When Microsoft introduced the Cloud Management Gateway (CMG) for Microsoft Endpoint Configuration Manager (MECM), there was only one supported...
Transparent and Secure | Operationalizing/Efficient Endpoint Security (Level 5)
This post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5....
How To Securely Expose Internal Applications to the Outside World
Hey everyone, Jason Rutherford here with Model Technology Solutions. Today we're going to talk about how to configure an external app proxy. Using...
Dynamic Data Access | Security Through Session-Level Controls
Hi everyone. Welcome. My name is Jason Rutherford and I'm the Managing Partner for Model Technology Solutions. Today I'm going to show you...
Laying The Foundation For UEM: Initial Management Infrastructure Maturity (Level 1)
Welcome to the second article in our series on Unified Endpoint Management: Laying The Foundation For UEM: Management Infrastructure Maturity Level...
All Recent Posts
Top Cybersecurity Challenges in Manufacturing and How to Overcome Them
In manufacturing, keeping your production line running smoothly and safely is the top priority....
Virtual CISOs: A Strategic Asset for Meeting Legal Cybersecurity Benchmarks
If you’re a managing partner, principal, or senior IT staff at a law firm, an intentional,...
How Law Firms Can Use AI Tools & vCISO Platforms To Mitigate Emerging Threats
As a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.