Microsoft magic quadrant for identity and access
Microsoft has taken its rightful place in Gartner’s Identity and Access as a Service Magic Quadrant Read more…
Microsoft Enterprise Mobility Partner of the Year Award 2016 – Oxford Computer Group is finalist
OCG was honored in a global field of top Microsoft partners for demonstrating excellence in innovation and implementation. Read more…
Oxford Computer Group (OCG) and Trusted-ID announce partnership
OCG and Trusted-ID, a leading Dutch identity solutions provider, announce partnership Read more…
Introduction to Microsoft Cloud App Security
Microsoft Cloud App Security is a new suite of cloud-based monitoring tools that allow you to get control of your data in cloud applications. Read more…
Top 5 Tips for a Successful Office 365 Rollout
Is your organization rolling out Office 365? Here are our top five tips for a well-planned, secure and trouble-free implementation. Read more…
The death of identity and access has been greatly exaggerated
The death of Identity and Access is not dead. It’s simply found a new home. Long live Identity and Access! OCG CEO Hugh Simpson-Wells explains what’s happening. Read more…
Azure Active Directory Premium visualized!
Keeping users’ devices security is important, but protecting the identities of your users who access your corporate data on those devices is critical. Read more…
Five Components of Identity Protection
The five components of Microsoft Identity Protection leading to better prevention, detection and remediation of identity theft are MIM, ATA, Azure AD Connect, PIM/PAM, and MFA. Read more…
Identity Protection – what can we do?
No longer are script kiddies at work, who just want to see what is possible. Modern identity theft is a multi-million dollar business with tools and starter kits available for the right price. Read more…
Privileged Access Management – white paper
PAM is a new feature that comes with MIM, Microsoft Identity Manager. What is it and how does it work? Our Privileged Access Management White Paper explains PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks. PAM addresses an all-too-frequently neglected… Read more…