Microsoft Enterprise Mobility Partner of the Year Award 2016 – Oxford Computer Group is finalist
OCG was honored in a global field of top Microsoft partners for demonstrating excellence in innovation and implementation. Read more…
Introduction to Microsoft Cloud App Security
Microsoft Cloud App Security is a new suite of cloud-based monitoring tools that allow you to get control of your data in cloud applications. Read more…
Top 5 Tips for a Successful Office 365 Rollout
Is your organization rolling out Office 365? Here are our top five tips for a well-planned, secure and trouble-free implementation. Read more…
Azure Active Directory Premium visualized!
Keeping users’ devices security is important, but protecting the identities of your users who access your corporate data on those devices is critical. Read more…
Five Components of Identity Protection
The five components of Microsoft Identity Protection leading to better prevention, detection and remediation of identity theft are MIM, ATA, Azure AD Connect, PIM/PAM, and MFA. Read more…
Attestation and (re)certification – five things you need to know
Most organizations do not have a formal process for controlling permissions. They’re reliant on the diligence of their IT admins, and them not making mistakes! Read more…
Azure Active Directory Identity Protection
This blog covers the basic concepts and importance of Microsoft’s new Azure AD Identity protection service. Read more…
Advanced Threat Analytics: How long does it take to get useful data?
Microsoft’s Advanced Threat Analytics – ATA – is a superb security product but when will you start to get useful data from it? Read more…
Introducing Privileged Access Management
In this webinar recording, OCG CTO James Cowling introduces PAM’s main concepts and talks through its features. Read more…
Microsoft Advanced Threat Analytics for Healthcare
In this webinar recording, OCG Senior Consultant Mike Liben discusses the advanced capabilities of ATA and how it differs from traditional defense-in-depth tools. Read more…