Discover the Microsoft Entra Suite
Learn how to leverage the Microsoft Entra Suite to streamline identity and access management processes, enhance security, and ensure compliance with industry regulations. Read more…
Ensuring ICAM Survivability and Tactical Edge Continuity for DDIL Environments
Whether the disruption is anticipated or unexpected, DOD units must retain uninterrupted access to mission-critical systems to conduct assigned missions, which includes ICAM. Learn about OCG’s solution for identity continuity. Read more…
Securing Academic Partnerships: Overcoming Identity Challenges in Collaborative Higher Education Environments
In this webinar, we’ll look at how to improve your identity systems to better protect your users and data while making sure collaboration remains secure and effortless. Read more…
Saying Goodbye to ADFS: Migrating to Microsoft Entra ID for a Zero Trust, Cloud-First Future
Read about how OCG helped a large federal agency migrate from ADFS to Microsoft Entra ID to improve security and streamline authentication processes. Read more…
Upcoming Instructor-led MIM, Microsoft Entra ID & Microsoft Entra Connect Training – Live Online via Teams
Looking for top quality identity training? Look no further than our sister company Oxford Computer Training, renowned worldwide as top identity training experts. Instructor-led identity training live online in Eastern Time. Read more…
Oxford Computer Group, Strata Identity, and Saviynt Introduce Solution for Identity Continuity in Disconnected DOD Environments
Oxford Computer Group, Strata Identity, and Saviynt Introduce Solution for Identity Continuity in Disconnected DOD Environments Read more…
Exploring Microsoft’s Security Service Edge (SSE) Solution
Get an in-depth look at Microsoft’s newly launched Security Service Edge (SSE), including key components such as Microsoft Entra Private Access and Internet Access. Read more…
Migrating Healthcare Institutions to Microsoft Entra ID Governance
For many healthcare organizations, Microsoft Entra ID Governance provides an opportunity to consolidate identity management processes, improve security, and reduce IT infrastructure costs. Read more…
Transitioning from MIM to Microsoft Entra for Cloud-First IAM
OCG CTO James Cowling presents five different options for transitioning from on-premises MIM to a Microsoft-Entra focused solution. Read more…
Oxford Computer Group recognized as a finalist of 2024 Microsoft Identity Partner of the Year
Oxford Computer Group is honored to be named a finalist for the Identity 2024 Microsoft Partner of the Year Award. Read more…
Oxford Computer Group recognized as a finalist of 2024 Microsoft Defense & Intelligence Partner of the Year
Oxford Computer Group is honored to be named a finalist for the Defense & Intelligence 2024 Microsoft Partner of the Year Award. Read more…
Improving Security with Microsoft 365 Security Services for a Large Community College System
Enabling robust and evolving security solutions with Microsoft Entra ID and Microsoft 365 Security Services for a large network of community colleges. Read more…
The Rise of AI Threats: Identity Management
Join guest speaker John Howie to learn about the rising threat of AI to identity management systems, and what steps you can take today to protect your organization. Read more…
Getting More Out of Microsoft Entra ID With Extension and Custom Security Attributes
Microsoft Entra ID’s directory extension attributes and custom security attributes offer powerful ways to extend and enhance the functionality and security of your identity management system. Read more…
Harnessing the Power of Microsoft Entra Domain Services: A Game-Changer for Cloud Identity Management
Learn about the benefits of Microsoft Entra Domain Services, common use cases, and how IT teams can determine if it’s the right fit for their needs Read more…
Migrating from Active Directory Federation Services to Microsoft Entra ID
The benefits of enhanced security, reduced infrastructure costs, and improved scalability align with the needs of modern organizations looking to thrive in a digital-first world. Read more…
Understanding Privileged Access Management (PAM)
Privileged Access Management (PAM) is an integral component of an organization’s cyber defenses. In this webinar, learn about the benefits of PAM, common use cases, and get an overview of Saviynt CPAM and Microsoft PIM. Read more…
Transform Your Security Strategy with Microsoft Sentinel and a Modern Managed SOC
Learn how Microsoft Sentinel can help create a modern SOC powered by AI, automation, and Microsoft’s deep understanding of the threat landscape. Read more…
Oxford Computer Group recognized as a Microsoft Security Excellence Awards finalist for Identity Trailblazer
Oxford Computer Group is honored to named an Identity Trailblazer finalist for the 2024 MISA Excellence Awards. Read more…
How Misconfigured Hybrid Identity Setups Can Compromise Cybersecurity
Learn how misconfigured hybrid identity setups can increase your vulnerable attack surface and lead to compromise of Microsoft Entra ID. Read more…
Fortifying Your Cyber Defenses: Mastering Microsoft Defender Against Token Theft and Adversary-in-the-Middle Attacks
Dive into the complex world of cybersecurity and learn how you can use Microsoft Defender to help thwart token theft and adversary-in-the-middle attacks. Read more…
Demystifying Modern Authentication
This webinar breaks down modern authentication and its components, leaving you with a clear view of how the solutions work and how to get your organization started. Read more…
Use Data Masking to Securely Track and Organize Client Listings, Vendor Listings, and Projects in SharePoint and Teams
In Part 4 of our “Getting the Most Out of Your Microsoft 365 Licensing” blog series, learn how use data masking to securely track and organize client Listings, vendor listings, and projects in SharePoint and Teams. Read more…
Introduction to Microsoft’s Security Service Edge for Identity-Centric Network Access
Learn how Microsoft’s new identity-centric Security Service Edge (SSE) can address the threats and risks associated with cloud adoption and a mobile workforce while integrating seamlessly into your existing security control plane. Read more…
Building an IT Asset Tracking System
In Part 3 of our “Getting the Most Out of Your Microsoft 365 Licensing” blog series, learn how to create an IT Asset Tracking System for your organization. Read more…
Automate the Identity Lifecycle with Microsoft Entra ID Governance
Explore Microsoft Entra ID Governance’s options and settings for customizing and monitoring lifecycle workflows based on your organization’s needs. Read more…
SharePoint Patches Breaking MIM Portal Popups – Here’s a Fix
Microsoft released new SharePoint patches for September 2023 that are negatively impacting the Microsoft Identity Manager (MIM) Portal. Read more…
Configuring and Using Custom Claims in Microsoft Entra ID
Microsoft Entra ID (formerly Azure AD) now makes it easier to configure custom claims for applications to trust it for authentication and authorization. Find out how they work in this technical webinar. Read more…
Building a Change Management Request System with Microsoft 365
In Part 2 of our “Getting the Most Out of Your Microsoft 365 Licensing” blog series, learn how to set up a Change Management Request System for your organization using Microsoft 365. Read more…
Building an Internal IT Helpdesk with Microsoft 365
Centralize and streamline IT support requests for your small or medium-sized business by leveraging your Microsoft 365 E3/A3 or E5/A5 licensing to build an internal IT help desk. Read more…
Migrating from ADFS to Microsoft Entra ID: Benefits and Best Practices
Upgrading from ADFS to Microsoft Entra ID (formally Azure AD) can improve your organization’s security, cut IT costs, improve productivity with streamlined sign-on, and more. Read more…
Oxford Computer Group recognized as a finalist of 2023 Microsoft Defense & Intelligence Partner of the Year
Oxford Computer Group is honored to be named a finalist for the Defense & Intelligence 2023 Microsoft Partner of the Year Award. Read more…
Getting Control Over Groups with Access Panel
The last in a four-part series, this webinar dives into Access Panel, the governance component of Identity Panel Suite. It provides flexible management for all your groups in any connected system. Read more…
Making Your Identity Data Available to Users
The third in a four-part series , this webinar covers Service Panel, one of four components of Identity Panel Suite, which securely exposes identity data to users, enabling solutions such as: helpdesk, white pages, self-service, and custom reports. Read more…
MIM Synchronization Engine – What Comes Next?
