[SOLUTIONS THAT MAXIMIZE INVESTMENT]
Partner with Microsoft experts you can trust
We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.
[What we do]
Identity done intelligently
We literally wrote the book on Active Directory. We’ll give you full control over your identity management process.
Security in safe hands
Feeling confident your environment is safe is priceless. Our consulting team members are experts in designing secure, hardened infrastructure.
Masters at mobility
Mobility brings your team enormous productivity potential. We’ll ensure you get the benefits without the inherent risks.
We understand that your organization is different. Our expert consultants provide a service that flexibly fits your needs.
[What our clients say]
The breadth of expertise and the ability to execute what’s outlined in a given project timeframe is what has led me to partner with Ravenswood time and again. They have developed into my most trusted partner – always delivering on what’s promised.
CIO, Chuhak & Tecson, P.C.
[From the blog]
Components of a PKI, Part 2: Certificate Authorities and CA Hierarchies
In Part 1 of our “Components of a PKI” blog series, we defined several PKI terms that are useful for understanding Certificate Authorities (CAs—also known as Certification Authorities) and CA hierarchies…
Components of a PKI, Part 1: Digital Certificates
Digital certificates (most commonly represented by the X.509 public key certificate standard) are signed data objects that associate a public key with an individual user, device, or entity. In this case, we’re specifically referring to digital certificates formatted using the X.509 standard.
4 Best Practices for Hybrid Identity Attributes in Active Directory
User attributes are important metadata that should be treated with care. Some organizations do not take user attributes seriously enough, which creates problems when the company tries to automate system access.
Microsoft Information Protection, Part 2: Planning Sensitivity Label Deployment
Planning for a Microsoft Information Protection deployment can seem complicated at first; however, the recommendations in this article can help guide you in the right direction. An efficient design will result in a simpler deployment, which will allow for a faster and more widely adopted end-user experience.
Microsoft Information Protection, Part 1: Understanding Sensitivity Labels
There are a few key terms that are critical when understanding and deploying Microsoft Information Protection (MIP). For example, sensitivity labels give you a way to classify and protect data by using visual markings, protections such as encryption, and restrictions on data access…
How to Effectively Manage Microsoft Intune Application Assignments with PowerShell and the Microsoft Graph API
In large-scale Microsoft Intune deployments, you’ll typically find both production and development tenants. For effective application testing, you’ll need to assign your applications to test groups of devices or users. Performing this process manually can be time-consuming and repetitive. To simplify the mass addition of a group for application deployment, you can leverage the Intune PowerShell SDK.
Authentication Options for Automated Azure PowerShell Scripts, Part 3: Additional Considerations
In Part 3 of this blog series, we discuss some other important considerations when taking this approach to automation.
Authentication Options for Automated Azure PowerShell Scripts, Part 2: Create and Configure an App Registration
Part 2 of this blog series gets into the details of how to create and configure an app registration for use with an automated PowerShell script.