Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/16/2016
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Optiv Security Launches Technology-Enabled Third-Party Risk Managed Service

Enables Companies to Better Manage Entire Vendor, Supplier and Business Associate Risk Management Lifecycles, Improving Compliance and Risk Management

Denver – September 13, 2016 – Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced the general availability of its technology-enabled third-party risk managed service. Leveraging Optiv’s proven Software-as-a-Service based third-party risk management platform, Evantix, this service enables companies to better manage the complete third-party risk management lifecycle, resulting in improved compliance and risk management. The addition of this offering to Optiv’s suite of services makes Optiv the first and only company to offer a holistic solution that can help organizations better plan, develop and manage all aspects of their third-party risk management programs, including vendors, suppliers and business associates.

Optiv’s third-party risk managed service handles the process and reporting required for clients to determine the inherent risk, assess the controls and drive remediation with their vendors and partners. Optiv delivers this service through consultants with extensive expertise in building third-party risk programs and performing third-party risk assessments combined with the Evantix SaaS platform, currently in its fourth generation. This powerful technology solution includes standardized, on-demand risk score reports and customizable scoring technology to provide corporate risk managers and IT security professionals with quick, accurate and cost-effective visibility into the potential risk associated with outside service providers. Optiv’s innovative approach leveraging people, process and technology to deliver its third-party risk managed service helps companies better manage the entire third-party risk management lifecycle, which includes due diligence, assessment, validation and remediation.

“Organizations are increasingly turning to third parties to perform key business functions. That brings an increased risk of exposure to businesses as most companies lack visibility into where their data is stored or how it is handled by a third party,” said Tim Hoffman, executive vice president of client solutions for Optiv. “Today’s businesses require strong third-party risk plans that extend beyond traditional IT, yet most lack the necessary resources to create and execute on those plans. Optiv has the capabilities to help clients address and manage their vendor and partner risk through a comprehensive approach that includes people, process and technology.”

“The Optiv third-party risk managed service provides clients with a method to automate processes and reduce their staff’s major workload related to tracking and assessing the organization’s vendors and partners,” said James Christiansen, vice president of information risk management for Optiv. “Also, our Evantix platform’s advanced analytics provides third-party risk intelligence information to help clients make informed and consistent risk decisions related to vendor, supplier and business associate relationships.”

Optiv’s comprehensive suite of third-party risk management offerings help organizations understand the breadth of third parties in their environment, categorize relationships by risk to the organization, conduct risk assessments aligned to specific industry standards and develop the compliance criteria vendors must meet to do business with the organization.

About Optiv Security
Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. A Blackstone (NYSE: BX) portfolio company, Optiv maintains premium partnerships with more than 300 of the leading security technology manufacturers. For more information, visit www.optiv.com or follow us at www.twitter.com/optiv,www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...