We protect data, devices, and credentials, even in the cloud. Ensure your business is protected! Enabling can assess / recommend best practices.
Read More
Enabling virtual meetings with the best sound, video, and sharing capabilities.
Integrating your existing infrastructure and applications, adding IT flexibility, stability to your business with scalability adjusting to your needs.
We design and install Skype for Business Cloud Voice, Enterprise Voice, and more.
We integrate with many business applications to make your business processes more streamlined, safer and productive.
We monitor, manage, troubleshoot, and optimize networks, systems, and services.
View All Technologies
Advanced Threat Analytics
Azure Active Directory
Azure Site Recovery
Enabling “Ask the Expert” App
Enabling WebChat
Enterprise Mobility Suite
Exchange
Microsoft 365
Microsoft Azure
Microsoft Identity Manager
Microsoft Intune
Microsoft Teams
OneDrive for Business
Operations Management Suite
PhishHunter
SharePoint
Skype for Business
Skype for Business Cloud PBX (Phone System)
Windows 10
Yammer
A Microsoft environment is not complete and usable until the proper licensing has been purchased and activated for your organization.
Learn More
The Microsoft Customer Immersion Experience (CIE) is a hands-on introduction to Microsoft's suite of productivity tools. See how your workday can be.
For the past 25 years, Enabling Technologies Corp has focused our consulting practice on secure Unified Communication solutions.
View Company
Enabling Technologies works with many "best in breed" partners. We coordinate all the vendors so you only deal with Enabling, the director leading the production.
View Partners
The Enabling Technologies newsroom highlights new technologies, services, industry announcements, events, webinars, and more.
View News
We don’t just implement a solution… We improve your business outcomes exponentially! Hear what your peers are saying about Enabling Technologies.
View Testimonials
As your Microsoft Communications and Collaboration Partner, Enabling Technologies has the team of “A” Players.
View Leadership
We know all the “best practice approaches” for achieving synergistic and predictable business results. Our Case Studies reflect some of these approaches.
View Case Studies
Education is one of our specialty areas with over 100 Higher Education and K-12 school system UC deployments and more.
We help to optimize attorney productivity, billable hours, geographic expansion, and client relations by using Microsoft Office 365 and Skype for Business.
Enabling Technologies is on the GSA Schedule 70 for all Microsoft Unified Communications Professional services.
Collaboration allows people to work together more closely, coordinate their efforts, follow detailed business processes, and respond to events as they happen.
Start your Unified Communications investigation thinking of solely Security but enhanced care team collaboration is key to streamlined Healthcare delivery.
Business Email Compromise - Solving the Phishing Problem Users are still click-happy and sophisticated attackers know it. They take advantage by targeting specific high value users such as executives and accountants who have access to payment systems and wire transfer accounts. Once these accounts are compromised, they’re used to send legitimate looking requests for payment or wire transfers that end up depositing the money into the attacker’s accounts. The Internet Crime Complaint Center (IC3) states that between October 2013 and December 2016, a staggering US $5.3 billion was stolen through Business email Compromise, dwarfing the $1billion lost due to ransomware in 2016. Enabling Technologies combines Microsoft tools’ and our knowledge of forensics to analyze threats (existing or potential), create rules, and automate responses to targeted phishing attacks. Administrators are provided with a short list of actionable next steps and users are left with a clean inbox and fewer doubts in their workday. The solution is called phish hunter, and we’re at your service to enable it in your tenant so that you can minimize business email compromise going forward.
Cast: Enabling Technologies Corp
Tags: Phishing, Microsoft Cloud Security and Phish Hunter
While it would be impossible to encapsulate all the news from the 1500 plus sessions at last week's Microsoft Ignite conference, Enabling Technologies will do our best to summarize the most important and relevant technical and business topics from the annual event. The Enablers that went to the event spent most of their time focused on Windows 10 security and azure with an eye on the news about teams and Skype. we'll provide you the news that you need to know, the future releases that are relevant, and provide links to additional sessions for you to delve deeper into the areas of your interest.
Will a 911 call placed from your organization route to the correct Public Safety Answering Point and include accurate location information? Learn how West’s Microsoft-certified E911 solutions enhance the E911 location functionality native to Skype for Business, allowing you to keep your enterprise users safe while meeting E911 regulations.
Tags: Microsoft Skype for Business, Emergency preparedness and E911
Learn How James is able to stay productive even during Hurricanes!
Tags: Microsoft Skype for Business
Users are still click-happy and sophisticated attackers know it. They take advantage by targeting specific high value users such as executives and accountants who have access to payment systems and wire transfer accounts. Once these accounts are compromised, they’re used to send legitimate looking requests for payment or wire transfers that end up depositing the money into the attacker’s accounts. The Internet Crime Complaint Center (IC3) states that October 2013 and December 2016, a staggering US $5.3 billion was stolen through Business email Compromise, dwarfing the $1billion lost due to ransomware in 2016.
While Microsoft’s Advanced Threat Protection and Azure AD can protect user email and identities from most threats, specific configurations are necessary to target hacks against the high value accounts of the organization. While Advanced Security Management provides a plethora of alerts, administrators need a finite list of actionable items to react to credible threats, rather than a bunch of false positives.
Enabling Technologies combines Microsoft tools’ and our knowledge of forensics to analyze threats (existing or potential), create rules, and automate responses to targeted phishing attacks. Administrators are provided with a short list of actionable next steps and users are left with a clean inbox and fewer doubts in their workday. The solution is called phish hunter, and we’re at your service to enable it in your tenant so that you can minimize business email compromise going forward.