Where does Microsoft Entra Connect fit into the wider synchronization story?
Identity synchronization – it’s not new, and it’s not sexy – but it is as important as it has ever been. Read more…
New Office 365 Groups Naming Policy
New Naming Policies for Office 365 groups are now in public preview. With this enhancement, admins can enforce consistent naming conventions for O365 groups across associated workloads and block certain words from being used. Read more…
Identity Panel webinar – great questions asked, and now answered
I got some great questions at my recent webinar on Software IDM’s Identity Panel, and there wasn’t time to respond to them all in full. In this blog I provide the answers! Read more…
Software IDM’s Identity Panel training: deep dives and flying high!
Our SoftwareIDM training course teaches students how to use and configure Identity Panel. Identity Panel provides a single interface for managing and monitoring identity data across all directories and databases, on-premises and in the cloud. Read more…
Are Your Privileged Identities Causing a Security Risk?
All identities are of interest to cyber criminals, but privileged identities are an especially high-value target because of their “super-user” access. Is your organization doing enough to keep these privileged identities safe from attackers? Read more…
Oxford Computer Group Partners with Lieberman Software to Deliver Cyber Defense Solutions to Customers
Oxford Computer Group LLC and Lieberman Software are pleased to announce a strategic partnership to offer deeper Cybersecurity and Identity Management services for Microsoft customers. Read more…
MIM/Saviynt: Is it “AND” or “OR”?
We are often asked questions about MIM and Saviynt – does one replaces the other, or do the two technologies work well together? While there’s some overlap, it’s a “better together” story. Read more…
How Phish Net Protects Education Institutions from Phishing Attacks
Education institutions are constantly being targeted by cybersecurity attackers, and phishing is a prevalent tactic that takes advantage of schools’ public directories. OCG’s Phish Net can help secure your organization. Read more…
New NIST Guidelines: More recognition that Identity is core to IT operations, security & governance
IT operations, security and governance all increasingly rely on secure identity. In this blog our CTO James Cowling argues that organizations should formally recognize an organizational role that is responsible for secure identity. Read more…
Ignite 2017 – An Exciting Week for Microsoft Identity and Security
This year’s Ignite was packed full of exciting identity management and security announcements that further cements Microsoft’s status as the world’s best identity management platform. Read more…