The second in a four-part series, this webinar covers HyperSync Panel, the synchronization component of Identity Panel Suite, which can co-exist with the MIM Synchronization Service or fully replace it. Read more…
A Dashboard for Visualizing and Managing Your Identity Data
The first in a four-part series, this webinar recording explores Identity Panel, the core component of Identity Panel Suite, which provides a single interface for managing, viewing and reporting on your identity data. Read more…
Webinar Series: Enhance Your Microsoft-Based Identity Management Solution and Prepare for the Future
Enhance your Microsoft-based identity management solution and prepare for the future – a series of four webinars covering Identity Panel Suite, presented by Hugh Simpson-Wells. Read more…
Get the Most Out of Your Microsoft 365 Investments
Learn how the Microsoft Entra suite of identity and security solutions can help you reduce your licensing costs while simplifying your IT operations and strengthening your cloud security posture. Read more…
What You Need to Know About the MERCURY Cyberattack on Hybrid Environments
The Microsoft Threat Intelligence team reported a successful cyberattack by a known nation-state actor called MERCURY. What happened, and what steps should your organization take to protect your hybrid systems from cyberattacks? Read more…
Moving MIM Group Functionality to Azure AD for On-Premises Group Attestation
Learn how to move your MIM group functionality to Azure AD, all while improving support for organizational compliance and reporting. Read more…
Oxford Computer Group recognized as a Microsoft Security Excellence Awards finalist for Zero Trust Champion
Oxford Computer Group is honored to named a Zero Trust Champion finalist for the 2023 MISA Excellence Awards. Read more…
Seamless Credentials Verification with Credivera and Microsoft Entra
Learn how Credivera and Microsoft Entra support workers with decentralized BYOID (bring your own ID). We’ll discuss how verified credentials can be used to access applications, facilities, and company data. Read more…
Implementing Saviynt EIC for a Large Apparel Retailer
OCG helped a retail customer lay the foundation for a robust identity governance infrastructure using Saviynt EIC, simplifying the roles and access of user accounts in their critical business applications. Read more…
Using Microsoft Entra Verified ID for Identity Proofing of Partners, Customers, and Employees
In this webinar we introduce Verified IDs and discuss common use cases, including improved proofing for onboarding, help-desk scenarios, and partner engagement. Read more…
What is Conditional Access Authentication Strength?
A feature of Microsoft Entra Azure Active Directory, Conditional Access Authentication Strength policies allow identity teams to specify the combination of authentication methods that can be used to access a specific resource. Read more…
Life Without MIM: Moving ILM to the Cloud
For organizations using MIM and wanting to move towards a zero trust security model, there are options for cloud-based ILM. Read more…
Multicloud Permissions Management using Microsoft Entra
Oxford Computer Group Architect Nathan Mertz demos the Microsoft Entra Permissions Management interface and the process of viewing entitlements across Azure and Google Cloud. Read more…
Identity, Credentialing, and Access Management (ICAM) and Executive Order 14028
In this webinar recording, representatives from Saviynt, Microsoft, and OCG Federal discuss the key tenants of an effective ICAM program. Read more…
Identity, Credentialing and Access Management (ICAM) in a Unified Network
Implementing a strong ICAM program will enable the Army to create a single, unified network that securely provides warfighters with the right data at the right time. Read more…
Secure Onboarding: Register Users For Self-Service Password Reset with PowerShell
A recent webinar showed how you can securely onboard new users without transmitting an initial password. This blog dives into the details of registering an application for Microsoft Graph, and accessing your application with PowerShell in order to facilitate authentication and authorization. Read more…
3 Passwordless Ways to Securely Onboard New Users
Learn about three methods for implementing passwordless, first-time logon to Azure Active Directory, Microsoft 365, and on-premises Active Directory. Read more…
Oxford Computer Group Wins Microsoft Entra Partner Excellence Recognition
OCG is honored receive the top mention for Federal & SLG, a category recognizing partners that have helped US Federal and SLG customers adopt Microsoft Entra. OCG also received special mentions in the External Identities and Regional Systems Integrator categories. Read more…
Best Practices for Modernizing and Securing your Active Directory
Learn how you can support your organization’s business and security requirements with a hybrid directory approach. Read more…
Microsoft Entra ID as the Center of the Identity Universe
Moving the center of identity and authentication away from on-premises directories is a key first step in preparing for modern authentication and a Zero Trust approach to security. Read more…
Oxford Computer Group is a Microsoft FastTrack Ready Partner
Microsoft’s FastTrack Ready program is designed to help organizations transition from on-premises solutions to the cloud by helping to accelerate deployment and gain end-user adoption for Microsoft 365 licenses. OCG is one of a limited number of approved partners for the FastTrack program. Read more…
Identity Inversion: Putting Microsoft Entra ID at the Center of Identity and Authentication
Moving the center of identity and authentication away from on-premises directories provides many security and operational benefits. Read more…
How Do Verifiable Credentials and Decentralized Identities Work?
Learn what decentralized identity and verifiable credentials are, why they are important, and how they work. Read more…
What You Need to Know About Microsoft Entra
Microsoft Entra is a product family that brings together the three main pillars of Microsoft’s identity and access management strategy under a single, integrated identity trust fabric. Read more…
Securing your Organization with Passwordless Authentication
Learn how your organization can begin taking practical steps toward passwordless authentication by leveraging capabilities in Microsoft 365, Azure AD, and Windows OS. Read more…
How to transition from MIM? Ask the identity experts!
