The Traditional Perimeter is Dead, Now What?

Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…

Conditional Access for Rich Clients

OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…

Education Case Study: Managing Digital Identities with FIM/MIM

For organizations with a huge seasonal turnover of people, such as schools and universities, careful management of digital identities is top priority. This webinar recording explores what the University of Dundee, Scotland, has been doing to maximize its investment in MIM/FIM. Read more…

A User’s Guide to MIM with Service Pack 1

Discover the latest updates to Microsoft Identity Manager SP1 in our 30-minute webinar recording. Learn about PAM, new clients, new APIs, support for SharePoint 2016 and Windows Server 2016, and more! Read more…

Azure Active Directory Identity Protection

Alex Weinert demonstrates the detection capabilities that Azure AD Identity Protection offers, how to prevent the attacks in real time with conditional access policies, the end user experience, and more. Read more…