Azure AD B2B: Collaboration Made Efficient & Secure
Azure AD B2B allows organizations to provision suppliers and partners into data systems while maintaining security, compliance, and efficiency. This webinar recording presented by Architect Chris Lloyd demonstrates how. Read more…
Software IDM’s Identity Panel for MIM Managing, Monitoring, and Reporting
Software IDM’s Identity Panel allows you to track changes going through MIM, report on the state of users and groups, and know when something unusual happens in MIM. See a demo in this webinar recording. Read more…
Saviynt and MIM: Adding Intelligence to your Identity Management Program
In this webinar recording, learn how Saviynt together with MIM can bring Application Governance to your Identity management program, without the need to rip and replace your current investment in MIM. Read more…
Upgrade from ILM or FIM to MIM: Benefits and Best Practices
In this webinar recording, learn about the migration paths from both ILM and FIM to MIM. Architect Jim Troyer discusses common migration pain points as well as how to best prepare for an upgrade to MIM. Read more…
The Security Transformation – Fire-proofing, Not Fire-fighting
In an increasingly mobile world, new approaches – supported by new technologies – are needed to protect corporate assets. This security transformation is happening right now, and no one can afford to ignore it. In this recording of a webinar, learn how to turn this challenge into an opportunity. Read more…
Office 365 Authentication Methods – Which One is Right for your Organization?
Choosing the right Office 365 authentication method isn’t always a simple process. Find out which method is right for you in this recording of a webinar. Read more…
Next Generation Identity Governance with the Microsoft Cloud
Learn how Oxford Computer Group and Saviynt, our partner for access governance solutions, can help you build an identity governance infrastructure specifically designed to incorporate Office 365 and Azure. Read more…
The Traditional Perimeter is Dead, Now What?
Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…
Conditional Access for Rich Clients
OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…
Education Case Study: Manage Digital Identities in schools with FIM and MIM
For organizations with a huge seasonal turnover of people, such as schools and universities, careful management of digital identities is top priority. This webinar recording explores what the University of Dundee, Scotland, has been doing to maximize its investment in MIM/FIM. Read more…