Modern Authentication 101, modern authentication and authorization, azure ad b2c, Microsoft Entra External ID, external identities, CIAM

Demystifying Modern Authentication

This webinar breaks down modern authentication and its components, leaving you with a clear view of how the solutions work and how to get your organization started. Read more…

Posted: December 14, 2023
Enhance Your Identity Management Solution, SoftwareIDM Service Panel, Identity Panel Suite

Making Your Identity Data Available to Users

The third in a four-part series , this webinar covers Service Panel, one of four components of Identity Panel Suite, which securely exposes identity data to users, enabling solutions such as: helpdesk, white pages, self-service, and custom reports. Read more…

Posted: June 6, 2023
FIM to MIM Upgrade, Microsoft FastTrack Ready partner

Oxford Computer Group is a Microsoft FastTrack Ready Partner

Microsoft’s FastTrack Ready program is designed to help organizations transition from on-premises solutions to the cloud by helping to accelerate deployment and gain end-user adoption for Microsoft 365 licenses. OCG is one of a limited number of approved partners for the FastTrack program. Read more…

Posted: July 26, 2022
MCAS, CASB, Microsoft Cloud App Security Broker

5 Ways to Maximize Your MCAS Investment

Microsoft Cloud App Security (MCAS) is a CASB solution that allows you to protect all of your apps, including third-party apps across your public and private cloud platforms. Are you leveraging all of its capabilities? Read more…

Posted: October 29, 2021
Federal ICAM solution, Saviynt OCG Radiant Logic

The Roadmap to an Effective ICAM Model

A strong Federal ICAM solution enables the right individual to access the right resource, at the right time, for the right reason – all while maintaining productivity and security. Read more…

Posted: June 8, 2021
Hearst Case Study - Modern Workplace transformation

The Evolution of IGA

Over the last few years, we have seen the merging of Identity Administration, Identity Governance, and Identity Analytics into Identity Governance and Administration (IGA). Now, the identity and governance landscapes are evolving even further. Read more…

Posted: May 27, 2020

Moving Beyond Basic Authentication

Basic authentication using username and password are not enough to protect your data. With the rise of credential stuffing and similar attacks, it is imperative that modern authentication with MFA be adopted by all. Read more…

Posted: May 18, 2020

Microsoft Azure AD Single Sign-On is now Free!

On April 30th  Microsoft announced that single sign-on with Azure AD is now available for an unlimited number of applications at no extra cost, another great reason to migrate your app authentication model to Azure AD. Read more…

Posted: May 10, 2020
Azure AD B2C, Office 365 Threat Intelligence

Microsoft Azure Active Directory B2C Primer: Part 1

This blog post is the first in a series to help understand how Azure Active Directory B2C (Azure AD B2C) works, and the components involved. We will go beyond simple examples and explain how it works and how to utilize custom policies with the Identity Experience Framework. Read more…

Posted: April 23, 2020
MIM SP1 Hotfix

Understanding Azure AD Connect Cloud Provisioning

In our journey toward cloud-based identities, the announcement of Azure AD Connect cloud provisioning at Ignite 2019 demonstrates the next step toward Microsoft’s cloud identity vision and strategy – providing a new mechanism for synchronizing identities to Azure AD. Read more…

Posted: December 16, 2019

How MIM and Azure AD Connect enable hybrid identity

Our CEO Hugh Simpson Wells gives a rapid, practical run down of how and why MIM and Azure AD Connect enable hybrid identity – including pluses and minuses, and dos and don’ts in this webinar session. Hosted by our friends at Oxford Computer Training. Read more…

Posted: October 31, 2019

Engaging and Empowering Parents in a New Way: YES Prep’s Parent Portal

YES Prep Public Schools wanted to build a portal to increase caregiver engagement throughout each student’s education journey. With the help of Oxford Computer Group and Microsoft Azure AD B2C, they were able to build a parent portal to give caregivers secure, FERPA-compliant, multi-language access to student information. Read more…

Posted: September 20, 2019
Are passwords dead? Death of passwords. Passwordless Authentication

Moving Beyond Passwords

With new authentication standards like WebAuth becoming widely adopted, and hardware manufacturers adding more biometric capabilities into their devices, the password could soon be heading for obsolescence. Read more…

Posted: July 26, 2018
cerner emr integration

Integrating Cerner into Your Enterprise Identity Infrastructure

The data stored in the Cerner app represents the crown jewels for healthcare organizations, and inappropriate use of the data represents a significant risk in the form of regulatory fines, damaged reputation and high costs of mitigating the damage to customers with compromised credentials. Read more…

Posted: July 2, 2018
Death of Passwords? Authentication, Recognition technologies

The Death of the Password?

The password has been a ubiquitous part of our daily lives for decades now. But are passwords still relevant for securing our information? Where is information security and authentication headed? Read more…

Posted: July 1, 2018

New training course! Azure AD Connect Masterclass

Our new Azure AD Connect Masterclass takes you far beyond what it can do out-of-the-box. Our Masterclass has been written and developed by an expert team including Andreas Kjellman (formerly MIM & AAD Connect Program Manager for Microsoft) and Jimmy Andersson (MVP Enterprise Mobility). Read more…

Posted: April 12, 2018
Office 365 Groups Naming Policy

New Office 365 Groups Naming Policy

New Naming Policies for Office 365 groups are now in public preview. With this enhancement, admins can enforce consistent naming conventions for O365 groups across associated workloads and block certain words from being used. Read more…

Posted: February 26, 2018

Are Your Privileged Identities Causing a Security Risk?

