[SOLUTIONS THAT MAXIMIZE INVESTMENT]
Partner with Microsoft experts you can trust
We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.
[What we do]
Identity done intelligently
We literally wrote the book on Active Directory. We’ll give you full control over your identity management process.
Security in safe hands
Feeling confident your environment is safe is priceless. Our consulting team members are experts in designing secure, hardened infrastructure.
Masters at mobility
Mobility brings your team enormous productivity potential. We’ll ensure you get the benefits without the inherent risks.
We understand that your organization is different. Our expert consultants provide a service that flexibly fits your needs.
[What our clients say]
The breadth of expertise and the ability to execute what’s outlined in a given project timeframe is what has led me to partner with Ravenswood time and again. They have developed into my most trusted partner – always delivering on what’s promised.
CIO, Chuhak & Tecson, P.C.
[From the blog]
How to Use Dynamic Group Memberships in Azure Active Directory: Part 2
In Part 1 of this blog post, we looked at what goes into thinking about and designing your automated access policies. As discussed, we want
How to Use Dynamic Group Memberships in Azure Active Directory: Part 1
Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their
How to Use CA Enrollment Agent to Securely Modify Certificate Requests
Web application owners need to generate and submit certificate requests to secure traffic to their websites. Application owners often use IIS to generate or renew
Azure AD Enterprise Application Cleanup
The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure.
In Sync: Proper Time Configuration in AD
Time synchronization is an important yet sometimes overlooked part of security. Ensuring proper time settings is paramount to security in unexpected ways.
Application Access Control Restrictions via Claims in Azure AD B2C
In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider.
How to Federate a SAML Application with Azure AD B2C
In this blog, I’ll show you how to configure a service provider-initiated SAML application to integrate with Azure AD B2C.
Remediating LDAP Client Security
Remediating LDAP security issues is important because the default configurations on domain controllers (DCs) and clients are open to various attacks. Learn how to remediate those issues.