My name is Jason Rutherford, and I'm the Managing Partner of Model Technology Solutions. The last two years have shifted the landscape of Endpoint...
Efficient and Intuitive | Application Management (Level 5)
Welcome to Model's approach to Unified Endpoint Management Application Management Level 5. This is part of the Maturity Model series on Unified...
Centralizing Microsoft Analytics Data Using the Model Power BI Dashboard | Part 1
Microsoft's endpoint management software is some of the most-powerful on the marketplace. We here at Model have dedicated our careers to...
Transparent and Secure | Operationalizing/Efficient Endpoint Security (Level 5)
This post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5....
Overview and Operational Reports | Microsoft Intune Reporting Series, Part One
Introduction To The Series You have enrolled your endpoints into Microsoft Intune, you’ve configured policies, and you are managing your devices....
All Recent Posts
The Essential Role of Intune Management and Patching Strategies in Healthcare IT
In healthcare IT, the management of devices and applications is paramount, more so today as IT...
Navigating Compliance and Cybersecurity in Healthcare IT with Co-Managed Services
In the rapidly evolving world of healthcare IT, Directors and Managers are increasingly confronted...
Integrating Advanced Threat Protection Features of Microsoft 365 in Healthcare Cybersecurity Strategies
In the ever-evolving landscape of healthcare IT, the surge in cyber threats, particularly phishing...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.