Hi [[ session.user.profile.firstName ]]

Identity & Access Management

  • Date
  • Rating
  • Views
  • NERC Critical Infrastructure Protection: Become Compliant with Microsoft
    NERC Critical Infrastructure Protection: Become Compliant with Microsoft
    Brian Reed and Larry Cochrane Recorded: May 14 2014 58 mins
    In this session we'll present the Microsoft Reference Architecture to help Utility companies become NERC CIP compliant. This solution is a complete package; instead of piecing together components from many different sources, Oxford Computer Group in conjunction with Microsoft have created a comprehensive solution, which helps you lower the cost of integration and acquisition. We'll show you how the Microsoft and partner product ecosystem come together to reach access control compliance as we map CIP requirements to ISO 27001 and 27002 and NIST.
  • Microsoft Identity & Access Management for the Cloud
    Microsoft Identity & Access Management for the Cloud
    Nasos Kladakis, Microsoft Senior Product Marketing Manager Recorded: Apr 17 2014 70 mins
    Join Oxford Computer Group and Microsoft for a webinar on April 17th. Nasos Kladakis, Senior Product Marketing Manager for Windows Azure, will present the capabilities and features of Windows Azure Active Directory, including:

    •Simplified Synchronization with on-premises directories,
    •Simplified group-based, single sign-on to hundreds of SaaS applications,
    •Machine learning-based security and usage reports,
    •Alerting and Multi-Factor authentication for effectively protecting enterprise data and resources on any cloud.
    •Self-service password reset and delegated group management,
    •Customizable environment for launching enterprise and consumer applications to reduce help-desk support calls
    •and empower end-users to access their cloud applications from everywhere, with a single set of credentials.

    You don’t want to miss this update on Azure AD direct from Microsoft!
  • Getting your Active Directory Under Control with STEALTHbits
    Getting your Active Directory Under Control with STEALTHbits
    Oxford Computer Group and STEALTHbits Recorded: Mar 27 2014 60 mins
    Understand the current state of your AD

    Who has access to what information in your organization? Is the access they have to your systems appropriate? If asked, could you run an accurate report on it?

    Organizations managing Active Directory (AD) face the everyday challenge of contending with users, groups, and computer objects that constantly change. Often AD will have as many security models as there are domains and forests, each of which dictates the management of these objects in different ways resulting in confusion, unnecessary expense, and security risk.

    Today, most organizations attempt to overcome these problems with multiple tools or manual scripts, none of which quite seem to get the job done. The challenge of finding a baseline on your current state, taking corrective action, and performing ongoing housekeeping is impossible without a proper auditing and reporting solution.

    In this webinar, you can learn more how an AD Health Check from Oxford Computer Group can help you find the flaws in your Active Directory and what you can do to remedy them. We will show you how StealthAUDIT®, a Management Platform (SMP) for Active Directory from STEALTHbits, provides deep visibility into the health and security of AD.
  • Windows Azure Multi-Factor Authentication
    Windows Azure Multi-Factor Authentication
    Michael Levin (Microsoft) and Mark Riley (Oxford Computer Group) Recorded: Feb 20 2014 69 mins
    In an increasingly mobile and device-driven world, multi-factor authentication (MFA) can help to safeguard access to your data and applications while simultaneously keeping the sign-in process simple for your users.

    Join us for a webinar about MFA. We'll discuss how it reduces organizational risk and helps enable regulatory compliance by providing an extra layer of authentication. Strong authentication via mobile applications, phone calls and text messages, allows users to choose the method that works best for them.

    We'll consider how Windows Azure Multi-Factor Authentication can be used for both on-premises and cloud applications.
  • The Life of FIM
    The Life of FIM
    Simon Veale, Oxford Computer Group Recorded: Dec 13 2013 36 mins
    Microsoft Forefront Identity Manager (FIM) 2010 R2 is a flexible and highly configurable platform for creating automated identity and access management solutions. It can connect to a huge variety of directories, databases and other systems - and then provision and synchronize users, groups and passwords according to policies that reflect business and security imperatives. FIM also provides capabilities for role management, and governance of access and permission data.

