Case Study: Deploying Microsoft Teams Voice

Deploying Microsoft Teams Voice Competing in the commercial real estate market takes constant communication and 24×7 availability. For InSite Real Estate, L.L.C., Microsoft Teams is providing reliable phone and collaboration services from the cloud. As a leading commercial real estate and industrial developer, InSite buys, custom-develops, and then operates income-producing real estate. InSite owns over…

Case Study: NY’s Capital District Keeps Moving with Teams

NY’s Capital District Keeps Moving with Teams New York’s Capital District Transportation Authority (CDTA) is made up of more than 700 men and women providing mobility services to 60,000 customers each day. CDTA’s employees are nimbly improving services for its citizens using the collaboration and calling capabilities of Microsoft Teams. Capital District Transit Authority Albany…

Case Study: Investment Firm Hardens Endpoints and Optimizes Productivity

Investment Firm Hardens Endpoints and Optimizes Productivity *The name of the firm and the individuals supplying the testimonials were omitted due to their compliance restrictions. This independent asset management firm has built its portfolio in investments such as transportation, energy, power and renewables, and communications. The firm currently manages billions of dollars in assets from…

Case Study: Solving Performance Issues With Skype and Exchange Voicemails

Solving Performance Issues With Skype and Exchange Voicemails Since beginning as a high school, Gardner Webb University has advanced into a flourishing regional institution with a total of eight degree programs. Associate VP of Operations Wayne Johnson has advanced communications on campus by rolling out Skype for Business (and now Teams). Gardner Webb University has…

Case Study: Maricopa County Community School District Deploys SharePoint

Maricopa County Community School District Deploys SharePoint An outdated SharePoint system can fade into obscurity. But when upgraded correctly with a proper user adoption program, it can return to stardom. It’s that kind of turnaround that was led by Israel Class, the Director of IT at GateWay Community College. He shared his story after working…

Case Study: Overhaul Policies & Procedures with Sharepoint

Overhaul Policies & Procedures with SharePoint At Gardner-Webb University, Christian compassion meets critical thinking. That mindset led Associate VP of Operations Wayne Johnson to solve a major pain point: the sprawl of policy documents. The four-year private, Baptist-related institution successfully offers outstanding undergrad and graduate education, but struggled to manage policy and procedure paperwork. Gardner-Webb…

Case Study: Skype Connects Staff Across the Campus

Skype Connects Staff across the Campus Who is the National Aquarium? The 1.3 million people who visit the National Aquarium in Baltimore each year are captivated by its award-winning habitats and the more than 20,000 animals that live in them. Behind the scenes, CTO Sam Tawiah’s IT team creates an environment of security, collaboration, and…

Case Study: Moving to Exchange Online

Moving to Exchange Online K-12 school districts have a lot of ground to cover. Faculty, staff, and students all count on reliable infrastructure, solid security, and effective apps and services. Yet they typically do so with small IT teams. Southwest Allen County School District, near Fort Wayne, Indiana has been running lean for years. With…

Case Study: Cybersecurity Automation with PhishHunter

Cybersecurity Automation with PhishHunter With Volusia County schools seeing a massive uptick in phishing attempts they decided to deploy Enabling Technologies’ solution, PhishHunter. “We enabled PhishHunter at exactly the right time. Otherwise, we were going to have a potential catastrophe on our hands. In early 2018, I noted a much more realistic quality of phishing emails….

Case Study: Security Automation with ThreatHunter

Security Automation with ThreatHunter When the IT team at Cascade Environmental noticed that bad actors were automating their attempts to compromise identities and data, they proactively took action. They realized that while their environment may be secure at a point in time, morphing attack vectors could make them vulnerable at any time. Cascade’s growth made the…