Investigating Entity Profiles With Microsoft Defender for Identity

By |2021-12-14T20:10:43-06:00December 9th, 2021|Cyber Security, Endpoint Management|

This post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little [...]

Comments Off on Investigating Entity Profiles With Microsoft Defender for Identity

Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security

By |2021-12-07T15:38:37-06:00December 2nd, 2021|Cyber Security, Endpoint Management, Microsoft Defender, News, News Releases, Unified Endpoint Management, Windows 10|

Microsoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality, and technology coming to the Microsoft 365 ecosystem. [...]

Comments Off on Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security

In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

By |2021-11-17T12:28:49-06:00November 12th, 2021|Cyber Security, Unified Endpoint Management|

Hello, and welcome to Model Technology Solutions' approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our maturity model. If you've missed the introductory [...]

Comments Off on In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

By |2021-11-12T12:03:09-06:00November 4th, 2021|Cyber Security, Office 365|

These days there's many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as [...]

Comments Off on Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

Limiting Your Attack Surface with Microsoft Defender for Endpoint

By |2021-11-12T12:03:21-06:00October 27th, 2021|Cyber Security, Microsoft Defender|

Every day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. [...]

Comments Off on Limiting Your Attack Surface with Microsoft Defender for Endpoint

Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

By |2021-11-19T20:02:06-06:00October 22nd, 2021|Cyber Security|

In this post, we're going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You'll read a high-level overview [...]

Comments Off on Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

How To Securely Expose Internal Applications to the Outside World

By |2021-11-12T12:03:43-06:00October 14th, 2021|Azure, Cyber Security|

Hey everyone, Jason Rutherford here with Model Technology Solutions. Today we're going to talk about how to configure an external app proxy. Using application proxy from Azure enables you [...]

Comments Off on How To Securely Expose Internal Applications to the Outside World

Dynamic Data Access | Security Through Session-Level Controls

By |2021-11-19T19:55:16-06:00October 5th, 2021|Azure, Cyber Security, Endpoint Management|

Hi everyone. Welcome. My name is Jason Rutherford and I'm the Managing Partner for Model Technology Solutions. Today I'm going to show you Microsoft's cloud access security broker (CASB) [...]

Comments Off on Dynamic Data Access | Security Through Session-Level Controls

Partially Secured | Defined Endpoint Security (Level 3)

By |2021-11-12T12:03:55-06:00September 22nd, 2021|Cyber Security, Unified Endpoint Management|

Welcome to Model's approach to Unified Endpoint Management Maturity Model overview series! My name is Jason Ruthford and I'm the managing partner of Model Technology Solutions. Today, we're going [...]

Comments Off on Partially Secured | Defined Endpoint Security (Level 3)

Handling Windows 10 Updates and Compliance Issues in a WFH Environment

By |2020-07-13T13:27:28-06:00July 1st, 2020|Azure, Cyber Security, Endpoint Management, Microsoft Intune, Patch Management|

The modern office has been mobile for some time, but it took a global pandemic to really drive home the point. While laptop and mobile devices have been widely [...]

Comments Off on Handling Windows 10 Updates and Compliance Issues in a WFH Environment

Model Technology

Let us help you get your end point and data center strategy on cruise control!  Ask about our Calibration Assessment.

CONTACT US

  • 12125 Woodcrest Executive Drive, Ste. 204 Creve Coeur, MO 63141
  • (314) 254-4138
  • sales@model-technology.com

RECENT TWEETS