[SOLUTIONS THAT MAXIMIZE INVESTMENT]

Partner with Microsoft experts you can trust

We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.

[KEY SERVICE OFFERING]

A holistic health assessment for your Active Directory

The RavenswoodSM AD Health Check (ADHC) Tool is a comprehensive solution rooted in decades of practice. It assesses risk in three key areas of your AD  configuration, security, and operational procedures – and creates a snapshot of your overall health and security posture. The expertise of our team, coupled with a very detailed report about the health of your AD, will help you optimize your AD environment, increase its security, and support prioritization of items that need to be addressed.

[What we do]

Identity done intelligently

We literally wrote the book on Active Directory. We’ll give you full control over your identity management process.

Security in safe hands

Feeling confident your environment is safe is priceless. Our consulting team members are experts in designing secure, hardened infrastructure.

Masters at mobility

Mobility brings your team enormous productivity potential. We’ll ensure you get the benefits without the inherent risks.

Customized compliance plan

We design solutions that help you stay compliant so you can focus on what really matters.

[What our clients say]

"Ravenswood’s technical expertise, exceptional responsiveness, attention to detail, and willingness to go above and beyond have made collaboration seamless and enjoyable."
Confidential Chemicals Manufacturing Client

[From the blog]

Microsoft Azure Automation is a service that is designed to automate operational tasks across Azure and on-premises environments. It provides a way to create, test, and manage runbooks, which are [...]

Active Directory (AD) is widely adopted by many companies as the central identity and access management platform. It provides authentication and authorization services and includes many security features that can [...]

For as long as public key infrastructure (PKI) has existed, it has relied on certificate revocation lists (CRLs) and authority information access (AIA). CRLs are a fundamental part of most [...]

Azure Automation is a cloud-based service that can help you run scripts; configure, update, and manage operating systems; and manage your IT asset inventory. This blog post highlights three key [...]

The Microsoft Azure portal includes a subset of permissions called protected actions, which can be used to manage Conditional Access (CA) policies and cross-tenant access settings. Protected actions are associated [...]

In the ever-evolving landscape of digital workspace solutions, Windows 365 emerges as a cloud-based PC deployment solution tailored for organizations seeking enhanced security and centralized control. With the advent of [...]

In a previous blog post, we covered how to migrate to Windows Local Administrator Password Solution (LAPS). With Windows LAPS deployments gaining traction, it’s important to review configuration items and [...]

All organizations use privileged accounts to manage their environments. In many cases, administration is performed from productivity workstations, which are vulnerable to a substantial number of attack vectors. A key [...]