How do you move from MIM to the cloud? Where do you start? What questions keep you up at night? This webinar recording will help MIM customers identify their path to the cloud. Read more…
Securing Modern Identities with Strong Governance
In Part 3 of our ‘Transitioning from MIM’ blog series, we will discuss governance as it relates to identity. Read more…
From MIM to Modern Identity: The Future of MIM Part 2
In Part 2 of our series we examine how modern identity and zero trust can and should be considered as organizations plan for future identity management programs independent of MIM. Read more…
Transitioning Away from MIM in a Cloud-First World: The Future of MIM Part 1
Now that MIM is in extended support, many MIM customers are interested in transitioning to the cloud to. But where do you start? This blog series will examine the options and key considerations to help MIM users to determine their path to the cloud. Read more…
Creating Efficient and Successful Attestation Campaigns with Saviynt
Saviynt gives you the ability to automate attestation campaigns efficiently based on your organization’s audit requirements. Read more…
Windows Server 2019 Updates Impacting Active Directory: Part 2
The second part of our blog series examining how the November 9, 2021 “Patch Tuesday” update to Windows Server 2019 changes the way Active Directory behaves. Read more…
Windows Server 2019 Updates Impacting Active Directory: Part 1
The November 9, 2021 “Patch Tuesday” update to Windows Server 2019 includes four updates to the way Active Directory behaves. Two of these lay the groundwork for security features that will go into effect with the April 2022 update cycle. Read more…
Oxford Computer Group Becomes Member of Microsoft Intelligent Security Association (MISA)
Identity and security consultancy Oxford Computer Group(OCG) has become a member of the Microsoft Intelligent Security Association (MISA) as a managed security service provider. Read more…
5 Ways to Maximize Your MCAS Investment
Microsoft Cloud App Security (MCAS) is a CASB solution that allows you to protect all of your apps, including third-party apps across your public and private cloud platforms. Are you leveraging all of its capabilities? Read more…
Building a Secure and Scalable Azure AD B2C Implementation for Education Organizations
In this webinar for Education organizations, learn how Azure AD B2C addresses security and infrastructure concerns while providing an effective user experience for all roles. Read more…
Customizing API Integration with Azure AD B2C
One of Azure AD B2C’s great features is the ability to integrate with any back-end Application Programming Interface (API) and provide additional token attributes based on the authenticated user. Read more…
Moving Towards Zero Trust with an ICAM Solution Architecture
Meet the new Federal Zero Trust mandate with an ICAM solution and architecture developed by Saviynt, Microsoft, and OCG Federal. Read more…
Announcing OCG Federal, a New Division of Oxford Computer Group
Security Consultancy Oxford Computer Group announces the debut of OCG Federal, a new Oxford Computer Group division that is focused on delivering identity management and security solutions to our nation’s federal agencies. Read more…
MIM 2016 SP2: An Alternative Way to Set Credentials and Associated Parameters in a Pinch
This blog lays out the steps you can take to set up MIM 2016 SP2 for an Office 365 Mailbox with modern authentication when you don’t have access to the MIM installation disc. Read more…
Modern Authentication with Azure AD Part 2: Deep Dive into Authorization
In this deep dive webinar, OCG Principal Consultant Randy Robb looks at how Authorization operates within Azure AD’s Modern Authentication workflows. Read more…
The Roadmap to an Effective ICAM Model
A strong Federal ICAM solution enables the right individual to access the right resource, at the right time, for the right reason – all while maintaining productivity and security. Read more…
5 Ways to Improve Information Protection and Governance for your Organization
In this webinar recording, learn how Microsoft 365’s integrated Information Protection and Governance solutions can help you protect and govern your data throughout its lifecycle – wherever it lives and wherever it may be shared. Read more…
Enabling Microsoft Sentinel After a Large Security Breach
A university quickly deployed Microsoft Sentinel after a security breach, before a data governance strategy was established. When issues arose, OCG provided guidance for remediation. Read more…
Azure AD Identity Governance (IGA): Secure Identities and Improve Compliance
In this webinar recording, learn how to get your organization started with Azure AD Identity Governance. We discuss and demo entitlement management and Azure AD access reviews, including managing group memberships, access to enterprise apps, and role assignments. Read more…
New Method of Hiding Buttons for Groups in MIM 2016
When it comes to hiding buttons in the MIM Portal, there is only one documented method available – using the GlobalSearchResult page. In this blog, learn a new method for hiding buttons for groups in MIM 2016. Read more…
Oxford Computer Group Recognized as a Microsoft Security 20/20 Partner Awards Finalist for Security System Integrator of the Year
Oxford Computer Group is honored to named a finalist for the Microsoft Security 20/20 Security System Integrator of the Year award. Read more…
Service Accounts: The Overlooked Gap in Your Security Strategy
Regardless of the method, it is important to secure service accounts by protecting or eliminating their passwords. Join OCG Principal Architect Mark Riley for a discussion of the risks and modern solutions for these non-person accounts. Read more…
Streamlining Identity and Access Management Post Acquisition
A large consumer goods company engaged Oxford Computer Group to streamline the Mergers & Acquisitions processes associated with identities for the companies they acquire. Read more…
How Can Federal Agencies Leverage Microsoft Azure AD to Improve Security and Reduce Costs?
