Cloud-First vs On-Premises Computing: Contrasting Views​

Cloud-First vs On-Premises Computing: Contrasting Views Cloud-First Versus On-Premises Computing: A Comparison Broadcom’s acquisition of VMWare and subsequent price increases are an inflection point for many IT organizations. Even mature organizations with large VMware environments are facing substantial price increases.   Fortunately, organizations have choices to proceed. Our prior blog outlines several of them.   This blog provides the […]

Microsoft Intune Multi-Admin Approval

Microsoft Intune Multi-Admin Approval Microsoft Intune is a cloud-based device management service that allows you to manage and secure your organization’s devices, apps, and data. As an Intune Administrator, you can configure Microsoft Intune settings, such as creating policies, applications, compliance, and assigning roles. However, some of these changes may have a significant impact on […]

Weekly Tech Tip: Nutanix Centralized Local Password Management

Weekly Tech Tip: Nutanix Centralized Local Password Management Simplify and Secure: Centralized Password Management with Prism Central In the ever-evolving landscape of IT security, managing passwords across various platforms can be a daunting task. However, Nutanix has released a Centralized Local Password Management feature designed to centralize password management, ensuring a more secure and standardized […]

July 2024 Newsletter

July 2024 Newsletter Table of Contents What’s New at eGroup Enabling Technologies? eGroup Enabling Technologies has been recognized as #1 in the U.S. for both Microsoft Cybersecurity Incentives Program (CSI) Workshops and the Copilot Adoption Factory Program. These achievements highlight our dedication to providing industry-leading solutions and exceptional service to our clients.  ➡️ #1 in the […]

How to Deploy Microsoft Intune Endpoint Privilege Management

How to Deploy Microsoft IntuneEndpoint Privilege Management Endpoint Privilege Management is a crucial aspect of IT security and compliance. It involves granting the minimum level of permissions and privileges necessary for devices and users to perform their tasks, while preventing unauthorized or malicious actions. Endpoint Privilege Management can help reduce the risk of data breaches, […]

Catch up with Copilot for Microsoft 365, Your Post-PTO Productivity Partner

Catch Up with Copilot for Microsoft 365, Your Post-PTO Productivity Partner I’ve always wanted to write a travel blog, but instead of a diary of my family’s recent road trip to the coast of North Carolina, this article outlines how Copilot for Microsoft 365 can be used to catch up from the week off.  You’ll […]

Configure Location Services via Intune: Microsoft Teams

Configure Location Services via Intune: Microsoft Teams When working with Microsoft Teams and Public Switched Telephone Network (PSTN) calling, you are likely required to provide emergency location information for your users. If it’s an emergency and a user dials 911, the location information would be provided to the Public Safety Answering Point (PSAP). This information […]

Teams Governance Settings: Balance Collaboration and Risk

Teams Governance Settings: Balance Collaboration and Risk Microsoft Teams is an incredibly powerful tool that enables efficient collaboration and information access across an organization. That said, a remarkable number of customers that we work with struggle to manage and secure it the way that they would like to. Much of the time, Teams was enabled […]

How to Choose the Right Microsoft Fabric License for Your Business

How to Choose the Right Microsoft Fabric License for Your Business A comparison of reserved and pay-as-you-go licensing options and their cost savings.  What is Microsoft Fabric? Microsoft Fabric is an end-to-end analytics and data platform designed for enterprises that require a unified solution or are looking for ways to simplify and potentially reduce their […]

Securing What Really Matters

Securing What Really Matters The Problem is the Perp, Not the Victim When a hospital is victimized by ransomware, patients whose care is disrupted due to postponed or relocated appointments have a right to be angry. When the prices of gas or meat spike because of a cyber incident, consumers are right to demand action. […]