How Does Continuous Access Evaluation Fit Into Your Zero Trust Strategy?
One of the principles of zero trust security is the concept of continuous authentication, wherein an end user’s or device’s session connectivity is continuously being monitored for changes. Read more…
The Evolution of IGA
Over the last few years, we have seen the merging of Identity Administration, Identity Governance, and Identity Analytics into Identity Governance and Administration (IGA). Now, the identity and governance landscapes are evolving even further. Read more…
Implementing Saviynt Security Manager for Identity Governance and Administration
Oxford Computer Group performed a Saviynt implementation at a bank to streamline compliance processes and create a single, standardized Identity Governance and Administration platform. Read more…
Zero Trust Architecture: It’s All About Identity
This webinar recording answers key questions about Zero Trust. What is it? How should it be applied in your hybrid cloud environment? Where do you begin your journey? Read more…
Moving Beyond Basic Authentication
Basic authentication using username and password are not enough to protect your data. With the rise of credential stuffing and similar attacks, it is imperative that modern authentication with MFA be adopted by all. Read more…
Oxford Computer Group and Imprivata Announce Strategic Partnership
With this partnership, customers will receive Imprivata’s world-class security and identity solutions alongside OCG’s extensive experience implementing identity and access management and identity governance solutions in the healthcare vertical. Read more…
What you need to know about Cloud Access Security Brokers
What are Cloud Access Security Brokers (CASBs), and how can they improve an organization’s security posture? Read more…
Hybrid Modern Authentication – What is it? How can your organization benefit?
If your road map to full cloud adoption is in the slow lane because of legal or regulatory requirements, consider taking advantage of hybrid modern authentication for your on-premises Exchange and Skype for Business resources. Read more…
Understanding LDAP Channel Binding and LDAP Signing Requirements
To prepare for the upcoming March 2020 security update, let’s dive deeper into LDAP channel binding and LDAP signing. Read more…
Understanding Azure AD Connect Cloud Provisioning
In our journey toward cloud-based identities, the announcement of Azure AD Connect cloud provisioning at Ignite 2019 demonstrates the next step toward Microsoft’s cloud identity vision and strategy – providing a new mechanism for synchronizing identities to Azure AD. Read more…