We Enable the Digital Workplace! If you’ve got questions, we’ve got answers ---- about our company or services, learn more about Skype Applications, or any other questions, please select what you want to do such as request more information, chat with us, or Ask Enabling!
Security & Compliance - We protect data, devices, and credentials, even in the cloud.
Productivity - We enable access to applications, data, and colleagues from any device, any network
Collaboration - We enable virtual meetings with the best sound, video, and sharing capabilities
Voice - We design and install Skype for Business Cloud Voice and Enterprise Voice
Manageability - We monitor, manage, troubleshoot, and optimize networks, systems, and services
Preparing your infrastructure
E911 Emergency Preparedness
Integrating to Call Centers
Strategies for viral adoption
While it would be impossible to encapsulate all the news from the 1500 plus sessions at last week's Microsoft Ignite conference, Enabling Technologies will do our best to summarize the most important and relevant technical and business topics from the annual event. The Enablers that went to the event spent most of their time focused on Windows 10 security and azure with an eye on the news about teams and Skype. we'll provide you the news that you need to know, the future releases that are relevant, and provide links to additional sessions for you to delve deeper into the areas of your interest.
Cast: Enabling Technologies Corp
Will a 911 call placed from your organization route to the correct Public Safety Answering Point and include accurate location information?
Learn how West’s Microsoft-certified E911 solutions enhance the E911 location functionality native to Skype for Business, allowing you to keep your enterprise users safe while meeting E911 regulations.
Tags: Microsoft Skype for Business, Emergency preparedness and E911
Learn How James is able to stay productive even during Hurricanes!
Tags: Microsoft Skype for Business
Users are still click-happy and sophisticated attackers know it. They take advantage by targeting specific high value users such as executives and accountants who have access to payment systems and wire transfer accounts. Once these accounts are compromised, they’re used to send legitimate looking requests for payment or wire transfers that end up depositing the money into the attacker’s accounts. The Internet Crime Complaint Center (IC3) states that October 2013 and December 2016, a staggering US $5.3 billion was stolen through Business email Compromise, dwarfing the $1billion lost due to ransomware in 2016.
While Microsoft’s Advanced Threat Protection and Azure AD can protect user email and identities from most threats, specific configurations are necessary to target hacks against the high value accounts of the organization. While Advanced Security Management provides a plethora of alerts, administrators need a finite list of actionable items to react to credible threats, rather than a bunch of false positives.
Enabling Technologies combines Microsoft tools’ and our knowledge of forensics to analyze threats (existing or potential), create rules, and automate responses to targeted phishing attacks. Administrators are provided with a short list of actionable next steps and users are left with a clean inbox and fewer doubts in their workday. The solution is called phish hunter, and we’re at your service to enable it in your tenant so that you can minimize business email compromise going forward.