
Honored at the Microsoft Entra Engineering Partner Airlift 2022
Highest appreciation from Microsoft! The Oxford Computer Group became the first Microsoft partner in the IAM sector and also received an award in the US Federal & SLG
The term “zero trust” refers to a special security model in which no one is automatically trusted. It is based on the assumption that no device, user or service is trusted. Every access to the company network should be checked several times. Particularly unfounded trust should be avoided with this approach in order to minimize security risks. In view of increasing cyber security threats and hybrid working, this principle is more relevant than ever before. The “zero trust” security model is also known as permiterless security and differs fundamentally from conventional models, which follow the concept of testing and trust. In contrast, the Zero Trust model attempts to offer comprehensive protection by not automatically classifying any request as trustworthy (even if this request is made from within the company network).
The zero-trust model is increasingly being implemented in the area of identity and access management in particular, allowing users to access the corporate network from any location while guaranteeing centralized, robust security. Four aspects that are relevant when implementing a zero-trust model in Identity & Access Management are presented below:
The relevance of the “zero trust” approach is more important than ever in the modern working environment. As a company, we also take the approach of implementing our products as securely as possible. Our products can always be used / implemented in combination with an MFA approach. We offer various options for this, both on premises and in combination with Azure AD.
Furthermore, the least privilege approach can be implemented in combination with our Role-Based Access Control extension. Clearly defined role management controls access to the various company resources and is managed centrally in the IAM system. This product can be used both on premises and in the cloud.
We also offer the implementation of an application proxy as a service in order to release local applications in the cloud or restrict their use for certain user groups.
If you would like to find out more about “Zero-Trust” or would like a presentation of one of our products, please contact us – simply send an email to info@ocg.de or use our contact form.
Highest appreciation from Microsoft! The Oxford Computer Group became the first Microsoft partner in the IAM sector and also received an award in the US Federal & SLG
There is a new date for the course A700 IDABUS Identity Solution – Foundation
NEW! The new version 4.12.0 of the IDABUS Identity Solution is now available! The IDABUS Identity Solution manages the entire lifecycle of all digital identities in your company