You guys are the best at what you do.

For over a decade, we have been harnessing the power of digital identity to protect organizations’ data, realize cloud strategies, and maintain compliance.
Combining deep understanding of business processes and wide-ranging expertise of implementing enabling technologies from Microsoft and other partners, we can make your vision a reality.
We are a Microsoft Solutions Partner for Security, and have won Microsoft’s Partner of the Year Award 8 times, and been finalists 7 times. We offer consistent, high quality, creative and efficient IT solutions.
Discover our Award-Winning Solutions Imagine the possibilities!
Oxford Computer Group helped a consumer goods company streamline the Mergers & Acquisitions processes associated with identities for the companies they acquire.
You guys are the best at what you do.

Learn about the rising threat of AI to identity management systems, and what steps you can take today to protect your organization.
View
Join guest speaker John Howie to learn about the rising threat of AI to identity management systems, and what steps you can take today to protect your organization. Read more…
Microsoft Entra ID’s directory extension attributes and custom security attributes offer powerful ways to extend and enhance the functionality and security of your identity management system. Read more…
Learn about the benefits of Microsoft Entra Domain Services, common use cases, and how IT teams can determine if it’s the right fit for their needs Read more…
OCG helped a retail customer lay the foundation for a robust identity governance infrastructure using Saviynt EIC, simplifying the roles and access of user accounts in their critical business applications. Read more…
A university quickly deployed Microsoft Sentinel after a security breach, before a data governance strategy was established. When issues arose, OCG provided guidance for remediation. Read more…
A large consumer goods company engaged Oxford Computer Group to streamline the Mergers & Acquisitions processes associated with identities for the companies they acquire. Read more…
Moving the center of identity and authentication away from on-premises directories and towards a Zero Trust security model.
VIEW WEBINARLearn what they are, how they work, and why they’re important.
VIEW WEBINARIn this post-perimeter security world, how end-users authenticate to and access corporate resources should be the top priority for CISOs and security teams.
Read moreThis blog series examines the options and key considerations to help MIM users to determine their path to the cloud.
Read more
Consistently Winning
Awarded Microsoft’s Partner of the Year 8 times
Customer Feedback
Don’t just take our word for it, read what our customers think
Trusted Globally
We are THE go-to company for Microsoft identity solutions