Table of Contents

Our Security Process

The Team That Your IT Teams Will Love

Your fellow executive team will love us because of our proven process that ensures a predictable and successful outcome. Your technical team will love us because we like getting into the weeds.  We also offer vCISO options if you need help with Security Policies & Planning: SPARC:  Strategy, Policy, Awareness, Response and Compliance. 

Check out our recent Microsoft Secure Score webinar recording below:


Our Focus

Our Focus Strategy

Strategy

Our Focus Policy

Policy

Our Focus Awareness

Awareness

Our Focus Response

Response

Our Focus Compliance

Compliance

“The SSO project is not something I would’ve entertained doing on our own,”  “You want to work with a provider that has been there before.  Using Enabling made that seamless, and we knew they would meet their commitment when done.”

National Aquarium Logo

Sam Tawiah CIO at the National Aquarium


Process72_Introduction

Introductory Meeting

  • Your team meets with our engineers and project managers. 
  • Discuss your current security strategies. 
  • Discover current vulnerabilities 
  • Walk us through how you would like to see your employees take-action.
Process72_Technical Review

Technical Review

  • Our engineers assess your current security tools.   
  • We look at your infrastructure to see if it’s ready for specific security transformations. 
  • We discover how your team works together. Are they mobile? Do they work from home? What tools are they using? 
Process72_Planning and Design

Planning and Design

  • Our team provides recommendations based on insights we’ve gathered from your organization.  
  • Work collaboratively to write and edit your IT security policies. 
  • Develop a strategy to balance both productivity and security for all departments. 
  • Create an incident response plan.
Implementation

Project Deployment

  • You’re provided with a dedicated engineer from our team. 
  • They follow our plan. 
  • They track milestones and deadlines based on our deployment details.
Support

Managed Services

  • The solution is verified through a formal testing process by your dedicated engineer.  
  • Training is provided to both administrators and end-users to ensure adoption of new technologies as well as new security policies. 
  • Our engineers work with you to ensure on-going satisfaction with any applications or tools implemented. 

Customer Security Journey

Volusia-2
EnablingBlue72-01

Company Profile

Industry: Education

Global Headquarters:  Deland, FL

Students: 63,000+

Employees: 3,700+

We enabled PhishHunter at exactly the right time. Otherwise, we were going to have a potential catastrophe on our hands.
Alex Kennedy

Alex Kennedy Director of Infrastructure & Technical Services at Volusia County Schools

Volusia County Schools

A common scenario we encounter is a customer that has invested in securing their on-premises data and devices. As they move to the cloud they come to us for security guidance. After partnering with us, Volusia County Schools is using Microsoft Cloud App Security and Advanced Threat Protection to mitigate attempted attacks. Assisted by Enabling Technologies, Volusia is seeing immediate results of the customized PhishHunter configurations.

 

The Results

7 Hours
1 Hour

Before

Four teams were involved in each phishing incident, totaling ~7 hours of labor.

After

One person alerts the user and helps reset their password, totaling just 1 hour.  “Overall, by solving the phishing issue, the IT team members involved have ~15% of their time back” said Alex Kennedy.


24 Hours
7 Minutes

Before

“It would take up to 24 hours to remediate.” In that time, the phish would be replicated around the organization.”

After

“Within 7 minutes of a compromise, the account is automatically disabled. No human could detect or respond that fast."

Resources

Office 365 Consolidation Lessons Learned Part 3

With all the proper planning, budgeting, and coordination complete, its now time to focus on the actual technical challenges that will be encountered when doing a tenant to tenant migration.  Each...

Office 365 Consolidation Lessons Learned Part 2

The first article in this series discussed the fundamental stages of a tenant to tenant migration.  Now that you understand the overall picture, this article will discuss the non-technical challenges...

Office 365 Consolidation Lessons Learned Part 1

In the age of pure on-premises environments, it was rare to have more than a single Active Directory environment.  Even when you did, it was merely tied together with a simple Forest Trust.  On a...

Cloud Security 

e-guide

We hear about breaches ever day now.  Make sure you are doing your best to protect your organization.  Download the Cloud Security Do's and Don'ts e-guide to benchmark.

ref:_00D80KtFf._5000y1WwWQD:ref