- Services
-
- Who we are
- Resources
-
-
- Stay up-to-date
—read our experts' unique takes on trends in cybersecurity.
-
- Explore our resources for advice on boosting your organization's security.
-
-
- Get in touch
Ravenswood Contributor
Identity lifecycle management (ILM) governs the creation, maintenance, and deactivation of digital identities across an enterprise. It establishes policies and technical controls that answer three fundamental questions: Who should receive [...]
Microsoft Entra ID Governance is a powerful identity governance solution that helps organizations manage, monitor, and automate user access across hybrid and cloud environments. As part of the broader Microsoft [...]
In today’s data-driven business environment, organizations generate and collect massive amounts of information daily. Without proper management, this data can become a liability rather than an asset. As Microsoft specialists [...]
In today’s hybrid work environments, organizations face the challenge of managing and securing a growing number of devices accessing corporate resources from anywhere. Endpoint management provides the framework to address [...]
In today’s business environment, the security perimeter has evolved beyond traditional network boundaries. Every device that connects to your network—from laptops and smartphones to servers and IoT devices—represents a potential [...]
Trying to understand the differences between Microsoft Entra Plan 1 (P1) and Plan 2 (P2)? You’re not alone. Many organizations are tasked with understanding how each of these identity management [...]
The Kerberos authentication protocol, developed by the Massachusetts Institute of Technology (MIT), is an often-discussed topic because it is a stronger form of authentication when compared to the NT Lan [...]
Maintaining security in a Windows environment is important to reduce the risk of bad actors being able to cause harm to an organization. Although Windows is built to be secure [...]
Public key infrastructure (PKI) is the bedrock of modern telecommunications. It is a foundational technology to uniquely identify clients and facilitate their secure transmission and storage of data between public [...]
Microsoft Active Directory (AD) serves many purposes. The most important role it provides is authentication. To make authentication painless, Windows (and non-Windows) systems use AD to authenticate user accounts and [...]


