MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
Protecting Healthcare Data on Personal Devices: Strategies and Solutions

Protecting Healthcare Data on Personal Devices: Strategies and Solutions

by Jason Rutherford | Apr 24, 2024 | BYOD, Healthcare

Estimated Reading Time: 3 minutesIn the age of digital healthcare, the proliferation of Bring Your Own Device (BYOD) policies has introduced both opportunities and challenges. While BYOD policies can enhance flexibility and efficiency, they also pose significant risks...
Automatic and Centralized | Operationalizing/Efficient Configuration Management (Level 5)

Automatic and Centralized | Operationalizing/Efficient Configuration Management (Level 5)

by Jason Rutherford | Jul 6, 2022 | Endpoint Management, Unified Endpoint Management

Estimated Reading Time: 7 minutesWelcome to another installment of Model’s approach to Unified Endpoint Management. This is part of a series of posts and videos we’ve done about our proprietary approach to UEM and the different stages of maturity in the...
Deploying Updates Efficiently & With Empathy | Updates And Servicing (Level 5)

Deploying Updates Efficiently & With Empathy | Updates And Servicing (Level 5)

by Jason Rutherford | May 10, 2022 | Endpoint Management, Unified Endpoint Management

Estimated Reading Time: 7 minutesWelcome to another installment of our Maturity Model series. In this post, we’ll briefly cover the Maturity Model phases and categories, and what the Updates and Servicing category looks like at Level 5 maturity. Our Maturity...
The Biggest Mindset Shift You Can Make To Improve Security

The Biggest Mindset Shift You Can Make To Improve Security

by Jason Rutherford | Apr 5, 2022 | Cyber Security, Endpoint Management, Unified Endpoint Management

Estimated Reading Time: 7 minutesMy name is Jason Rutherford, and I’m the Managing Partner of Model Technology Solutions. The last two years have shifted the landscape of Endpoint Security. Gone are the days when caring about cybersecurity was relegated to a...
Efficient and Intuitive | Application Management (Level 5)

Efficient and Intuitive | Application Management (Level 5)

by Jason Rutherford | Mar 30, 2022 | Endpoint Management, Unified Endpoint Management

Estimated Reading Time: 5 minutesWelcome to Model’s approach to Unified Endpoint Management Application Management Level 5. This is part of the Maturity Model series on Unified Endpoint Management. Today’s post will cover: A definition of Unified Endpoint...
« Older Entries
Next Entries »
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow