Saviynt Advanced Access Reviews: Capabilities and Definitions
Saviynt Security Manager’s advanced access review capabilities give organizations the flexibility to target access reviews effectively and efficiently. Read more…
The Future State of Identity and Security: Virtual Event Recorded Sessions
In these recorded sessions from OCG’s virtual event, “The Future State of Identity and Security,” learn how your organization can leverage Microsoft 365, Azure, and Windows 10 to create a strong Zero Trust security environment for your users and data. Read more…
A Deep Dive into Azure AD’s Modern Authentication Protocols: Part 1
In this deep dive webinar, OCG Principal Consultant Randy Robb explains how Azure AD and Azure AD B2C utilize modern protocols OAuth 2.0 and OpenID Connect to provide trusts across multiple security boundaries. Read more…
The Future is Now: Starting Your Journey to a Passwordless Environment
In this webinar recording, learn how you can begin taking practical steps using technology already deployed or available for deployment in your environment to begin your path to passwordless authentication. Read more…
Leveraging Azure Active Directory to Manage Complex Identity Scenarios
In this webinar recording, learn how Microsoft’s Azure Active Directory Identity-as-a-Service solution can enable organizations to effectively manage complex identity scenarios. Read more…
Oxford Computer Group Announces Expanded Service Offerings and OASIS Managed Services Provider
Oxford Computer Group (OCG) is exited to announce the expansion of its Identity and Access Management services into Central America, with a new office in Santa Ana, Costa Rica. Read more…
Building a secure self-service portal with Azure AD B2C
Intralox used Azure AD B2C to build a secure, self-service portal that customers can access with their own corporate identities. Read more…
Implementing MIM for Standardized Identity Management and Improved Compliance
Oxford Computer Group implemented MIM at a networking and telecommunications company to improve identity and access processes and increase compliance with governmental regulations. Read more…
How Does Continuous Access Evaluation Fit Into Your Zero Trust Strategy?
One of the principles of zero trust security is the concept of continuous authentication, wherein an end user’s or device’s session connectivity is continuously being monitored for changes. Read more…
The Evolution of IGA
Over the last few years, we have seen the merging of Identity Administration, Identity Governance, and Identity Analytics into Identity Governance and Administration (IGA). Now, the identity and governance landscapes are evolving even further. Read more…