The Traditional Perimeter is Dead, Now What?
Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…
Conditional Access for Rich Clients
OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…
Education Case Study: Manage Digital Identities in schools with FIM and MIM
For organizations with a huge seasonal turnover of people, such as schools and universities, careful management of digital identities is top priority. This webinar recording explores what the University of Dundee, Scotland, has been doing to maximize its investment in MIM/FIM. Read more…
Conditional Access for Mobile Devices with Intune and Lookout
Get a look at the new capabilities Intune provides for Conditional Access, including the recently announced Lookout integration which provides additional signals to Conditional Access to help protect data from malicious apps, networks, and other threats. Read more…
A User’s Guide to MIM with Service Pack 1
Discover the latest updates to Microsoft Identity Manager SP1 in our 30-minute webinar recording. Learn about PAM, new clients, new APIs, support for SharePoint 2016 and Windows Server 2016, and more! Read more…
The Benefits of Microsoft Azure B2B and B2C
How can Azure’s new B2B and B2C offerings benefit your organization? Discover how in this a recording of this webinar, first broadcast 13 October 2016 Read more…
Supercharge Azure RMS with Azure Information Protection
Azure Information Protection allows you to classify and protect your organization’s data. In this webinar recording presented by OCG Architect Chris Lloyd, discover the features and capabilities of this new Microsoft offering. Read more…
Azure Active Directory Identity Protection
Alex Weinert demonstrates the detection capabilities that Azure AD Identity Protection offers, how to prevent the attacks in real time with conditional access policies, the end user experience, and more. Read more…
How Azure AD Connect Enables Hybrid Identity
How Azure AD Connect enables hybrid identity Read more…
What you need to know about Privileged Access Management – PAM
With the release of MIM 2016, Microsoft has introduced a process called Privileged Access Management (PAM), which can limit the exposure of administrative credentials to attackers, and help prevent their theft and misuse. Read more…