All identities are of interest to cyber criminals, but privileged identities are an especially high-value target because of their “super-user” access. Is your organization doing enough to keep these privileged identities safe from attackers? Read more…

Posted: December 4, 2017
Azure and Saviynt for Identity Governance, Saviynt Converge

MIM/Saviynt: Is it “AND” or “OR”?

We are often asked questions about MIM and Saviynt – does one replaces the other, or do the two technologies work well together? While there’s some overlap, it’s a “better together” story. Read more…

Posted: November 28, 2017
top 3 reasons to upgrade from fim to mim

Reasons to Upgrade from FIM to MIM

“Should we upgrade from FIM to MIM?” ask our customers. We say yes – and here are our top 3 reasons why, Discover the benefits and why now is the right time Read more…

Posted: August 15, 2017
Azure AD Premium

Enabling Azure AD Premium to Secure the Enterprise

Moving user accounts from on-premises AD to Azure ADP can take considerable effort and planning – it can be difficult to know where to begin. In this recording, Paul Captainino shows you where to start and gives an overview of Azure ADP’s security features. Read more…

Posted: August 3, 2017
Windows Autopilot

Windows Autopilot

Microsoft recently announced Windows Autopilot – a suite of features that enhance Mobile Device Management and simplify deployment and management of Windows 10 PCs Read more…

Posted: July 17, 2017
identity governance webinar

The Future of Identity Governance

The changes to data and identity governance can be broken down into three main areas: an increasing focus on identity-based risk, the need for automated response, and the extension of the current governance framework. Read more…

Posted: July 11, 2017
MIM Extension tools Audit Logger

OCG’s Audit Logger for FIM/MIM

OCG’s Audit Logger creates a simple list of key changes that go through MIM to your target systems in order to satisfy audit requirements. Learn how in this webinar recording. Read more…

Posted: June 13, 2017
security transformation webinar

The Security Transformation – Fire-proofing, Not Fire-fighting

In an increasingly mobile world, new approaches – supported by new technologies – are needed to protect corporate assets. This security transformation is happening right now, and no one can afford to ignore it. In this recording of a webinar, learn how to turn this challenge into an opportunity. Read more…

Posted: April 10, 2017
MIM Approval Justification

MIM Approval Justification – new feature!

The latest update to MIM SP1 (4.4.1459.0) added a new feature for justification on requests that require approvals. This will help designated approvers make informed decisions when approving or rejecting requests. Read more…

Posted: March 29, 2017

The Traditional Perimeter is Dead, Now What?

Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…

Posted: January 12, 2017

Conditional Access for Rich Clients

OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…

Posted: December 16, 2016
Upgrading from FIM to MIM, Users Guide, MIM 2016 SP2, Microsoft Forefront Identity Manager to Microsoft Identity Manager

A User’s Guide to MIM with Service Pack 1

Discover the latest updates to Microsoft Identity Manager SP1 in our 30-minute webinar recording. Learn about PAM, new clients, new APIs, support for SharePoint 2016 and Windows Server 2016, and more! Read more…

Posted: October 21, 2016

Azure Active Directory Identity Protection

Alex Weinert demonstrates the detection capabilities that Azure AD Identity Protection offers, how to prevent the attacks in real time with conditional access policies, the end user experience, and more. Read more…

Posted: September 13, 2016

Identity in the Azure cloud for education

Cloud identity is the perfect way to solve the problem of having to build and maintain expensive scalable infrastructures. In schools every dollar saved on IT is a dollar that can be spent on students, teachers and positive educational outcomes! Read more…

Posted: July 13, 2016
Zero Trust architecture

Microsoft Identity Protection and Machine learning

Rather than trying to stay secure independently in our own little private clouds, in the Microsoft cloud we’re stronger together. Microsoft’s machine learning system writes code by sampling data from millions of accesses every day to the cloud. Read more…

Posted: July 6, 2016
Identity protection

Identity Protection – what can we do?

No longer are script kiddies at work, who just want to see what is possible. Modern identity theft is a multi-million dollar business with tools and starter kits available for the right price. Read more…

Posted: April 21, 2016
Privileged Access Management

Privileged Access Management – white paper

PAM is a new feature that comes with MIM, Microsoft Identity Manager. What is it and how does it work? Our Privileged Access Management White Paper explains PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks. PAM addresses an all-too-frequently neglected… Read more…

Posted: April 20, 2016
Self Service with Azure AD Premium

Self Service with Azure AD Premium

The self-service password reset feature has prompted many organizations to consider deploying Azure Active Directory Premium, but it’s way more than a SSPR one-trick pony! Read more…

Posted: March 17, 2016
Service Account Security, AD Service Accounts

Azure AD B2B collaboration

One of the new things in The Azure AD identity space is Business to Business invitations and adds to your Azure Active Directory. Read more…

Posted: December 10, 2015
Azure B2C and B2B

Protect Data at Rest with Azure RMS

In a webinar in August 2015, I described how Microsoft Azure Rights Management Service (RMS) offers complete information protection to documents, email, and other sensitive and unstructured data. Data at rest is data stored in digital form on a device such as a file server or workstation. Integrating Azure RMS with your on-premises systems allows… Read more…

Posted: August 25, 2015

Introducing MIM

In this recording of a webinar, James Cowling, CTO of Oxford Computer Group discusses what changes from FIM to MIM will mean.
Read more…

Posted: June 10, 2015

No items match your filters.