The OCG consultant was fantastic to work with. I can’t say enough great things!
Oxford Computer Group enables your business to be efficient and competitive through innovative identity management, identity-driven security, and identity governance solutions.
For over a decade, we have been harnessing the power of digital identity to protect organizations’ data, realize cloud strategies, and maintain compliance.
Combining deep understanding of business processes and wide-ranging expertise of implementing enabling technologies from Microsoft and other partners, we can make your vision a reality.
Award-winning identity solutions
We are a Microsoft Gold Partner, and have won Microsoft’s Partner of the Year Award 8 times, and been finalists 6 times. We offer consistent, high quality, creative and efficient IT solutions.
Discover our Award-Winning Solutions Imagine the possibilities!
Case study: Building a secure self-service portal with Azure AD B2C
Manufacturer Intralox used Azure AD B2C to build a secure, self-service portal that customers can access with their own corporate identities.
Latest articles & resources See all
Oxford Computer Group Architect Nathan Mertz demos the Microsoft Entra Permissions Management interface and the process of viewing entitlements across Azure and Google Cloud. Read more…
In this webinar recording, representatives from Saviynt, Microsoft, and OCG Federal discuss the key tenants of an effective ICAM program. Read more…
Implementing a strong ICAM program will enable the Army to create a single, unified network that securely provides warfighters with the right data at the right time. Read more…
Latest case studies & projects See all
A university quickly deployed Azure Sentinel after a security breach, before a data governance strategy was established. When issues arose, OCG provided guidance for remediation. Read more…
A large consumer goods company engaged Oxford Computer Group to streamline the Mergers & Acquisitions processes associated with identities for the companies they acquire. Read more…
Intralox used Azure AD B2C to build a secure, self-service portal that customers can access with their own corporate identities. Read more…
Webinar recordings See all webinar recordings
Upcoming training courses via Teams in EDT/PDT See all
Read our most popular blogs
HOW DOES CONTINUOUS ACCESS EVALUATION FIT INTO YOUR ZERO TRUST STRATEGY?
In this post-perimeter security world, how end-users authenticate to and access corporate resources should be the top priority for CISOs and security teams.Read more
UNDERSTANDING LDAP CHANNEL BINDING AND LDAP SIGNING REQUIREMENTS
Dive deeper into LDAP channel binding and LDAP signing and learn recommendations for getting started on resolving insecure LDAP communications.Read more