Cloud-based identities for differentiated learning in a Texas school district
YES Prep, a school system in Texas, set out to relieve teachers of the administrative burden of juggling IT systems so they could focus on giving their students a great education. Read more…
The Traditional Perimeter is Dead, Now What?
Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…
Conditional Access for Rich Clients
OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…
Education Case Study: Manage Digital Identities in schools with FIM and MIM
For organizations with a huge seasonal turnover of people, such as schools and universities, careful management of digital identities is top priority. This webinar recording explores what the University of Dundee, Scotland, has been doing to maximize its investment in MIM/FIM. Read more…
Conditional Access for Mobile Devices with Intune and Lookout
Get a look at the new capabilities Intune provides for Conditional Access, including the recently announced Lookout integration which provides additional signals to Conditional Access to help protect data from malicious apps, networks, and other threats. Read more…
A User’s Guide to MIM with Service Pack 1
Discover the latest updates to Microsoft Identity Manager SP1 in our 30-minute webinar recording. Learn about PAM, new clients, new APIs, support for SharePoint 2016 and Windows Server 2016, and more! Read more…
The Benefits of Microsoft Azure B2B and B2C
How can Azure’s new B2B and B2C offerings benefit your organization? Discover how in this a recording of this webinar, first broadcast 13 October 2016 Read more…
Security and identity in the Microsoft world – avoid becoming front page news for the wrong reasons
An overview of the ways in which we in the Microsoft world have to deter, prevent and detect attacks on our IT infrastructures and digital assets. The main components of the security infrastructure are identity and information, and attack detection. Read more…
Supercharge Azure RMS with Azure Information Protection
Azure Information Protection allows you to classify and protect your organization’s data. In this webinar recording presented by OCG Architect Chris Lloyd, discover the features and capabilities of this new Microsoft offering. Read more…
Azure Active Directory Identity Protection
Alex Weinert demonstrates the detection capabilities that Azure AD Identity Protection offers, how to prevent the attacks in real time with conditional access policies, the end user experience, and more. Read more…