Microsoft Identity Protection and Machine learning
Rather than trying to stay secure independently in our own little private clouds, in the Microsoft cloud we’re stronger together. Microsoft’s machine learning system writes code by sampling data from millions of accesses every day to the cloud. Read more…
Microsoft recognition of Oxford Computer Group for 10 years in a row!
We’ve been winning awards for ten years in a row. So when we say we’re the ‘go to’ company for Microsoft identity, security and mobility solutions, we’re not kidding. Read more…
Microsoft magic quadrant for identity and access
Microsoft has taken its rightful place in Gartner’s Identity and Access as a Service Magic Quadrant Read more…
Microsoft Enterprise Mobility Partner of the Year Award 2016 – Oxford Computer Group is finalist
OCG was honored in a global field of top Microsoft partners for demonstrating excellence in innovation and implementation. Read more…
Oxford Computer Group (OCG) and Trusted-ID announce partnership
OCG and Trusted-ID, a leading Dutch identity solutions provider, announce partnership Read more…
Introduction to Microsoft Cloud App Security
Microsoft Cloud App Security is a new suite of cloud-based monitoring tools that allow you to get control of your data in cloud applications. Read more…
Top 5 Tips for a Successful Office 365 Rollout
Is your organization rolling out Office 365? Here are our top five tips for a well-planned, secure and trouble-free implementation. Read more…
The death of identity and access has been greatly exaggerated
The death of Identity and Access is not dead. It’s simply found a new home. Long live Identity and Access! OCG CEO Hugh Simpson-Wells explains what’s happening. Read more…
Azure Active Directory Premium visualized!
Keeping users’ devices security is important, but protecting the identities of your users who access your corporate data on those devices is critical. Read more…
Five Components of Identity Protection
The five components of Microsoft Identity Protection leading to better prevention, detection and remediation of identity theft are MIM, ATA, Azure AD Connect, PIM/PAM, and MFA. Read more…