Teams Phones Major Updates Have Begun
Teams Phones Major Updates Have Begun Introduction This is a follow up to our earlier article about the major upgrades to native Teams phones taking place this year: The operating system on the phones will be upgraded to Android 12. Management of Native Teams phones in Intune will switch to the Android Open Source Project […]
Incident Response Plans: What Are They and Why Do They Matter to Your Organization?
Incident Response Plans: What Are They and Why Do They Matter to Your Organization? Consider These Facts Human error accounts for a whopping 95% of cybersecurity breaches—and contrary to common belief, cybercriminals and hackers tend to exploit vulnerabilities outside of the IT department, capitalizing on the weakest links within your company. A mere 38% of […]
August 2024 Newsletter
August 2024 Newsletter Table of Contents What’s the Buzz at eGroup Enabling Technologies? Following the Broadcom acquisition, VMware transitioned from perpetual licensing to a subscription model in December 2023. Since then, we have seen some customer’s renewals increase 2-3 times the amount of their last renewal. Check out the following resources to better understand your […]
Azure VMware Solution (AVS) vs. Data Center/Azure Native
Azure VMware (AVS) vs Data Center/Azure Native Overview Azure VMware Solution (AVS) offers an advantageous path to extend VMware environments into Azure, enhancing interoperability with established VMware infrastructures and various Azure functionalities. This post is part of a series where we assess the pros and cons of various cloud solutions, highlighting the importance of choosing […]
Weekly Tech Tip: Check Your FEC!
Weekly Tech Tip: Check Your FEC! Connectivity Issues Between Cohesity C5016 Nodes and Nexus 93180YC-FX3H Switches Very recently, I was deploying a new Cohesity C5016 appliance with 25Gb NICs, connecting up to a pair of Nexus 93180YC-FX3H switches. When using the 9K’s in a VPC pair, my personal preference is to configure the Cohesity nodes […]
Cloud-First vs On-Premises Computing: Contrasting Views
Cloud-First vs On-Premises Computing: Contrasting Views Cloud-First Versus On-Premises Computing: A Comparison Broadcom’s acquisition of VMWare and subsequent price increases are an inflection point for many IT organizations. Even mature organizations with large VMware environments are facing substantial price increases. Fortunately, organizations have choices to proceed. Our prior blog outlines several of them. This blog provides the […]
Microsoft Intune Multi-Admin Approval
Microsoft Intune Multi-Admin Approval Microsoft Intune is a cloud-based device management service that allows you to manage and secure your organization’s devices, apps, and data. As an Intune Administrator, you can configure Microsoft Intune settings, such as creating policies, applications, compliance, and assigning roles. However, some of these changes may have a significant impact on […]
Weekly Tech Tip: Nutanix Centralized Local Password Management
Weekly Tech Tip: Nutanix Centralized Local Password Management Simplify and Secure: Centralized Password Management with Prism Central In the ever-evolving landscape of IT security, managing passwords across various platforms can be a daunting task. However, Nutanix has released a Centralized Local Password Management feature designed to centralize password management, ensuring a more secure and standardized […]
July 2024 Newsletter
July 2024 Newsletter Table of Contents What’s New at eGroup Enabling Technologies? eGroup Enabling Technologies has been recognized as #1 in the U.S. for both Microsoft Cybersecurity Incentives Program (CSI) Workshops and the Copilot Adoption Factory Program. These achievements highlight our dedication to providing industry-leading solutions and exceptional service to our clients. ➡️ #1 in the […]
How to Deploy Microsoft Intune Endpoint Privilege Management
How to Deploy Microsoft IntuneEndpoint Privilege Management Endpoint Privilege Management is a crucial aspect of IT security and compliance. It involves granting the minimum level of permissions and privileges necessary for devices and users to perform their tasks, while preventing unauthorized or malicious actions. Endpoint Privilege Management can help reduce the risk of data breaches, […]