MIM Approval Justification

MIM Approval Justification – new feature!

The latest update to MIM SP1 (4.4.1459.0) added a new feature for justification on requests that require approvals.  This will help designated approvers make informed decisions when approving or rejecting requests and give the requestors meaningful responses from the approver.  Example use cases include: Giving justification when joining a group Giving justification when denying a… Read more…

Posted: March 29, 2017
Digital Identity and Cybersecurity CISO Forum in NYC

Are You Ready For The Security Transformation?

In today’s mobile world, keeping corporate assets safe in the face of the rapidly evolving threat environment, while making them readily available to legitimate users, is a very significant challenge. Recent surveys and reports have confirmed what we already know all too well – that serious cyber attacks are on the rise, and that organizations… Read more…

Posted: March 22, 2017

The Traditional Perimeter is Dead, Now What?

Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…

Posted: January 12, 2017

The Nuts and Bolts of Privileged Access Management

Privileged Access Management, PAM, is a new feature that comes with MIM, Microsoft Identity ManageR. what is it and how does it work? PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks. PAM addresses an all-too-frequently neglected problem, the detailed management… Read more…

Posted: April 20, 2016

Azure RMS Webinar Series Part 2: Protect Data at Rest

In our webinar on August 20, 2015, our architect Chris Lloyd described how Microsoft Azure Rights Management Service (RMS) offers complete information protection to documents, email, and other sensitive and unstructured data. Data at rest is data stored in digital form on a device such as a file server or workstation.Integrating Azure RMS with your… Read more…

Posted: August 25, 2015

Cloud Services

Thousands of organizations are racing to embrace what cloud can offer! We have a full range of cloud services and can get you there fast. Read more…

Posted: July 22, 2015

Tools, Components, and Software

Once you’ve decided on your identity project, you want to proceed as swiftly and efficiently as possible, right? Our suite of flexible, customizable tools add speed and efficiency to projects, and save you time and money!
Read more…

Posted: June 11, 2015

PKI healthcheck

Understand the current state of your Public Key Infrastructure (PKI) environment with a healthcheck from OCG. Read more…

Posted: June 11, 2015
digital tablet closeup

Active Directory healthcheck

An Active Directory health check will analyze in depth your AD to discover where toxic conditions reside that have negative downstream effects on your security posture. Read more…

Posted: June 11, 2015

Introducing MIM

In this recording of a webinar, James Cowling, CTO of Oxford Computer Group discusses what changes from FIM to MIM will mean.
Read more…

Posted: June 10, 2015

No items match your filters.