In this Microsoft Partner webinar tailored for federal agencies, OCG Principal Architect Frank Urena discusses how you can leverage Azure Active Directory to build strong identity management processes built on ICAM principles. Read more…
Consolidate to Microsoft Azure Active Directory to Improve Security and Reduce Costs
In this Microsoft Partner webinar, OCG Principal Architect Frank Urena discusses the security and practical benefits of consolidating identity management to Azure Active Directory. He also discusses how you can get your migration started. Read more…
5 Reasons to Migrate to a Modern Identity Solution with Microsoft Azure Active Directory
In this Microsoft Partner Webinar recording, OCG Principal Architect Frank Urena discusses the benefits of migrating from ADFS to Azure AD. Read more…
Upgrading from Forefront Identity Manager to Microsoft Identity Manager
Microsoft Identity Manager 2016 (MIM) brings both continuity and innovation to Microsoft’s on-premises identity management platform. What is the impact of MIM on existing users of FIM 2010? Read more…
Taking Control of your Active Directory Service Accounts
Learn about steps your organization can take to improve Service Account security – all without additional infrastructure or costs, as well as best practices for minimizing risks. Read more…
John Craddock’s five star rated Identity Masterclass live via Zoom in US Eastern Time
John Craddock’s Microsoft Identity Masterclass consistently gets 100% 5-star ratings – and you can now join the class live via Zoom in Eastern Time, 25 – 29 October, 2021. Read more…
Preparing your System Center Configuration Manager (SCCM) for Co-Management with Intune
The process for enabling co-management with Intune can be complex depending on your organization’s environment. Here are some helpful steps to help get you started. Read more…
Building a Zero Trust Framework with Azure Active Directory and Saviynt
In this discussion-based webinar recording, learn how Saviynt and Azure AD can work together to create a strong Zero Trust framework for enterprise organizations. Read more…
OCG Christmas Screensavers – vintage technology which has stood the test of time
In the 1990s Oxford Computer Group developed a series of advent screensavers as an alternative to Christmas cards. They were designed as an amusing decoration during the festive season. They turned out to be phenomenally popular! Read more…
Saviynt Advanced Access Reviews: Capabilities and Definitions
Saviynt Security Manager’s advanced access review capabilities give organizations the flexibility to target access reviews effectively and efficiently. Read more…
The Future State of Identity and Security: Virtual Event Recorded Sessions
In these recorded sessions from OCG’s virtual event, “The Future State of Identity and Security,” learn how your organization can leverage Microsoft 365, Azure, and Windows 10 to create a strong Zero Trust security environment for your users and data. Read more…
A Deep Dive into Azure AD’s Modern Authentication Protocols
In this deep dive webinar, OCG Principal Consultant Randy Robb explains how Azure AD and Azure AD B2C utilize modern protocols OAuth 2.0 and OpenID Connect to provide trusts across multiple security boundaries. Read more…
The Future is Now: Starting Your Journey to a Passwordless Environment
In this webinar recording, learn how you can begin taking practical steps using technology already deployed or available for deployment in your environment to begin your path to passwordless authentication. Read more…
Leveraging Azure Active Directory to Manage Complex Identity Scenarios
In this webinar recording, learn how Microsoft’s Azure Active Directory Identity-as-a-Service solution can enable organizations to effectively manage complex identity scenarios. Read more…
Oxford Computer Group Announces Expanded Service Offerings and OASIS Managed Services Provider
Oxford Computer Group (OCG) is exited to announce the expansion of its Identity and Access Management services into Central America, with a new office in Santa Ana, Costa Rica. Read more…
Governing Microsoft Teams with Saviynt Security Manager
Microsoft Teams is now well established as the go-to collaboration platform for many enterprise organizations. But how do you govern Teams to ensure that sensitive data is secure? Read more…
Building a secure self-service portal with Azure AD B2C
Intralox used Azure AD B2C to build a secure, self-service portal that customers can access with their own corporate identities. Read more…
Implementing MIM for Standardized Identity Management and Improved Compliance
Oxford Computer Group implemented MIM at a networking and telecommunications company to improve identity and access processes and increase compliance with governmental regulations. Read more…
How Does Continuous Access Evaluation Fit Into Your Zero Trust Strategy?
One of the principles of zero trust security is the concept of continuous authentication, wherein an end user’s or device’s session connectivity is continuously being monitored for changes. Read more…
The Evolution of IGA
Over the last few years, we have seen the merging of Identity Administration, Identity Governance, and Identity Analytics into Identity Governance and Administration (IGA). Now, the identity and governance landscapes are evolving even further. Read more…
Implementing Saviynt Security Manager for Identity Governance and Administration
Oxford Computer Group performed a Saviynt implementation at a bank to streamline compliance processes and create a single, standardized Identity Governance and Administration platform. Read more…
Zero Trust Architecture: It’s All About Identity
This webinar recording answers key questions about Zero Trust. What is it? How should it be applied in your hybrid cloud environment? Where do you begin your journey? Read more…
Moving Beyond Basic Authentication
Basic authentication using username and password are not enough to protect your data. With the rise of credential stuffing and similar attacks, it is imperative that modern authentication with MFA be adopted by all. Read more…
Microsoft Azure AD Single Sign-On is now Free!
On April 30th Microsoft announced that single sign-on with Azure AD is now available for an unlimited number of applications at no extra cost, another great reason to migrate your app authentication model to Azure AD. Read more…
Microsoft Azure Active Directory B2C Primer: Part 1
This blog post is the first in a series to help understand how Azure Active Directory B2C (Azure AD B2C) works, and the components involved. We will go beyond simple examples and explain how it works and how to utilize custom policies with the Identity Experience Framework. Read more…
Oxford Computer Group and Imprivata Announce Strategic Partnership
With this partnership, customers will receive Imprivata’s world-class security and identity solutions alongside OCG’s extensive experience implementing identity and access management and identity governance solutions in the healthcare vertical. Read more…
What you need to know about Cloud Access Security Brokers
What are Cloud Access Security Brokers (CASBs), and how can they improve an organization’s security posture? Read more…
To our customers: OCG’s Response to COVID-19
A note from Steve Brugger, Oxford Computer Group president. Read more…
Hybrid Modern Authentication – What is it? How can your organization benefit?
If your road map to full cloud adoption is in the slow lane because of legal or regulatory requirements, consider taking advantage of hybrid modern authentication for your on-premises Exchange and Skype for Business resources. Read more…
Identity training in North America with Azure and MIM experts
In early 2020 identity experts John Craddock and Paul Captainino trained dozens of IT pros Azure and MIM across North America. Read more…
Understanding LDAP Channel Binding and LDAP Signing Requirements
To prepare for the upcoming March 2020 security update, let’s dive deeper into LDAP channel binding and LDAP signing. Read more…
Understanding FIDO2 for a secure, passwordless future – a John Craddock webinar recording
In this webinar trusted identity guru John Craddock explains how FIDO2 works and how it enables a secure passwordless future. Hosted by Oxford Computer Training. Read more…
Overcoming Identity Challenges in Mergers & Acquisitions with Azure AD
This webinar looks at the latest Azure AD technologies from Microsoft, such as Azure AD Connect Cloud Provisioning, and how they can be leveraged for Mergers & Acquisition scenarios. Read more…
Understanding Azure AD Connect Cloud Provisioning
In our journey toward cloud-based identities, the announcement of Azure AD Connect cloud provisioning at Ignite 2019 demonstrates the next step toward Microsoft’s cloud identity vision and strategy – providing a new mechanism for synchronizing identities to Azure AD. Read more…
IT professionals across North America give our expert identity training a 5-star rating
In 2019, IT pros from across North America rated Oxford Computer Training’s expert identity training “five star.” Join us for more top training in 2020! Read more…
Using Azure Cognitive Services for User Profile Photo Synchronization
Photo synchronization across applications can be complicated. In this webinar, learn how Azure Cognitive Services can be used to correct common photo issues to provide all applications with a user profile photo. Read more…
100% of US students rate John Craddock’s Identity Masterclass as five star training – again!
Students taking John Craddock’s Identity Masterclass in Redmond, WA, in October 2019 describe why it’s “definitely worth it” in this video. Read more…
How MIM and Azure AD Connect enable hybrid identity
Our CEO Hugh Simpson Wells gives a rapid, practical run down of how and why MIM and Azure AD Connect enable hybrid identity – including pluses and minuses, and dos and don’ts in this webinar session. Hosted by our friends at Oxford Computer Training. Read more…
Engaging and Empowering Parents in a New Way: YES Prep’s Parent Portal
YES Prep Public Schools wanted to build a portal to increase caregiver engagement throughout each student’s education journey. With the help of Oxford Computer Group and Microsoft Azure AD B2C, they were able to build a parent portal to give caregivers secure, FERPA-compliant, multi-language access to student information. Read more…
How Secure are MFA-Protected Accounts?
