Search by Author

Please click on the double arrows to expand the list and check the name of author to view all their articles. 

Filter:

Filter by Authors

  • Expand/Collapse

Search by Content

To search by content, please type in any key words that you are searching for. The results will list any or all of the typed words.
Microsoft Azure Operations Management Webinar

Microsoft Azure Operations Management Webinar

In this webinar, we discuss Azure resources and the best way to manage them. Organizations using Azure Operations Management Suite report better control of security, monitoring, cost, and manageability. Enabling Technologies brings its experience with Azure Operations Management suite best practices.

It covers:
o Comparisons/contrasts/integrations with SCOM
o Recent updates to log analytics, protection/recovery, automation, and security
o Test drives through pertinent Azure Automation and Security/Compliance scenarios
o Best practices to manage, secure and control costs of IaaS/PaaS
o and lastly, Considerations as you scale

Cast: Enabling Technologies Corp

Tuesday, December 12, 2017/Author: Marketing Queen/Number of views (261)/Comments (0)/ Article rating: No rating
Categories: Webinars
Tags:
Wednesday, November 15, 2017/Author: Marketing Queen/Number of views (616)/Comments (0)/ Article rating: No rating
Categories: Webinars
Tags:
Wednesday, October 25, 2017/Author: Marketing Queen/Number of views (764)/Comments (0)/ Article rating: No rating
Categories: Webinars
Tags:
Phish Hunter webinar

Phish Hunter webinar

Business Email Compromise - Solving the Phishing Problem
Users are still click-happy and sophisticated attackers know it. They take advantage by targeting specific high value users such as executives and accountants who have access to payment systems and wire transfer accounts. Once these accounts are compromised, they’re used to send legitimate looking requests for payment or wire transfers that end up depositing the money into the attacker’s accounts. The Internet Crime Complaint Center (IC3) states that between October 2013 and December 2016, a staggering US $5.3 billion was stolen through Business email Compromise, dwarfing the $1billion lost due to ransomware in 2016.
Enabling Technologies combines Microsoft tools’ and our knowledge of forensics to analyze threats (existing or potential), create rules, and automate responses to targeted phishing attacks. Administrators are provided with a short list of actionable next steps and users are left with a clean inbox and fewer doubts in their workday. The solution is called phish hunter, and we’re at your service to enable it in your tenant so that you can minimize business email compromise going forward.

Cast: Enabling Technologies Corp

Tags: Phishing, Microsoft Cloud Security and Phish Hunter

Friday, October 20, 2017/Author: Marketing Queen/Number of views (2244)/Comments (0)/ Article rating: No rating
Tags:
Phishhunter webcast EDU

Phishhunter webcast EDU

Business Email Compromise - Solving the Phishing Problem
Users are still click-happy and sophisticated attackers know it. They take advantage by targeting specific high value users such as executives and accountants who have access to payment systems and wire transfer accounts. Once these accounts are compromised, they’re used to send legitimate looking requests for payment or wire transfers that end up depositing the money into the attacker’s accounts. The Internet Crime Complaint Center (IC3) states that between October 2013 and December 2016, a staggering US $5.3 billion was stolen through Business email Compromise, dwarfing the $1billion lost due to ransomware in 2016.
Enabling Technologies combines Microsoft tools’ and our knowledge of forensics to analyze threats (existing or potential), create rules, and automate responses to targeted phishing attacks. Administrators are provided with a short list of actionable next steps and users are left with a clean inbox and fewer doubts in their workday. The solution is called phish hunter, and we’re at your service to enable it in your tenant so that you can minimize business email compromise going forward.

Cast: Enabling Technologies Corp

Tags: Microsoft Cloud Security, Phishing and Email Compromise

Thursday, October 19, 2017/Author: Marketing Queen/Number of views (127)/Comments (0)/ Article rating: No rating
Categories: Webinars
Tags:
12345678910Last