Government Challenges 

Government

We are on the GSA Schedule 70 - GS35F0207X

Enabling Technologies is on the GSA Schedule 70 for all Microsoft Security, Communications and Collaboration Professional services.  Our Schedule number is GS35F0207X.  Capabilities Document

As governments look to leave behind old processes, disparate systems, and paper-based methods, they can move to a digital future for government models and services. The need for improved data security increases as governments transform to drive value from increasing volumes of data and enable citizen engagement models. Leaders are now able to overcome challenges by delivering exceptional government to citizens through digital transformation. 

We’re enabling governments to better serve and protect citizens and build more secure, productive nations by connecting people, systems, and information resulting in more impactful outcomes. The Microsoft approach enables digital transformation of government with an integrated, flexible, and trustworthy approach that offers a choice of public, private and hybrid cloud services with a commitment to trust and compliance.

See how Enabling assists SLG with Cloud Security in this recorded webinar below:

 

 

“In addition to the hard dollar savings of $150,000 /year, we were also able to reduce our maintenance to one an hour a month compared to 2-4 hours a day with Cisco."

Mike Kalm, IT Director Idaho Department of Labor

Federal Solutions

State and Local

State and Local Government Solutions

In addition to these specific Microsoft solutions, Enabling Technologies can help with Secure Communications and Collaboration.  For example, Take the City of Atlanta. Instead of paying the $55,000 Bitcoin ransom and risking further demands, they spent $2.6M to rebuild locked servers. (https://www.zdnet.com/article/atlanta-spent-at-least-two-million-on-ransomware-attack-recovery/).  We have helped many organizations with automated Phishing Prevention and remediation as well with our PhishHunter solution. 

Resources

Detecting and Protecting Against Solarigate

This blog provides a summary of the Microsoft tools and guidance to detect and protect against the recent attacks embedded within SolarWinds monitoring agents.

Sharing Video in Microsoft Teams Meetings

Enabling has run our fair share of webinars and online events. After learning a few things along the way, this blog outlines options and some tips to avoid trial and error when running meetings that...

Guest User Unable to Sign-In Due to Suspicious Activity

While testing a guest user conditional access policy in Azure Active Directory that enforces MFA, the guest user was unable to sign-in to the resource I shared due to ‘suspicious activity’. Our...

Cloud Migration e-guide

 

 Microsoft recommends a three step process to migrating servers and virtual machines.

Download this guide to help you: Discover, Migrate, and Optimize your migration to the cloud.

Cloud Migration e-guide

ref:_00D80KtFf._5000y1WwWQD:ref