[SOLUTIONS THAT MAXIMIZE INVESTMENT]
Partner with Microsoft experts you can trust
We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.
[What we do]
Identity done intelligently
We literally wrote the book on Active Directory. We’ll give you full control over your identity management process.
Security in safe hands
Feeling confident your environment is safe is priceless. Our consulting team members are experts in designing secure, hardened infrastructure.
Masters at mobility
Mobility brings your team enormous productivity potential. We’ll ensure you get the benefits without the inherent risks.
Agile approach
We understand that your organization is different. Our expert consultants provide a service that flexibly fits your needs.
[What our clients say]

The breadth of expertise and the ability to execute what’s outlined in a given project timeframe is what has led me to partner with Ravenswood time and again. They have developed into my most trusted partner – always delivering on what’s promised.
Charlie Altenbach
CIO, Chuhak & Tecson, P.C.
[From the blog]

Protect Your Windows Network from the PetitPotam Exploit
The PetitPotam exploit can be used to completely own an environment, with very few prerequisites—but mitigation is within reac

Entra ID Connect Installation Strategies
If organizations don’t properly plan the synchronization solution for their cloud identities, which Microsoft calls Azure AD Connect, users will have poor experiences in the cloud. Because identity is central to security in the cloud, it’s critical to properly plan and implement Azure AD Connect.

Where to Host Active Directory FSMO Roles
The size and complexity of the organization are critical factors when determining how and where to host FSMO roles.

4 Essential Practices for Automating the Termination of Hybrid Users
When an identity from Active Directory (AD) is synchronized with a cloud-based identity platform such as Azure AD, those identities are classified as being hybrid. When user accounts are terminated in an inconsistent manner, certain aspects of the termination process may fall through the cracks, which can result in security risks for an organization.

Components of a PKI, Part 5: Hardware Security Modules
Not all organizations require their own PKI solution; however, most leverage Microsoft Active Directory Certificate Services because it integrates directly with their existing Active Directory environment…

Components of a PKI, Part 4: Active Directory Certificate Services
Not all organizations require their own PKI solution; however, most leverage Microsoft Active Directory Certificate Services because it integrates directly with their existing Active Directory environment…

Components of a PKI, Part 3: Certificate Revocation
One important function of Certificate Authorities that’s mentioned briefly in Part 2 of our “Components of a PKI” blog series is the ability to perform certificate revocation, or the CA’s ability to revoke certificates it issued previously.

Components of a PKI, Part 2: Certificate Authorities and CA Hierarchies
In Part 1 of our “Components of a PKI” blog series, we defined several PKI terms that are useful for understanding Certificate Authorities (CAs—also known as Certification Authorities) and CA hierarchies…