MIM Approval Justification

MIM Approval Justification – new feature!

The latest update to MIM SP1 (4.4.1459.0) added a new feature for justification on requests that require approvals.  This will help designated approvers make informed decisions when approving or rejecting requests and give the requestors meaningful responses from the approver.  Example use cases include: Giving justification when joining a group Giving justification when denying a… Read more…

Posted: March 29, 2017
Digital Identity and Cybersecurity CISO Forum in NYC

Are You Ready For The Security Transformation?

In today’s mobile world, keeping corporate assets safe in the face of the rapidly evolving threat environment, while making them readily available to legitimate users, is a very significant challenge. Recent surveys and reports have confirmed what we already know all too well – that serious cyber attacks are on the rise, and that organizations… Read more…

Posted: March 22, 2017

The Traditional Perimeter is Dead, Now What?

Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…

Posted: January 12, 2017
Privileged Access Management

Privileged Access Management – white paper

PAM is a new feature that comes with MIM, Microsoft Identity ManageR. what is it and how does it work? Our Privileged Access Management White Paper explains PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks. PAM addresses an all-too-frequently neglected… Read more…

Posted: April 20, 2016
Azure B2C and B2B

Protect Data at Rest with Azure RMS

In a webinar in August 2015, I described how Microsoft Azure Rights Management Service (RMS) offers complete information protection to documents, email, and other sensitive and unstructured data. Data at rest is data stored in digital form on a device such as a file server or workstation. Integrating Azure RMS with your on-premises systems allows… Read more…

Posted: August 25, 2015

Bring order to BYOD

In this webinar from January 2015, we explain how to bring order to the potential chaos of bring-your-own-device (BYOD). With a device management strategy in place, you can enable your users to access corporate data on the devices they own and love. Read more…

Posted: June 11, 2015

PKI healthcheck

Understand the current state of your Public Key Infrastructure (PKI) environment with a healthcheck from OCG. Read more…

Posted: June 11, 2015
digital tablet closeup

Active Directory healthcheck

An Active Directory health check will analyze in depth your AD to discover where toxic conditions reside that have negative downstream effects on your security posture. Read more…

Posted: June 11, 2015

Introducing MIM

In this recording of a webinar, James Cowling, CTO of Oxford Computer Group discusses what changes from FIM to MIM will mean.
Read more…

Posted: June 10, 2015

“The only game in town!”

Patrick Wirtz from construction company the Walsh Group describes the identity challenges he faces – many of which you’ll be familiar with – and how OCG has helped. Read more…

Posted: June 10, 2015

No items match your filters.