December 2023 Newsletter

December 2023 Newsletter What’s New in the Hybrid Data Center? VMware Broadcom’s acquisition of VMware has created a flurry of changes, including layoffs and plans to spin off “non-core assets” like End-User Computing (Horizon, Workspace ONE) and endpoint security (Carbon Black) businesses. We know this could be alarming to our current Horizon customers. The timelines […]

Monitoring the VDI Landscape: Alternatives on the Horizon

Monitoring the VDI Landscape: Alternatives On The Horizon Introduction Following their acquisition of VMware, Broadcom appears to continue to see some challenges with disruption. For those considering their future with VMware Horizon, our team of experts have put together some information to help guide you through the journey. Firstly, for eGroup | Enabling Technologies’ Managed […]

Stakeholders To Include in Your Organization’s AI Efforts

Stakeholders To Include In Your Organization’s AI Efforts Introduction I had a discussion with a former CIO colleague last week about generative AI and what the impact might look like over the next few years as it starts to take hold in our everyday lives. In some respects, the introduction of tools like Copilot, ChatGPT, […]

URGENT: Microsoft Teams Update Affects Teams Voice

URGENT: Microsoft Teams Update Affects Teams Voice Introduction On December 17, 2022, Microsoft started to send MC487014 through the Message Center in the Microsoft 365 Admin Center to all tenants with users who have Teams phone numbers that have the extension “value” appended to their Teams phone numbers. Tom Arbuthnot was one of the first […]

Zerto v10 Update

Zerto v10 Update Zerto just dropped Update 2 for Version 10, and they continue to really drive some great features into the product, extending what started with v10 as some game-changing features. See our previous post on this one. Starting with v10, Zerto made the Zerto Virtual Manager (ZVM) role only available on a Linux appliance, […]

November 2023 Newsletter

November 2023 Newsletter What’s New in the Hybrid Data Center? Windows 2012 R2 Server Windows Server 2012 R2 has reached end of support on October 10, 2023. The October 2023 security update is the last update available for this version. After this date, devices running this version of Windows Server will no longer receive monthly security updates (unless […]

Web Content Filtering and Protection with Defender for Endpoint

Web Content Filtering and Protection with Microsoft Defender for Endpoint Introduction When I was a technology executive in the days before Microsoft 365 and Defender for Endpoint, November and December always used to give me pause. Hectic end-of-year work schedules and vacations both drive people to use their employer’s devices for personal use: shopping, traveling, […]

eGroup | Enabling Technologies Joins the Microsoft Intelligent Security Association

eGroup | Enabling Technologies Joins Microsoft Intelligent Security Association November 2, 2023 — eGroup | Enabling Technologies announces its membership into the Microsoft Intelligent Security Association (MISA). This recognition underscores eGroup | Enabling Technologies’ commitment to providing cutting-edge cybersecurity solutions tailored to the unique needs of Microsoft customers. “I am proud to announce our acceptance […]

Microsoft Teams Voice: Extension Extinction

Microsoft Teams Voice: Extension Extinction Introduction When installing Teams Voice for our customers, we get a lot of requests to configure Teams to support extension dialing. Recently we’ve had a few cases where for technical reasons, we could not set up the clients’ Teams dial plans with extension dialing. We were able to offer a […]

Bringing Microsoft Purview and Copilot Together to Protect Sensitive Data

Bringing Microsoft Purview and Copilot Together to Protect Sensitive Data Over the past 5 months, this blog series has covered the fundamentals of Microsoft Purview. As we have shown, Purview provides a powerful layer of data-aware visibility and protection that complements more traditional security controls like identity management, access control lists, group memberships, endpoint security, […]