[SOLUTIONS THAT MAXIMIZE INVESTMENT]
Partner with Microsoft experts you can trust
We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.
[What we do]
Identity done intelligently
We literally wrote the book on Active Directory. We’ll give you full control over your identity management process.
Security in safe hands
Feeling confident your environment is safe is priceless. Our consulting team members are experts in designing secure, hardened infrastructure.
Masters at mobility
Mobility brings your team enormous productivity potential. We’ll ensure you get the benefits without the inherent risks.
We understand that your organization is different. Our expert consultants provide a service that flexibly fits your needs.
[What our clients say]
The breadth of expertise and the ability to execute what’s outlined in a given project timeframe is what has led me to partner with Ravenswood time and again. They have developed into my most trusted partner – always delivering on what’s promised.
CIO, Chuhak & Tecson, P.C.
[From the blog]
You may recall that in March 2020 Microsoft was planning to configure a couple of Lightweight Directory Access Protocol (LDAP) security settings on behalf of
In Part 1 of this blog post, we looked at what goes into thinking about and designing your automated access policies. As discussed, we want
Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their
Web application owners need to generate and submit certificate requests to secure traffic to their websites. Application owners often use IIS to generate or renew
The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure.
Time synchronization is an important yet sometimes overlooked part of security. Ensuring proper time settings is paramount to security in unexpected ways.
In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider.
In this blog, I’ll show you how to configure a service provider-initiated SAML application to integrate with Azure AD B2C.