Light speed data wave with binary code.

The Nuts and Bolts of Privileged Access Management

Privileged Access Management, PAM, is a new feature that comes with MIM, Microsoft Identity ManageR. what is it and how does it work? PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks. PAM addresses an all-too-frequently neglected problem, the detailed management… Read more…

Posted: April 20, 2016
Running-synch-banner

To Sync or Not to Sync

During a recent customer support case, Architect Frank Drewes noticed that a scheduled import and sync run profile stopped running its sync step. Here’s what happened and why… Read more…

Posted: February 18, 2016
Security keys with Azure RMS

Azure RMS Webinar Series Part 2: Protect Data at Rest

In our webinar on August 20, 2015, our architect Chris Lloyd described how Microsoft Azure Rights Management Service (RMS) offers complete information protection to documents, email, and other sensitive and unstructured data. Data at rest is data stored in digital form on a device such as a file server or workstation.Integrating Azure RMS with your… Read more…

Posted: August 25, 2015
Sunset sun and field of green fresh grass under blue sky

Cloud Services

Thousands of organizations are racing to embrace what cloud can offer! We have a full range of cloud services and can get you there fast. Read more…

Posted: July 22, 2015
see what's in our technology toolbox

Tools, Components, and Software

Once you’ve decided on your identity project, you want to proceed as swiftly and efficiently as possible, right? Our suite of flexible, customizable tools add speed and efficiency to projects, and save you time and money!
Read more…

Posted: June 11, 2015
PKI infrastructure healthcheck

PKI healthcheck

Understand the current state of your Public Key Infrastructure (PKI) environment with a healthcheck from OCG. Read more…

Posted: June 11, 2015
digital tablet closeup

Active Directory healthcheck

An Active Directory health check will analyze in depth your AD to discover where toxic conditions reside that have negative downstream effects on your security posture. Read more…

Posted: June 11, 2015
JamesCowling3

Introducing MIM

In this recording of a webinar, James Cowling, CTO of Oxford Computer Group discusses what changes from FIM to MIM will mean.
Read more…

Posted: June 10, 2015

No items match your filters.