    In this demo-laden webinar we use one of our proof of concept set-ups to walk you through the typical use cases that crop up day by day - from on-boarding a new employee, through self-service password reset, implementing a new permissions policy, producing management reports for audit, to a permissions attestation cycle.
  • Diving Deeper into Windows Azure Active Directory
    Diving Deeper into Windows Azure Active Directory
    Robert Faller and Nick Lamidy Recorded: Dec 11 2013 54 mins
    After a brief introduction to WAAD and the business challenges it meets so well, Robert will go on to explain more of the technical detail of WAAD and typical implementation scenarios. We have lots of questions from the previous webinar which we'll provide in-depth answers to. And there will be time for an extended Q&A session with Robert. That's not an opportunity you get every day!

    So if you are embracing the Cloud, or planning your move to the Cloud, join this extended 60 minute webinar and learn what WAAD will do for you.
  • Identity & Access Governance for Hybrid Identity
    Identity & Access Governance for Hybrid Identity
    Mark Wahl, Microsoft Principal Program Manager Recorded: Nov 21 2013 63 mins
    Businesses must protect their assets, especially as security boundaries are changing. Leverage your existing identity foundation as a way to enforce access policies across current and new applications. Oxford Computer Group is pleased to host the third webinar, Identity and Access Governance for Hybrid Identity, as part of a three-part series leading up to our Summit on the Microsoft Redmond campus January 7 – 9, 2014.

    This session, featuring Microsoft identity engineering Principal Program Manager Mark Wahl, presents an overview of the techniques for delivering IT governance through identity and access management, leveraging Windows Azure Active Directory, Windows Server, Forefront Identity Manager and the Microsoft BHOLD Suite to provide consistent identity and access controls across on-premises data, in-house-developed cloud applications and third-party SaaS applications.
  • Getting More Out of Office 365: Moving to Exchange Hybrid
    Getting More Out of Office 365: Moving to Exchange Hybrid
    Nathan Mertz, OCG Senior Consultant Recorded: Oct 22 2013 30 mins
    Hundreds of education institutions have upgraded their students to Office 365 while leaving faculty on-premise.

    Take full advantage of the benefits of Office 365 by moving your existing on-premise Microsoft exchange to an Exchange Hybrid. This will give you increased functionality, such as free/busy calendar sharing; securely synchronized mail across both mail environments; and a single domain name.

    Attend our free webinar to learn more about Exchange Hybrid. You can reduce your costs, increase your flexibility and enable greater functionality.
  • Windows Azure Active Directory: Full Steam Ahead
    Windows Azure Active Directory: Full Steam Ahead
    Nasos Kladakis, Microsoft Senior Product Marketing Manager Recorded: Oct 17 2013 59 mins
    Not only do your users want to access SaaS applications such as Microsoft Office 365 or popular applications from Salesforce.com, Concur, and Service now, they expect to leverage existing AD authentication to IT systems from wherever they are, and you have to keep your organization's data secure. Right?

    Learn how to go full steam ahead into the Cloud with Microsoft Windows Azure Active Directory in our free webinar presented by Nasos Kladakis, MIcrosoft Senior Product Marketing Manager for Azure.

    Windows Azure Active Directory is Microsoft's cloud identity and access platform. It can connect Cloud apps with each other or map between different sets of identity information on-premise.
  • Access & Information Protection in a BYOD World
    Access & Information Protection in a BYOD World
    Adam Hall, Microsoft Senior Product Marketing Manager Recorded: Sep 24 2013 52 mins
    In a world of consumerized devices with an ever increasing availability of affordable high-speed cellular and Wi-Fi networks, people are increasingly mobile and expect to have access to both personal and work information from anywhere, and on any device. Our customers need solutions that enable them to deploy and configure access to corporate resources across their on-premises environment and cloud applications while helping to protect their corporate information.

    In this session, we will review how Microsoft is approaching this challenge and delivering solutions in Windows Server 2012 R2.

Embed in website or blog