv is the largest pure-play managed and professional security services provider in North America as measured in 2016 revenues. And in a market dominated by conglomerates of much larger size, Optiv distinguishes itself as being among top five in market share where the difference between first and fifth is less than five percentage points. With its strong overall performance, Optiv has earned Frost & Sullivan’s 2018 Competitive Strategy Innovation and Leadership Award in the North America Managed and Professional Security Services market.
  • 7. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 7 “We Accelerate Growth” Significance of Competitive Strategy Innovation and Leadership Any successful approach to achieving top-line growth must (1) take into account what competitors are, and are not, doing; (2) meet customer demand with a comprehensive, value-driven product or service portfolio; and (3) establish a brand that resonates deeply with customers and stands apart from other providers. Companies must succeed in these three areas—brand, demand, and positioning—to achieve best-practice levels in competitive strategy. Understanding Competitive Strategy Innovation and Leadership As discussed above, driving demand, brand strength, and competitive differentiation all play a critical role in delivering unique value to customers. This three-fold focus, however, must ideally be complemented by an equally rigorous focus on Strategy Innovation and Customer Impact.
  • 8. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 8 “We Accelerate Growth” Key Benchmarking Criteria For the Competitive Strategy Innovation and Leadership Award, Frost & Sullivan analysts independently evaluated two key factors—Strategy Innovation and Customer Impact— according to the criteria identified below. Strategy Innovation Criterion 1: Strategy Effectiveness Requirement: Strategy effectively balances short-term performance needs with long-term aspirations and vision for the company. Criterion 2: Strategy Execution Requirement: Adoption of best-in-class processes supports the efficient and consistent implementation of business strategy. Criterion 3: Competitive Differentiation Requirement: Unique competitive advantages with regard to solution or product are clearly articulated and well accepted within the industry. Criterion 4: Executive Team Alignment Requirement: The executive team is aligned along the organization’s mission, vision, strategy, and execution. Criterion 5: Stakeholder Integration Requirement: Strategy reflects the needs or circumstances of all industry stakeholders, including competitors, customers, investors, and employees. Customer Impact Criterion 1: Price/Performance Value Requirement: Products or services offer the best value for the price, compared to similar offerings in the market. Criterion 2: Customer Purchase Experience Requirement: Customers feel they are buying the most optimal solution that addresses both their unique needs and their unique constraints. Criterion 3: Customer Ownership Experience Requirement: Customers are proud to own the company’s product or service and have a positive experience throughout the life of the product or service. Criterion 4: Customer Service Experience Requirement: Customer service is accessible, fast, stress-free, and of high quality. Criterion 5: Brand Equity Requirement: Customers have a positive view of the brand and exhibit high brand loyalty.
  • 9. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 9 “We Accelerate Growth” Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices Frost & Sullivan analysts follow a 10-step process to evaluate Award candidates and assess their fit with select best practice criteria. The reputation and integrity of the Awards are based on close adherence to this process. STEP OBJECTIVE KEY ACTIVITIES OUTPUT 1 Monitor, target, and screen Identify Award recipient candidates from around the globe • Conduct in-depth industry research • Identify emerging sectors • Scan multiple geographies Pipeline of candidates who potentially meet all best- practice criteria 2 Perform 360-degree research Perform comprehensive, 360-degree research on all candidates in the pipeline • Interview thought leaders and industry practitioners • Assess candidates’ fit with best-practice criteria • Rank all candidates Matrix positioning all candidates’ performance relative to one another 3 Invite thought leadership in best practices Perform in-depth examination of all candidates • Confirm best-practice criteria • Examine eligibility of all candidates • Identify any information gaps Detailed profiles of all ranked candidates 4 Initiate research director review Conduct an unbiased evaluation of all candidate profiles • Brainstorm ranking options • Invite multiple perspectives on candidates’ performance • Update candidate profiles Final prioritization of all eligible candidates and companion best-practice positioning paper 5 Assemble panel of industry experts Present findings to an expert panel of industry thought leaders • Share findings • Strengthen cases for candidate eligibility • Prioritize candidates Refined list of prioritized Award candidates 6 Conduct global industry review Build consensus on Award candidates’ eligibility • Hold global team meeting to review all candidates • Pressure-test fit with criteria • Confirm inclusion of all eligible candidates Final list of eligible Award candidates, representing success stories worldwide 7 Perform quality check Develop official Award consideration materials • Perform final performance benchmarking activities • Write nominations • Perform quality review High-quality, accurate, and creative presentation of nominees’ successes 8 Reconnect with panel of industry experts Finalize the selection of the best-practice Award recipient • Review analysis with panel • Build consensus • Select recipient Decision on which company performs best against all best-practice criteria 9 Communicate recognition Inform Award recipient of Award recognition • Present Award to the CEO • Inspire the organization for continued success • Celebrate the recipient’s performance Announcement of Award and plan for how recipient can use the Award to enhance the brand 10 Take strategic action Upon licensing, company may share Award news with stakeholders and customers • Coordinate media outreach • Design a marketing plan • Assess Award’s role in future strategic planning Widespread awareness of recipient’s Award status among investors, media personnel, and employees
  • 10. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 10 “We Accelerate Growth” The Intersection between 360-Degree Research and Best Practices Awards Research Methodology Frost & Sullivan’s 360-degree research methodology represents the analytical rigor of our research process. It offers a 360-degree-view of industry challenges, trends, and issues by integrating all 7 of Frost & Sullivan's research methodologies. Too often, companies make important growth decisions based on a narrow understanding of their environment, leading to errors of both omission and commission. Successful growth strategies are founded on a thorough understanding of market, technical, economic, financial, customer, best practices, and demographic analyses. The integration of these research disciplines into the 360-degree research methodology provides an evaluation platform for benchmarking industry participants and for identifying those performing at best-in-class levels. About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best in class positions in growth, innovation and leadership. The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best practice models to drive the generation, evaluation and implementation of powerful growth strategies. Frost & Sullivan leverages more than 50 years of experience in partnering with Global 1000 companies, emerging businesses and the investment community from 45 offices on six continents. To join our Growth Partnership, please visit http://www.frost.com. 360-DEGREE RESEARCH: SEEING ORDER IN THE CHAOS