How secure are MFA-protected accounts? Can MFA thwart all attacks? Is there “good” MFA and “better” MFA? Read more…
Gigantic GDPR fines – a game changer for security risk assessment?
BA and Marriott issued with massive fines for data security breaches. It’s a wake-up call for business managers. Read more…
Creating a Frictionless, Secure Environment for Collaboration and Teamwork
OCG, together with Mint Group, has developed a framework for managing the difficult balancing act between meeting demands for teamwork, identity and access, governance, and compliance. Read more…
4 Things You Should Do Before Investing in a Teams Platform
Applications like Microsoft Teams and Slack are wonderful tools for collaboration and teamwork. To maximize their value and benefits, organizations must also change company culture and ensure governance is in place. Read more…
Governing Teams: Take Control of your Microsoft Teams Environment
Microsoft Teams has been hugely successful since it was first introduced. But a question we hear from just about all the enterprise customers we work with is: “How do I govern Teams without IT getting in the way of what people are trying to do?” Read more…
Modern Workplace Transformation: Hearst Communications
How does a massive organization with a complex IT infrastructure begin a modern workplace transformation? With Microsoft Azure, EM+S, and the help of Oxford Computer Group. Read more…
Microsoft Identity Manager and Azure AD training courses in the US
Oxford Computer Training’s legendary instructor, Paul Captainino, is coming to Washington State to present training in MIM (Microsoft Identity Manager) and PAM (Privileged Access Management). Read more…
“Awesome” online, self-paced MIM and Azure training courses
Learning Microsoft identity technologies online is “awesome”. In the first 4 months of 2019, 100% of Oxford Computer Training’s online students said they would recommend their training to colleagues. Read more…
Hybrid and Cloud Identity with Azure Active Directory
In this webinar recording, learn about how to start moving applications to Azure AD for Single Sign-On, and the benefits of doing so. Read more…
End of Support for Exchange 2010: Should you upgrade to Office 365 or Exchange 2016?
Microsoft support for Exchange 2010 ends in 2020. Find out what the migrations options are for moving away from Exchange 2010 at our webinar on 11 April. Read more…
Microsoft Entra Connect Masterclass from Oxford Computer Training – “a compelling and comprehensive deep dive”
The Microsoft Entra Connect Masterclass – developed by an expert team including Andreas Kjellman, formerly MIM and Azure AD Connect Program Manager for Microsoft – is a compelling and comprehensive deep dive. Read more…
Why Pay Twice for your Identity as a Service (IDaaS) Solution?
Lately, one of the most popular EM+S topics has been about how Oxford Computer Group can help organizations migrate from Okta Identity Cloud to Azure Active Directory Premium. Read more…
It may be time to ditch your on-premises authentication services in favor of native cloud authentication
Is it time to ditch your on-premises authentication services in favor of native cloud authentication? The NCSC thinks so, and so do we. Read more…
Enhancing your Microsoft Identity Platform with Saviynt Express
In this webinar recording, learn how MIM, Azure, and Office 365 can be augmented by Saviynt Express to handle complex identity, access, and governance scenarios. Read more…
Extending MIM Functionality to the Cloud webinar – questions and answers
Attendees asked some great questions about SoftwareIDM’s Service Panel and Identity Panel at our webinar. See the answers and view the webinar recording. Read more…
Extending MIM Functionality to the Cloud
Extend MIM to the Cloud! SoftwareIDM has developed Service Panel, an innovative new solution that allows a staged migration of MIM functionality to the cloud. Read more…
Modernize MIM with SoftwareIDM’s Service Panel
Service Panel creates a modern self-service and help-desk identity portal for MIM, and is able to front-end or replace an on-premises MIM Portal, providing a migration path to the cloud. Read more…
Identity and Access in Higher Education: Effective Management of Multi-Role Users
Frequently changing user roles are a significant challenge for higher education organizations. In this webinar recording you’ll learn how you can improve your security posture and reduce help desk costs using systems frequently deployed in HE. Read more…
Integrating AD and Azure AD: How to Satisfy User Expectations AND Stay Secure
Technologies such as Azure AD Connect, MIM, and Saviynt enable organizations to implement effective, integrated, and secure access controls across cloud and on-premises assets, and build a quality end-user experience – learn more at our webinar. Read more…
Azure AD Cloud Authentication with John Craddock
In this webinar recording John Craddock discusses the best Azure AD authentication options for your cloud-users, hybrid-users & applications. Read more…
Azure AD Connect – two popular webinars available to watch on demand
Want to learn what’s beyond the Azure AD Connect wizard and how to optimize implementations? Our two recent Azure AD Connect webinars, presented by an expert panel, are now available to watch on demand. Read more…
Enable Multi-Factor Authentication – But Choose Your Options Wisely!
We all know the importance of enabling two-factor or multi-factor authentication to secure our personal and business identities. But not all MFA verification options are created equal. Read more…
What you need to know about the latest MIM 2016 SP1 hotfix (4.5.26.0)
Microsoft has released a MIM 2016 SP1 hotfix (4.5.26.0) that improves security, adds language definitions, logging enhancements, and a change to the way Boolean attributes are handled by the MIM Service. Read more…
Moving Beyond Passwords
With new authentication standards like WebAuth becoming widely adopted, and hardware manufacturers adding more biometric capabilities into their devices, the password could soon be heading for obsolescence. Read more…
John Craddock’s Microsoft Identity Masterclass: hear feedback from students in a new video
“If you’re considering coming onto the Masterclass, I’d say stop considering it, just sign up!” Hear more comments from students – and from John Craddock – in a short video. Read more…
Looking for excellent online, self-paced MIM training? You’ve come to the right place!
Our online, self-paced MIM Foundation and MIM Advanced courses get fantastic feedback about the quality of the materials and the superb support we offer. Read more…
Integrating Cerner into Your Enterprise Identity Infrastructure
The data stored in the Cerner app represents the crown jewels for healthcare organizations, and inappropriate use of the data represents a significant risk in the form of regulatory fines, damaged reputation and high costs of mitigating the damage to customers with compromised credentials. Read more…
The Death of the Password?
The password has been a ubiquitous part of our daily lives for decades now. But are passwords still relevant for securing our information? Where is information security and authentication headed? Read more…
MIM and Azure AD Connect: Two Sides of the Same Coin?
Learn about the differences between MIM and Azure AD Connect – especially the synchronization model, but also configuration, automatic updates, reverse join, soft join, sticky join, and more – from our expert panel. Read more…
Azure AD Connect: developing our new training course has been a revelation to me!
