[SOLUTIONS THAT MAXIMIZE INVESTMENT]

Partner with Microsoft experts you can trust

We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.

[KEY SERVICE OFFERING]

A holistic health assessment for your Active Directory

The RavenswoodSM AD Health Check (ADHC) Tool is a comprehensive solution rooted in decades of practice. It assesses risk in three key areas of your AD  configuration, security, and operational procedures – and creates a snapshot of your overall health and security posture. The expertise of our team, coupled with a very detailed report about the health of your AD, will help you optimize your AD environment, increase its security, and support prioritization of items that need to be addressed.

[What we do]

Identity done intelligently

We literally wrote the book on Active Directory. We’ll give you full control over your identity management process.

Security in safe hands

Feeling confident your environment is safe is priceless. Our consulting team members are experts in designing secure, hardened infrastructure.

Masters at mobility

Mobility brings your team enormous productivity potential. We’ll ensure you get the benefits without the inherent risks.

Customized compliance plan

We design solutions that help you stay compliant so you can focus on what really matters.

[What our clients say]

"Ravenswood’s technical expertise, exceptional responsiveness, attention to detail, and willingness to go above and beyond have made collaboration seamless and enjoyable."
Confidential Chemicals Manufacturing Client

[From the blog]

When an identity from Active Directory (AD) is synchronized with a cloud-based identity platform such as Azure AD, those identities are classified as being hybrid. When user accounts are terminated [...]
Not all organizations require their own PKI solution; however, most leverage Microsoft Active Directory Certificate Services because it integrates directly with their existing Active Directory environment... [...]
Not all organizations require their own PKI solution; however, most leverage Microsoft Active Directory Certificate Services because it integrates directly with their existing Active Directory environment... [...]
One important function of Certificate Authorities that’s mentioned briefly in Part 2 of our “Components of a PKI” blog series is the ability to perform certificate revocation, or the CA’s [...]
In Part 1 of our “Components of a PKI” blog series, we defined several PKI terms that are useful for understanding Certificate Authorities (CAs—also known as Certification Authorities) and CA [...]
Digital certificates (most commonly represented by the X.509 public key certificate standard) are signed data objects that associate a public key with an individual user, device, or entity. In this [...]
User attributes are important metadata that should be treated with care. Some organizations do not take user attributes seriously enough, which creates problems when the company tries to automate system [...]
Planning for a Microsoft Information Protection deployment can seem complicated at first; however, the recommendations in this article can help guide you in the right direction. An efficient design will [...]