This post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5....
Overview and Operational Reports | Microsoft Intune Reporting Series, Part One
Introduction To The Series You have enrolled your endpoints into Microsoft Intune, you’ve configured policies, and you are managing your devices....
[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused
In endpoint management, the less you're noticed by end users, the better that you're doing at your job. And when you're a global Private Equity firm...
How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune
Inefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology...
It’s All About the Boot | How Our UNUI Tool Increases Endpoint Security
It's all about the boot, not just the patch. Endpoint patching only increases security when the end user reboots and applies the update to their...
All Recent Posts
Navigating Compliance and Cybersecurity in Healthcare IT with Co-Managed Services
In the rapidly evolving world of healthcare IT, Directors and Managers are increasingly confronted...
Integrating Advanced Threat Protection Features of Microsoft 365 in Healthcare Cybersecurity Strategies
In the ever-evolving landscape of healthcare IT, the surge in cyber threats, particularly phishing...
FAQs About vCISO Services
The vCISO concept has been gaining prominence as of late, particularly as small and medium-sized...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.