“The sheer range of capabilities in Azure AD Connect, as well as the crucial differences between Azure AD Connect and MIM synchronization, have been a revelation to me,” says James Cowling, CTO, OCG. Read more…
Empowering YES Prep with cloud-based modern identity and access solutions
Oxford Computer Group empowered YES Prep Public Schools with cloud-based, modern identity and access solutions. And, through managed services, OCG continues to find new opportunities to add value to YES Prep. Read more…
Identity Governance in Microsoft Hybrid Environments
Strong Identity Governance helps your organization enable critical business initiatives, comply with regulatory requirements, guard against fraud and identity theft, and react quickly to identity-based cyber threats. Read more…
Microsoft Identity Manager (MIM2016) training courses in the US
Our five-star rated MIM (Microsoft Identity Manager) training courses are available to you across the US – instructor-led, in the classroom or via Skype, online, or privately. Read more…
New Security Features in Office 365 Threat Intelligence
Microsoft Office 365 Threat Intelligence gives security teams the insights and tools needed to combat the tactics used by today’s threat actors. Read more…
Enhancing Azure AD B2B with Microsoft’s new MIM Graph connector
Microsoft’s new MIM Graph connector extends Azure AD B2B services to your on-premises environment, enabling organizations to easily collaborate with their partners. Read more…
New training course! Azure AD Connect Masterclass
Our new Azure AD Connect Masterclass takes you far beyond what it can do out-of-the-box. Our Masterclass has been written and developed by an expert team including Andreas Kjellman (formerly MIM & AAD Connect Program Manager for Microsoft) and Jimmy Andersson (MVP Enterprise Mobility). Read more…
Managing Education Technology at O’Dea High School
When O’Dea High School needed help deploying Microsoft Intune for Education and Windows 10, Oxford Computer Group was happy to lend a hand. Read more…
Azure AD Connect: Beyond the Wizard Webinar – more answers to more of your questions!
In a webinar in March 2018, we asked if you had any questions about Azure AD Connect. Our expert speakers answered 30+ questions during the session and, in this blog, they answer some more. Read more…
Azure AD Connect: Beyond the Wizard Webinar – 30 questions answered by expert panel
Azure AD Connect does a lot “out-of-the-box” but there’s so much more it can do! In this webinar recording, four experts answer more than 30 questions about what’s beyond the wizard. Read more…
Where does Microsoft Entra Connect fit into the wider synchronization story?
Identity synchronization – it’s not new, and it’s not sexy – but it is as important as it has ever been. Read more…
New Office 365 Groups Naming Policy
New Naming Policies for Office 365 groups are now in public preview. With this enhancement, admins can enforce consistent naming conventions for O365 groups across associated workloads and block certain words from being used. Read more…
Identity Panel webinar – great questions asked, and now answered
I got some great questions at my recent webinar on Software IDM’s Identity Panel, and there wasn’t time to respond to them all in full. In this blog I provide the answers! Read more…
Take the pain out of Compliance and Audit with SoftwareIDM’s Identity Panel
This webinar recording demonstrates Identity Panel’s many capabilities, with a particular focus on features that can help you meet compliance requirements and provide valuable audit information. Read more…
Software IDM’s Identity Panel training: deep dives and flying high!
Our SoftwareIDM training course teaches students how to use and configure Identity Panel. Identity Panel provides a single interface for managing and monitoring identity data across all directories and databases, on-premises and in the cloud. Read more…
Are Your Privileged Identities Causing a Security Risk?
All identities are of interest to cyber criminals, but privileged identities are an especially high-value target because of their “super-user” access. Is your organization doing enough to keep these privileged identities safe from attackers? Read more…
Oxford Computer Group Partners with Lieberman Software to Deliver Cyber Defense Solutions to Customers
Oxford Computer Group LLC and Lieberman Software are pleased to announce a strategic partnership to offer deeper Cybersecurity and Identity Management services for Microsoft customers. Read more…
MIM/Saviynt: Is it “AND” or “OR”?
We are often asked questions about MIM and Saviynt – does one replaces the other, or do the two technologies work well together? While there’s some overlap, it’s a “better together” story. Read more…
How Phish Net Protects Education Institutions from Phishing Attacks
Education institutions are constantly being targeted by cybersecurity attackers, and phishing is a prevalent tactic that takes advantage of schools’ public directories. OCG’s Phish Net can help secure your organization. Read more…
Supercharge Office 365 with EM+S: Security, Groups, and Conditional Access
When Office 365 and EM+S are used together, your organization gets a more secure and productive environment for its workforce. Learn how the two technologies are better together in this webinar. Read more…
New NIST Guidelines: More recognition that Identity is core to IT operations, security & governance
IT operations, security and governance all increasingly rely on secure identity. In this blog our CTO James Cowling argues that organizations should formally recognize an organizational role that is responsible for secure identity. Read more…
Ignite 2017 – An Exciting Week for Microsoft Identity and Security
This year’s Ignite was packed full of exciting identity management and security announcements that further cements Microsoft’s status as the world’s best identity management platform. Read more…
Piecing Together the Secure Identity Puzzle
Important updates in the area of secure identity have recently been announced by Microsoft. In this blog I run through some of these including PTA & B2B federation. Read more…
Oxford Computer Group Backs Another Winning Partner in Saviynt
Saviynt announced a new partnership to broaden governance capabilities for Microsoft Azure customers, validating Oxford Computer Group’s 2016 decision to partner with Saviynt. Read more…
Crossmatch and Oxford Computer Group Deliver Top Notch Multi-Factor Authentication Solution to Microsoft Customers
Oxford Computer Group LLC and Crossmatch are pleased to announce a strategic partnership to offer biometric identity solutions to Microsoft customers. Read more…
Microsoft Identity Masterclass with John Craddock comes to the US
Presented in partnership with Oxford Computer Training, John Craddock’s Identity Masterclass is coming to the US Read more…
Reasons to Upgrade from FIM to MIM
“Should we upgrade from FIM to MIM?” ask our customers. We say yes – and here are our top 3 reasons why, Discover the benefits and why now is the right time Read more…
Enabling Azure AD Premium to Secure the Enterprise
Moving user accounts from on-premises AD to Azure ADP can take considerable effort and planning – it can be difficult to know where to begin. In this recording, Paul Captainino shows you where to start and gives an overview of Azure ADP’s security features. Read more…
Windows Autopilot
Microsoft recently announced Windows Autopilot – a suite of features that enhance Mobile Device Management and simplify deployment and management of Windows 10 PCs Read more…
Smart Lockout Protection Now in Preview for Azure AD Pass-Through Authentication
Smart Lockout Protection for Azure AD Pass-Through Authentication blocks attackers while still allowing access for valid authentication attempts. Read more…
The Future of Identity Governance
The changes to data and identity governance can be broken down into three main areas: an increasing focus on identity-based risk, the need for automated response, and the extension of the current governance framework. Read more…
Password Writeback Vulnerability in Azure AD Connect Explained
Microsoft has indicated that there is a vulnerability in AD Connect’s password writeback feature. Here we explain what’s happening and how to fix it. Read more…
Azure AD B2B: Collaboration Made Efficient & Secure
Azure AD B2B allows organizations to provision suppliers and partners into data systems while maintaining security, compliance, and efficiency. This webinar recording presented by Architect Chris Lloyd demonstrates how. Read more…
Did you miss our ‘Make More of MIM’ webinar week? Recordings now available!
Get the max from Microsoft Identity Manager! Our ‘Make More of MIM’ webinar series discussed & demonstrated 5 valuable & popular software components. Read more…
Software IDM’s Identity Panel for MIM Managing, Monitoring, and Reporting
Software IDM’s Identity Panel allows you to track changes going through MIM, report on the state of users and groups, and know when something unusual happens in MIM. See a demo in this webinar recording. Read more…
Why A Strong Identity Strategy is Vital for Health
Healthcare organizations worldwide are increasingly making front page news for all the wrong reasons. A strong identity strategy can help keep your organization out of the headlines. Read more…
Saviynt and MIM: Adding Intelligence to your Identity Management Program
In this webinar recording, learn how Saviynt together with MIM can bring Application Governance to your Identity management program, without the need to rip and replace your current investment in MIM. Read more…
OCG’s Contractor Manager for FIM/MIM
The OCG Contractor Manager enables simple lifecycle management of temporary staff. Learn how it works and see a demo in this webinar recording. Read more…
OCG’s Audit Logger for FIM/MIM
OCG’s Audit Logger creates a simple list of key changes that go through MIM to your target systems in order to satisfy audit requirements. Learn how in this webinar recording. Read more…
Popular Components to Enhance and Extend MIM
Offering important additional benefits in auditing, reporting, contractor management, and governance, risk and compliance, these software components are proving popular with MIM customers. Read more…
Microsoft’s Workday Integration showcases their approach to Cloud-based Identity and Access Management (IDM)
Microsoft released into public preview a concrete glimpse of the future of their Identity Management as a Service offering. In general, this integration puts some bones on the already-visible strategy for cloud-based identity management. Read more…
Upgrade from ILM or FIM to MIM: Benefits and Best Practices
In this webinar recording, learn about the migration paths from both ILM and FIM to MIM. Architect Jim Troyer discusses common migration pain points as well as how to best prepare for an upgrade to MIM. Read more…
The Security Transformation – Fire-proofing, Not Fire-fighting
In an increasingly mobile world, new approaches – supported by new technologies – are needed to protect corporate assets. This security transformation is happening right now, and no one can afford to ignore it. In this recording of a webinar, learn how to turn this challenge into an opportunity. Read more…
MIM Approval Justification – new feature!
The latest update to MIM SP1 (4.4.1459.0) added a new feature for justification on requests that require approvals. This will help designated approvers make informed decisions when approving or rejecting requests. Read more…
Are You Ready For The Security Transformation?
In today’s mobile world, keeping corporate assets safe in the face of the rapidly evolving threat environment, while making them readily available to legitimate users, is a very significant challenge. Read more…
Top 4 Tips for Keeping OneDrive for Business Data Secure
How can your organization handle data securely in OneDrive while still enabling the business? Here are four things to consider to keep OneDrive for Business data secure. Read more…
Office 365 Authentication Methods – Which One is Right for your Organization?
Choosing the right Office 365 authentication method isn’t always a simple process. Find out which method is right for you in this recording of a webinar. Read more…
Teaching Code to Kids for ‘Hour of Code’ Event
OCG consultant Nathan Mertz describes volunteering for Code.org’s “Hour of Code,” a global event aimed at expanding access to the field of computer science to all students. Read more…
Next Generation Identity Governance with the Microsoft Cloud
Learn how Oxford Computer Group and Saviynt, our partner for access governance solutions, can help you build an identity governance infrastructure specifically designed to incorporate Office 365 and Azure. Read more…
Five Reasons to Upgrade from ILM to MIM Now!
ILM reaches the end of its extended support in July 2017, so now is the perfect time to upgrade to MIM and benefit from its compelling features. Read more…
Cloud-based identities for differentiated learning in a Texas school district
YES Prep, a school system in Texas, set out to relieve teachers of the administrative burden of juggling IT systems so they could focus on giving their students a great education. Read more…
Oxford Computer Group and Saviynt Announce Strategic Partnership
Oxford Computer Group NA (OCG) and Saviynt are pleased to announce their partnership that will bring next generation Cloud Identity Access Governance and Intelligence solutions to OCG’s broad base of enterprise clients. Read more…
The Traditional Perimeter is Dead, Now What?
Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…
Oxford Computer Group (OCG) Announces Partnership with Lookout to Deliver Conditional Access Security Solutions for Mobile Devices
Lookout and Intune are now integrated. Read more about how it works. Read more…
Conditional Access for Rich Clients
OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…
Education Case Study: Manage Digital Identities in schools with FIM and MIM
For organizations with a huge seasonal turnover of people, such as schools and universities, careful management of digital identities is top priority. This webinar recording explores what the University of Dundee, Scotland, has been doing to maximize its investment in MIM/FIM. Read more…
Conditional Access for Mobile Devices with Intune and Lookout
Get a look at the new capabilities Intune provides for Conditional Access, including the recently announced Lookout integration which provides additional signals to Conditional Access to help protect data from malicious apps, networks, and other threats. Read more…
Lookout integrated with Intune
Lookout and Intune are now integrated. Read more about how it works. Read more…
A User’s Guide to MIM with Service Pack 1
Discover the latest updates to Microsoft Identity Manager SP1 in our 30-minute webinar recording. Learn about PAM, new clients, new APIs, support for SharePoint 2016 and Windows Server 2016, and more! Read more…
The Benefits of Microsoft Azure B2B and B2C
How can Azure’s new B2B and B2C offerings benefit your organization? Discover how in this a recording of this webinar, first broadcast 13 October 2016 Read more…
Security and identity in the Microsoft world – avoid becoming front page news for the wrong reasons
An overview of the ways in which we in the Microsoft world have to deter, prevent and detect attacks on our IT infrastructures and digital assets. The main components of the security infrastructure are identity and information, and attack detection. Read more…
Supercharge Azure RMS with Azure Information Protection
Azure Information Protection allows you to classify and protect your organization’s data. In this webinar recording presented by OCG Architect Chris Lloyd, discover the features and capabilities of this new Microsoft offering. Read more…
Azure Active Directory Identity Protection
Alex Weinert demonstrates the detection capabilities that Azure AD Identity Protection offers, how to prevent the attacks in real time with conditional access policies, the end user experience, and more. Read more…
Accelerate to the Cloud with Hybrid Identity
Over the last few years our on-premises identity customers have been moving towards the cloud, but are hybrid and cloud identities being included in their identity security plans? Read more…
How Azure AD Connect Enables Hybrid Identity
How Azure AD Connect enables hybrid identity Read more…
Supercharge Azure RMS with Azure Information Protection
Azure Information Protection adds highly anticipated features for controlling your organization’s data. Read more…
Identity in the Azure cloud for education
Cloud identity is the perfect way to solve the problem of having to build and maintain expensive scalable infrastructures. In schools every dollar saved on IT is a dollar that can be spent on students, teachers and positive educational outcomes! Read more…
What you need to know about Privileged Access Management – PAM
With the release of MIM 2016, Microsoft has introduced a process called Privileged Access Management (PAM), which can limit the exposure of administrative credentials to attackers, and help prevent their theft and misuse. Read more…
Creating a Citizen Identity for the State of Indiana with Azure B2C
In this movie case study, learn how the Indiana Office of Technology overcame obstacles and challenges to create a solution that will transform the way citizens of Indiana do business with the state. Read more…
Microsoft Identity Manager Service Pack 1
A preview of Microsoft Identity Manager Service Pack 1. MIM SP1 contains some important new functionality which I will briefly tell you about here. Read more…
Microsoft Identity Protection and Machine learning
Rather than trying to stay secure independently in our own little private clouds, in the Microsoft cloud we’re stronger together. Microsoft’s machine learning system writes code by sampling data from millions of accesses every day to the cloud. Read more…
Microsoft recognition of Oxford Computer Group for 10 years in a row!
