Microsoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality,...
How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune
Inefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology...
Dynamic Data Access | Security Through Session-Level Controls
Hi everyone. Welcome. My name is Jason Rutherford and I'm the Managing Partner for Model Technology Solutions. Today I'm going to show you...
It’s All About the Boot | How Our UNUI Tool Increases Endpoint Security
It's all about the boot, not just the patch. Endpoint patching only increases security when the end user reboots and applies the update to their...
It Really Works! How To Do More With The Same Resources in Multiple Industries Through UEM [Case Studies]
You might be wondering, "What is Unified Endpoint Management?" The common definition of UEM is a single platform for management of devices such as...
All Recent Posts
Generative AI Implications for Law Firms
You’re a managing partner, principal, or senior IT staff at a law firm. Your team is starting to...
Anticipate, Prepare, Protect | A Security Checklist for a Proactive Defense
Navigating the digital landscape demands more than passive measures; it calls for a proactive...
Protecting Healthcare Data on Personal Devices: Strategies and Solutions
In the age of digital healthcare, the proliferation of Bring Your Own Device (BYOD) policies has...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.