Teams Phones Major Updates: Chicken or Egg?

Teams Phones Major Updates: Chicken or Egg? Introduction This year, Microsoft will be making two (2) major changes to Teams Native phones: The operating system on the phones will be upgraded to Android 12. Management of Native Teams phones in Intune will switch to the Android Open Source Project (AOSP) from the Android Device Administrator. […]

Navigating the VMware License Increase: RETHINK IT & Consider Azure VMware Solution

Navigating the VMware License Increase: RETHINK IT & Consider Azure VMware Solution With Broadcom’s recent acquisition of VMware, many organizations face increases in licensing costs under the new subscription model due to how the subscriptions are calculated. Azure VMware Solution (AVS) presents a compelling alternative to not only help accelerate an organization’s cloud strategy, but […]

May 2024 Newsletter

May 2024 Newsletter What’s New at eGroup Enabling Technologies? eGroup Enabling Technologies Recognized with the Microsoft Verified Managed XDR Solution Status eGroup Enabling Technologies has achieved Microsoft Verified Managed Extended Detection and Response (MXDR) solution status. By achieving this status, our team has proven our robust MXDR services including a Security Operation Center (SOC) with […]

Where, Oh Where, Should I Start With AI? ​

Where, Oh Where, Should I Start With AI? AI is everywhere. It is one of those rare technologies that have fascinated so many people in such a short time. When it comes to deciding whether to adopt AI in their organization, business and technology leaders are divided into three groups. There is the vanguard, those […]

Purview Insider Risk Management: How to Capture Forensic Evidence on Intune Enrolled Devices

Purview Insider Risk Management: How to Capture Forensic Evidence on Intune Enrolled Devices Insider risks are a growing threat to organizations, especially in the era of remote work and cloud-based services. Insider risks can be caused by malicious actors who intentionally steal or leak sensitive data, sabotage systems, or compromise accounts. They can also be […]