We’ve been winning awards for ten years in a row. So when we say we’re the ‘go to’ company for Microsoft identity, security and mobility solutions, we’re not kidding. Read more…
Microsoft magic quadrant for identity and access
Microsoft has taken its rightful place in Gartner’s Identity and Access as a Service Magic Quadrant Read more…
Microsoft Enterprise Mobility Partner of the Year Award 2016 – Oxford Computer Group is finalist
OCG was honored in a global field of top Microsoft partners for demonstrating excellence in innovation and implementation. Read more…
Oxford Computer Group (OCG) and Trusted-ID announce partnership
OCG and Trusted-ID, a leading Dutch identity solutions provider, announce partnership Read more…
Introduction to Microsoft Cloud App Security
Microsoft Cloud App Security is a new suite of cloud-based monitoring tools that allow you to get control of your data in cloud applications. Read more…
Top 5 Tips for a Successful Office 365 Rollout
Is your organization rolling out Office 365? Here are our top five tips for a well-planned, secure and trouble-free implementation. Read more…
The death of identity and access has been greatly exaggerated
The death of Identity and Access is not dead. It’s simply found a new home. Long live Identity and Access! OCG CEO Hugh Simpson-Wells explains what’s happening. Read more…
Azure Active Directory Premium visualized!
Keeping users’ devices security is important, but protecting the identities of your users who access your corporate data on those devices is critical. Read more…
Five Components of Identity Protection
The five components of Microsoft Identity Protection leading to better prevention, detection and remediation of identity theft are MIM, ATA, Azure AD Connect, PIM/PAM, and MFA. Read more…
Identity Protection – what can we do?
No longer are script kiddies at work, who just want to see what is possible. Modern identity theft is a multi-million dollar business with tools and starter kits available for the right price. Read more…
Privileged Access Management – white paper
PAM is a new feature that comes with MIM, Microsoft Identity Manager. What is it and how does it work? Our Privileged Access Management White Paper explains PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks. PAM addresses an all-too-frequently neglected… Read more…
Attestation and (re)certification – five things you need to know
Most organizations do not have a formal process for controlling permissions. They’re reliant on the diligence of their IT admins, and them not making mistakes! Read more…
Azure Active Directory Identity Protection
This blog covers the basic concepts and importance of Microsoft’s new Azure AD Identity protection service. Read more…
Self Service with Azure AD Premium (Microsoft Entra ID)
The self-service password reset feature has prompted many organizations to consider deploying Azure Active Directory Premium, but it’s way more than a SSPR one-trick pony! Read more…
Advanced Threat Analytics: How long does it take to get useful data?
Microsoft’s Advanced Threat Analytics – ATA – is a superb security product but when will you start to get useful data from it? Read more…
Microsoft Sync Error – To Sync or Not to Sync
During a recent customer support case, Architect Frank Drewes noticed that a scheduled import and sync run profile stopped running its sync step. Here’s what happened and why… Read more…
Azure Active Directory SaaS Provisioning Behavior
Now you have an understanding of attribute mappings and matching rules, here are some sample cases and their results. Read more…
Azure Active Directory SaaS Provisioning
One of the great features with Azure AD SaaS integration is the ability to provision from Azure AD to SaaS applications. Read more…
Introducing Privileged Access Management
In this webinar recording, OCG CTO James Cowling introduces PAM’s main concepts and talks through its features. Read more…
Microsoft Advanced Threat Analytics for Healthcare
In this webinar recording, OCG Senior Consultant Mike Liben discusses the advanced capabilities of ATA and how it differs from traditional defense-in-depth tools. Read more…
Azure AD B2B collaboration
One of the new things in The Azure AD identity space is Business to Business invitations and adds to your Azure Active Directory. Read more…
Connect and Collaborate with Azure B2C and B2B Services
In this webinar recording from December 3, 2015, Microsoft and OCG discuss and demo the new Azure B2B &B2C services. Read more…
Azure RMS and OneDrive for Business: The End-User Experience
OneDrive for Business supports Azure RMS as its Information Rights Management (IRM) provider. Read more…
Protect Data at Rest with Azure RMS
In a webinar in August 2015, I described how Microsoft Azure Rights Management Service (RMS) offers complete information protection to documents, email, and other sensitive and unstructured data. Data at rest is data stored in digital form on a device such as a file server or workstation. Integrating Azure RMS with your on-premises systems allows… Read more…
Protect Information at the Source with Azure RMS
In this webinar we gave an overview and demo of Microsoft’s Azure Rights Management Service (RMS) to help protect documents, email, and other sensitive and unstructured data. Read more…
Advanced Threat Analytics Overview
Find out how Microsoft Advanced Threat Analytics can help you protect your organization in this recording of a webinar. Read more…
Introducing MIM
In this recording of a webinar, James Cowling, CTO of Oxford Computer Group discusses what changes from FIM to MIM will mean.
Read more…
A common identity platform for Tennessee schools
Tennessee Department of Education get a powerful platform for a single identity, for both on-premises and cloud, to extend apps to people and their devices. Read more…
Flexibility and Security for the Walsh Group
Nationwide construction company Walsh Group needed a way to give their workers dependable and secure access to company systems while on site. Read more…