New training course! Azure AD Connect Masterclass

Our new Azure AD Connect Masterclass takes you far beyond what it can do out-of-the-box. Our Masterclass has been written and developed by an expert team including Andreas Kjellman (formerly MIM & AAD Connect Program Manager for Microsoft) and Jimmy Andersson (MVP Enterprise Mobility). Read more…

Posted: April 12, 2018
Death of Passwords? Authentication, Recognition technologies

The Death of the Password?

The password has been a ubiquitous part of our daily lives for decades now. But are passwords still relevant for securing our information? Where is information security and authentication headed? Read more…

Posted: March 1, 2018
Office 365 Groups Naming Policy

New Office 365 Groups Naming Policy

New Naming Policies for Office 365 groups are now in public preview. With this enhancement, admins can enforce consistent naming conventions for O365 groups across associated workloads and block certain words from being used. Read more…

Posted: February 26, 2018

Are Your Privileged Identities Causing a Security Risk?

All identities are of interest to cyber criminals, but privileged identities are an especially high-value target because of their “super-user” access. Is your organization doing enough to keep these privileged identities safe from attackers? Read more…

Posted: December 4, 2017
Azure and Saviynt for Identity Governance

MIM/Saviynt: Is it “AND” or “OR”?

We are often asked questions about MIM and Saviynt – does one replaces the other, or do the two technologies work well together? While there’s some overlap, it’s a “better together” story. Read more…

Posted: November 28, 2017
top 3 reasons to upgrade from fim to mim

Reasons to Upgrade from FIM to MIM

“Should we upgrade from FIM to MIM?” ask our customers. We say yes – and here are our top 3 reasons why, Discover the benefits and why now is the right time Read more…

Posted: August 15, 2017
Azure AD Premium

Enabling Azure AD Premium to Secure the Enterprise

Moving user accounts from on-premises AD to Azure ADP can take considerable effort and planning – it can be difficult to know where to begin. In this recording, Paul Captainino shows you where to start and gives an overview of Azure ADP’s security features. Read more…

Posted: August 3, 2017
Windows Autopilot

Windows Autopilot

Microsoft recently announced Windows Autopilot – a suite of features that enhance Mobile Device Management and simplify deployment and management of Windows 10 PCs Read more…

Posted: July 17, 2017
identity governance webinar

The Future of Identity Governance

The changes to data and identity governance can be broken down into three main areas: an increasing focus on identity-based risk, the need for automated response, and the extension of the current governance framework. Read more…

Posted: July 11, 2017
MIM Extension tools Audit Logger

OCG’s Audit Logger for FIM/MIM

OCG’s Audit Logger creates a simple list of key changes that go through MIM to your target systems in order to satisfy audit requirements. Learn how in this webinar recording. Read more…

Posted: June 13, 2017
OCG's NYC Identity and Cybersecurity Forum

OCG’s Identity and Cybersecurity Forums, New York

Our new series of Identity and Cybersecurity Forums got off to a highly successful start in New York. With news of the WannaCry ransomware attack breaking, our focus on critical cybersecurity challenges could not have been more topical! Read more…

Posted: May 17, 2017
security transformation webinar

The Security Transformation – Fire-proofing, Not Fire-fighting

In an increasingly mobile world, new approaches – supported by new technologies – are needed to protect corporate assets. This security transformation is happening right now, and no one can afford to ignore it. In this recording of a webinar, learn how to turn this challenge into an opportunity. Read more…

Posted: April 10, 2017
MIM Approval Justification

MIM Approval Justification – new feature!

The latest update to MIM SP1 (4.4.1459.0) added a new feature for justification on requests that require approvals. This will help designated approvers make informed decisions when approving or rejecting requests. Read more…

Posted: March 29, 2017

The Traditional Perimeter is Dead, Now What?

Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…

Posted: January 12, 2017

Conditional Access for Rich Clients

OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…

Posted: December 16, 2016
FIM to MIM - what it means

A User’s Guide to MIM with Service Pack 1

Discover the latest updates to Microsoft Identity Manager SP1 in our 30-minute webinar recording. Learn about PAM, new clients, new APIs, support for SharePoint 2016 and Windows Server 2016, and more! Read more…

Posted: October 21, 2016

Azure Active Directory Identity Protection

Alex Weinert demonstrates the detection capabilities that Azure AD Identity Protection offers, how to prevent the attacks in real time with conditional access policies, the end user experience, and more. Read more…

Posted: September 13, 2016

Identity in the Azure cloud for education

Cloud identity is the perfect way to solve the problem of having to build and maintain expensive scalable infrastructures. In schools every dollar saved on IT is a dollar that can be spent on students, teachers and positive educational outcomes! Read more…

Posted: July 13, 2016

Microsoft Technical Deep Dives – Videos

A technical deep dive into Microsoft Azure Active Directory – Azure AD – which enables organizations to use identity in the cloud to stay in control, and simplify secure access to applications and resources. Read more…

Posted: July 7, 2016
Lieberman Partnership

Microsoft Identity Protection and Machine learning

Rather than trying to stay secure independently in our own little private clouds, in the Microsoft cloud we’re stronger together. Microsoft’s machine learning system writes code by sampling data from millions of accesses every day to the cloud. Read more…

Posted: July 6, 2016
Identity protection

Identity Protection – what can we do?

No longer are script kiddies at work, who just want to see what is possible. Modern identity theft is a multi-million dollar business with tools and starter kits available for the right price. Read more…

Posted: April 21, 2016
Privileged Access Management

Privileged Access Management – white paper

PAM is a new feature that comes with MIM, Microsoft Identity ManageR. what is it and how does it work? Our Privileged Access Management White Paper explains PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks. PAM addresses an all-too-frequently neglected… Read more…

Posted: April 20, 2016
Self Service with Azure AD Premium

Self Service with Azure AD Premium

The self-service password reset feature has prompted many organizations to consider deploying Azure Active Directory Premium, but it’s way more than a SSPR one-trick pony! Read more…

Posted: March 17, 2016

Azure AD B2B collaboration

One of the new things in The Azure AD identity space is Business to Business invitations and adds to your Azure Active Directory. Read more…

Posted: December 10, 2015
Azure B2C and B2B

Protect Data at Rest with Azure RMS

In a webinar in August 2015, I described how Microsoft Azure Rights Management Service (RMS) offers complete information protection to documents, email, and other sensitive and unstructured data. Data at rest is data stored in digital form on a device such as a file server or workstation. Integrating Azure RMS with your on-premises systems allows… Read more…

Posted: August 25, 2015
the road to enterprise mobility

The road to enterprise mobility

Users need swift, secure and appropriate access to your IT systems to do their jobs. Take your first steps on the road to enterprise mobility today. The road ahead is clear. Read more…

Posted: July 22, 2015

Bring order to BYOD

In this webinar from January 2015, we explain how to bring order to the potential chaos of bring-your-own-device (BYOD). With a device management strategy in place, you can enable your users to access corporate data on the devices they own and love. Read more…

Posted: June 11, 2015

PKI healthcheck

Understand the current state of your Public Key Infrastructure (PKI) environment with a healthcheck from OCG. Read more…

Posted: June 11, 2015
digital tablet closeup

Active Directory healthcheck

An Active Directory health check will analyze in depth your AD to discover where toxic conditions reside that have negative downstream effects on your security posture. Read more…

Posted: June 11, 2015

Introducing MIM

In this recording of a webinar, James Cowling, CTO of Oxford Computer Group discusses what changes from FIM to MIM will mean.
Read more…

Posted: June 10, 2015

Endemol moves to the cloud

Dutch media giant Endemol moves to the cloud and streamlines and saves! “The investment was very small and the return is huge.” Read more…

Posted: May 13, 2015

No items match your filters.