Introduction to Microsoft Cloud App Security
Microsoft Cloud App Security is a new suite of cloud-based monitoring tools that allow you to get control of your data in cloud applications. Read more…
Top 5 Tips for a Successful Office 365 Rollout
Is your organization rolling out Office 365? Here are our top five tips for a well-planned, secure and trouble-free implementation. Read more…
The death of identity and access has been greatly exaggerated
The death of Identity and Access is not dead. It’s simply found a new home. Long live Identity and Access! OCG CEO Hugh Simpson-Wells explains what’s happening. Read more…
Azure Active Directory Premium visualized!
Keeping users’ devices security is important, but protecting the identities of your users who access your corporate data on those devices is critical. Read more…
Five Components of Identity Protection
The five components of Microsoft Identity Protection leading to better prevention, detection and remediation of identity theft are MIM, ATA, Azure AD Connect, PIM/PAM, and MFA. Read more…
Identity Protection – what can we do?
No longer are script kiddies at work, who just want to see what is possible. Modern identity theft is a multi-million dollar business with tools and starter kits available for the right price. Read more…
Privileged Access Management – white paper
PAM is a new feature that comes with MIM, Microsoft Identity Manager. What is it and how does it work? Our Privileged Access Management White Paper explains PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks. PAM addresses an all-too-frequently neglected… Read more…
Attestation and (re)certification – five things you need to know
Most organizations do not have a formal process for controlling permissions. They’re reliant on the diligence of their IT admins, and them not making mistakes! Read more…
Azure Active Directory Identity Protection
This blog covers the basic concepts and importance of Microsoft’s new Azure AD Identity protection service. Read more…
Advanced Threat Analytics: How long does it take to get useful data?
Microsoft’s Advanced Threat Analytics – ATA – is a superb security product but when will you start to get useful data from it? Read more…