MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security

Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security

by Steve Bowman | Dec 2, 2021 | Cyber Security, Endpoint Management, Microsoft Defender, News, News Releases, Unified Endpoint Management, Windows 10

Estimated Reading Time: 4 minutesMicrosoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality, and technology coming to the Microsoft 365 ecosystem. These changes run the gamut from...
Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

by Steve Bowman | Nov 4, 2021 | Cyber Security, Office 365

Estimated Reading Time: 4 minutesThese days there’s many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as a credentials harvest attack. According to...
How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune

How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune

by Steve Bowman | Nov 4, 2021 | Endpoint Management, Intune, Patch Management

Estimated Reading Time: 4 minutesInefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology Solutions. Having a non-automated solution for app deployment: Steals valuable time from your...
Limiting Your Attack Surface with Microsoft Defender for Endpoint

Limiting Your Attack Surface with Microsoft Defender for Endpoint

by Steve Bowman | Oct 27, 2021 | Cyber Security, Microsoft Defender

Estimated Reading Time: 4 minutesEvery day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. To prevent this, you can use Microsoft...
Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

by Steve Bowman | Oct 22, 2021 | Cyber Security

Estimated Reading Time: 6 minutesIn this post, we’re going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You’ll read a high-level overview of Microsoft’s CASB...
« Older Entries
Next Entries »
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow