[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

By |2022-01-04T21:14:46-06:00January 4th, 2022|Endpoint Management, Objur, Patch Management, SCCM, Unified Endpoint Management|

In endpoint management, the less you're noticed by end users, the better that you're doing at your job. And when you're a global Private Equity firm with only nine [...]

Comments Off on [Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

Investigating Entity Profiles With Microsoft Defender for Identity

By |2021-12-14T20:10:43-06:00December 9th, 2021|Cyber Security, Endpoint Management|

This post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little [...]

Comments Off on Investigating Entity Profiles With Microsoft Defender for Identity

Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security

By |2021-12-07T15:38:37-06:00December 2nd, 2021|Cyber Security, Endpoint Management, Microsoft Defender, News, News Releases, Unified Endpoint Management, Windows 10|

Microsoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality, and technology coming to the Microsoft 365 ecosystem. [...]

Comments Off on Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security

In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

By |2021-11-17T12:28:49-06:00November 12th, 2021|Cyber Security, Unified Endpoint Management|

Hello, and welcome to Model Technology Solutions' approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our maturity model. If you've missed the introductory [...]

Comments Off on In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

By |2021-11-12T12:03:09-06:00November 4th, 2021|Cyber Security, Office 365|

These days there's many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as [...]

Comments Off on Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune

By |2022-01-12T17:58:40-06:00November 4th, 2021|Endpoint Management, Intune, Patch Management|

Inefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology Solutions. Having a non-automated solution for app [...]

Comments Off on How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune

Limiting Your Attack Surface with Microsoft Defender for Endpoint

By |2021-11-12T12:03:21-06:00October 27th, 2021|Cyber Security, Microsoft Defender|

Every day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. [...]

Comments Off on Limiting Your Attack Surface with Microsoft Defender for Endpoint

Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

By |2021-11-19T20:02:06-06:00October 22nd, 2021|Cyber Security|

In this post, we're going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You'll read a high-level overview [...]

Comments Off on Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

How To Securely Expose Internal Applications to the Outside World

By |2021-11-12T12:03:43-06:00October 14th, 2021|Azure, Cyber Security|

Hey everyone, Jason Rutherford here with Model Technology Solutions. Today we're going to talk about how to configure an external app proxy. Using application proxy from Azure enables you [...]

Comments Off on How To Securely Expose Internal Applications to the Outside World

Dynamic Data Access | Security Through Session-Level Controls

By |2021-11-19T19:55:16-06:00October 5th, 2021|Azure, Cyber Security, Endpoint Management|

Hi everyone. Welcome. My name is Jason Rutherford and I'm the Managing Partner for Model Technology Solutions. Today I'm going to show you Microsoft's cloud access security broker (CASB) [...]

Comments Off on Dynamic Data Access | Security Through Session-Level Controls

Model Technology

Let us help you get your end point and data center strategy on cruise control!  Ask about our Calibration Assessment.

CONTACT US

  • 12125 Woodcrest Executive Drive, Ste. 204 Creve Coeur, MO 63141
  • (314) 254-4138
  • sales@model-technology.com

RECENT TWEETS