Why A Strong Identity Strategy is Vital for Health
Healthcare organizations worldwide are increasingly making front page news for all the wrong reasons. A strong identity strategy can help keep your organization out of the headlines. Read more…
The Security Transformation – Fire-proofing, Not Fire-fighting
In an increasingly mobile world, new approaches – supported by new technologies – are needed to protect corporate assets. This security transformation is happening right now, and no one can afford to ignore it. In this recording of a webinar, learn how to turn this challenge into an opportunity. Read more…
Are You Ready For The Security Transformation?
In today’s mobile world, keeping corporate assets safe in the face of the rapidly evolving threat environment, while making them readily available to legitimate users, is a very significant challenge. Read more…
Office 365 Authentication Methods – Which One is Right for your Organization?
Choosing the right Office 365 authentication method isn’t always a simple process. Find out which method is right for you in this recording of a webinar. Read more…
Next Generation Identity Governance with the Microsoft Cloud
Learn how Oxford Computer Group and Saviynt, our partner for access governance solutions, can help you build an identity governance infrastructure specifically designed to incorporate Office 365 and Azure. Read more…
Oxford Computer Group and Saviynt Announce Strategic Partnership
Oxford Computer Group NA (OCG) and Saviynt are pleased to announce their partnership that will bring next generation Cloud Identity Access Governance and Intelligence solutions to OCG’s broad base of enterprise clients. Read more…
The Traditional Perimeter is Dead, Now What?
Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…
Oxford Computer Group (OCG) Announces Partnership with Lookout to Deliver Conditional Access Security Solutions for Mobile Devices
Lookout and Intune are now integrated. Read more about how it works. Read more…
Conditional Access for Rich Clients
OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…
Education Case Study: Manage Digital Identities in schools with FIM and MIM
For organizations with a huge seasonal turnover of people, such as schools and universities, careful management of digital identities is top priority. This webinar recording explores what the University of Dundee, Scotland, has been doing to maximize its investment in MIM/FIM. Read more…