This post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5....
Overview and Operational Reports | Microsoft Intune Reporting Series, Part One
Introduction To The Series You have enrolled your endpoints into Microsoft Intune, you’ve configured policies, and you are managing your devices....
Laying The Foundation For UEM: Initial Management Infrastructure Maturity (Level 1)
Welcome to the second article in our series on Unified Endpoint Management: Laying The Foundation For UEM: Management Infrastructure Maturity Level...
How To Automatically Enroll iOS Devices in Microsoft Intune
In this post, I'm going to show you how to add existing iOS devices into Intune using Apple Configurator 2, Apple Business Manager, and Microsoft...
Managing Compliance Policies & Conditional Access with Microsoft Intune
Since Microsoft Intune’s debut in 2011, it has become a market leader within the UEM category. A simple user interface and its ever-changing and...
All Recent Posts
Virtual CISOs: A Strategic Asset for Meeting Legal Cybersecurity Benchmarks
If you’re a managing partner, principal, or senior IT staff at a law firm, an intentional,...
How Law Firms Can Use AI Tools & vCISO Platforms To Mitigate Emerging Threats
As a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for...
Generative AI Implications for Law Firms
You’re a managing partner, principal, or senior IT staff at a law firm. Your team is starting to...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.