In healthcare IT, the management of devices and applications is paramount, more so today as IT environments grow in complexity and reach,...
How Microsoft Is Modernizing The Patch Management Process
The rapid rise in remote work, cybercrime, and the decentralization of devices has caused Microsoft to rework their patch management process. Every...
Well-Defined and Centralized | Operationalizing/Efficient Management Infrastructure (Level 5)
Welcome to Model's Approach to Unified Endpoint Management. This is the final post in our Management Infrastructure Maturity Model series, which is...
Advanced Reporting with Microsoft Graph API and Power BI | Microsoft Intune Reporting Series, Part Four
Welcome to the fourth post in our Microsoft Intune Reporting series. In our first post, we introduced Intune’s reporting framework and core...
Centralizing Microsoft Analytics Data Using the Model Power BI Dashboard | Part 1
Microsoft's endpoint management software is some of the most-powerful on the marketplace. We here at Model have dedicated our careers to...
All Recent Posts
Top Cybersecurity Challenges in Manufacturing and How to Overcome Them
In manufacturing, keeping your production line running smoothly and safely is the top priority....
Virtual CISOs: A Strategic Asset for Meeting Legal Cybersecurity Benchmarks
If you’re a managing partner, principal, or senior IT staff at a law firm, an intentional,...
How Law Firms Can Use AI Tools & vCISO Platforms To Mitigate Emerging Threats
As a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.