Increase productivity, minimize security risks
Our know-how for your success
Our OCG experts have developed our software, products and solutions with bundled know-how in order to lead projects to success more efficiently. Based on countless project experiences, our consultants have designed products and solutions for a wide range of applications. Today, they are standard components and an integral part of our proven project methodology. This not only means shorter development times, but also a high degree of standardization of your project, which in turn makes subsequent support much easier.
Your benefits as a customer
We always provide our products and solutions as an integral part of your OCG customer project in order to offer you the best possible service. This is the only way we can ensure that our products and solutions are optimally tailored to your individual requirements and are used in the best possible way.
Investing in excellence
To ensure that we can continue to develop innovative products and solutions for you in the future, we charge license fees for their use. However, some selected products and solutions are available to you free of charge. In view of the enormous time savings during implementation compared to a new development, these fees are extremely low compared to the total costs of an IDM project. This enables OCG to pass on significant cost benefits directly to our valued customers.
Products and solutions
Find out more about the Oxford Computer Group ‘s smart products and solutions in the areas of hybrid identity management and connectivity.
Efficient identity and access management (IAM)
An identity and access management system (IAM) enables the comprehensive management of various identities and objects within a system, an organization or a geographical area. Digital identities are assigned to all objects. These identities must be managed throughout their lifecycle, which means that they can be created, updated and deleted if necessary.
An IAM system offers the option of assigning roles to users, adjusting authorizations and detecting and preventing potential misuse – even fully automatically if required. In addition, organizational structures and access rights for entire companies can be mapped and managed holistically, including the safeguarding and enforcement of compliance guidelines.
Our IDABUS Identity Solution: Maximum flexibility for your IAM requirements
Thanks to our own IAM solution, the IDABUS Identity Solution, based on Microsoft Azure, we can fully exploit the entire spectrum of infrastructure possibilities in local, cloud-based and hybrid IAM applications.
Investments and developments already made with Microsoft Identity Manager (MIM) 2016, such as data, workflows and rules, are retained through the use of our comprehensive migration tool. It goes without saying that we not only cover all MIM functions in the IDABUS Identity Solution, but can also extend them.
Our range of products and services also includes password management tools (PCNS), reporting, monitoring and the implementation of a unique name generation system (NGS) and a team management solution.
Achieve outstanding performance in the backend and frontend by using Microsoft Azure infrastructure components such as Cosmos DB. Thanks to the dynamically scalable technology, you can easily absorb workload peaks.
A customizable and individually expandable modern user interface gives you the flexibility you need to respond to changes and different user types and requirements at any time. Create role-based dashboards to increase user productivity and satisfaction.
IDABUS Identity Solution offers many integration options in other areas such as security technologies. Integration with Microsoft Defender for Identity allows you to quickly identify compromised users and revoke sensitive roles and rights in the shortest possible time without disabling the user or warning the attacker.
IDABUS Identity Solution includes a modern object history with complete restore functions for objects to the desired state at any point in time. All changes and object statuses are displayed on a clear timeline.
This extension supplements the IAM system with functionalities for the role-based assignment of authorizations – automatically or manually. It is also possible to implement a role hierarchy for your company, which simplifies the authorization and deauthorization of persons, as well as the auditing and reattestation of assigned roles.
The automation of processes with the help of flexibly defined workflows and dataflow rules optimizes the efficiency and precision of processes in the long term.
To test the logic and effects of a workflow in advance, you can run it in simulation mode. All potential effects are displayed in advance so that any errors can be identified and rectified at an early stage.
Expand your IAM solution as required
To extend the functional scope of your IAM solution, we offer a wide range of product extensions that address more specific or complex requirements. These products can be seamlessly integrated into your existing IAM landscape.
For a direct connection
Do you have any questions or would you like us to advise you? We will help you find the best solution for your specific requirements.