Can I avoid the security transformation? Spoiler alert – no!

Organizations move to the cloud because of the advantages in mobility, cost, flexibility, and scalability, but it has profound implications for how security is implemented. The traditional corporate perimeter is no longer viable, and a new set of technologies and processes are required to properly secure a cloud or hybrid environment. This is a significant – and necessary – transformation. Read more…

The Traditional Perimeter is Dead, Now What?

Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…

Education Case Study: Managing Digital Identities with FIM/MIM

For organizations with a huge seasonal turnover of people, such as schools and colleges, careful management of digital identities is top priority. Join us for a webinar on December 1st when we’ll discover what the University of Dundee, Scotland, has been doing to maximize its investment in MIM/FIM. Read more…

Conditional Access for Rich Clients

Join OCG Principal Architect Mark Riley for a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…