Microsoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality,...
How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune
Inefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology...
Dynamic Data Access | Security Through Session-Level Controls
Hi everyone. Welcome. My name is Jason Rutherford and I'm the Managing Partner for Model Technology Solutions. Today I'm going to show you...
It’s All About the Boot | How Our UNUI Tool Increases Endpoint Security
It's all about the boot, not just the patch. Endpoint patching only increases security when the end user reboots and applies the update to their...
It Really Works! How To Do More With The Same Resources in Multiple Industries Through UEM [Case Studies]
You might be wondering, "What is Unified Endpoint Management?" The common definition of UEM is a single platform for management of devices such as...
All Recent Posts
Integrating Advanced Threat Protection Features of Microsoft 365 in Healthcare Cybersecurity Strategies
In the ever-evolving landscape of healthcare IT, the surge in cyber threats, particularly phishing...
FAQs About vCISO Services
The vCISO concept has been gaining prominence as of late, particularly as small and medium-sized...
Helping A Manufacturing Company Tap Into $ Millions Of New Revenue Through Better Cybersecurity
Cybersecurity used to be a term used only by solitary employees in offices down two flights of...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.