MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
How To Manually Remove A Failed Certificate Authority from Active Directory

How To Manually Remove A Failed Certificate Authority from Active Directory

by Jason Rutherford | Jan 13, 2022 | Active Directory, Certificate Authority

Estimated Reading Time: 3 minutesIf you’ve ever had a failed certificate authority in one of your environments, it probably caused a lot of issues! In that case, there are various ways to remove that certificate. But sometimes those various...
In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

by Jason Rutherford | Nov 12, 2021 | Cyber Security, Unified Endpoint Management

Estimated Reading Time: 7 minutesHello, and welcome to Model Technology Solutions’ approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our maturity model. If you’ve missed the introductory video or any other video in...
How To Securely Expose Internal Applications to the Outside World

How To Securely Expose Internal Applications to the Outside World

by Jason Rutherford | Oct 14, 2021 | Azure, Cyber Security

Estimated Reading Time: 4 minutesHey everyone, Jason Rutherford here with Model Technology Solutions. Today we’re going to talk about how to configure an external app proxy. Using application proxy from Azure enables you to expose an internal web application to...
Dynamic Data Access | Security Through Session-Level Controls

Dynamic Data Access | Security Through Session-Level Controls

by Jason Rutherford | Oct 5, 2021 | Azure, Cyber Security, Endpoint Management

Estimated Reading Time: 3 minutesHi everyone. Welcome. My name is Jason Rutherford and I’m the Managing Partner for Model Technology Solutions. Today I’m going to show you Microsoft’s cloud access security broker (CASB) implements Dynamic Access...
It Really Works! How To Do More With The Same Resources in Multiple Industries Through UEM [Case Studies]

It Really Works! How To Do More With The Same Resources in Multiple Industries Through UEM [Case Studies]

by Jason Rutherford | Aug 16, 2021 | Endpoint Management, Patch Management, Unified Endpoint Management

Estimated Reading Time: 3 minutesYou might be wondering, “What is Unified Endpoint Management?” The common definition of UEM is a single platform for management of devices such as phones, tablets, laptops, and desktops. But more than that, at Model...
« Older Entries
Next Entries »
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow