Microsoft's endpoint management software is some of the most-powerful on the marketplace. We here at Model have dedicated our careers to...
Transparent and Secure | Operationalizing/Efficient Endpoint Security (Level 5)
This post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5....
Overview and Operational Reports | Microsoft Intune Reporting Series, Part One
Introduction To The Series You have enrolled your endpoints into Microsoft Intune, you’ve configured policies, and you are managing your devices....
[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused
In endpoint management, the less you're noticed by end users, the better that you're doing at your job. And when you're a global Private Equity firm...
Investigating Entity Profiles With Microsoft Defender for Identity
This post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active...
All Recent Posts
How Law Firms Can Use AI Tools & vCISO Platforms To Mitigate Emerging Threats
As a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for...
Generative AI Implications for Law Firms
You’re a managing partner, principal, or senior IT staff at a law firm. Your team is starting to...
Anticipate, Prepare, Protect | A Security Checklist for a Proactive Defense
Navigating the digital landscape demands more than passive measures; it calls for a proactive...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.