In endpoint management, the less you're noticed by end users, the better that you're doing at your job. And when you're a global Private Equity firm...
Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security
Microsoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality,...
In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)
Hello, and welcome to Model Technology Solutions' approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our...
Partially Secured | Defined Endpoint Security (Level 3)
Welcome to Model's approach to Unified Endpoint Management Maturity Model overview series! My name is Jason Ruthford and I'm the managing partner of...
It Really Works! How To Do More With The Same Resources in Multiple Industries Through UEM [Case Studies]
You might be wondering, "What is Unified Endpoint Management?" The common definition of UEM is a single platform for management of devices such as...
All Recent Posts
How Law Firms Can Use AI Tools & vCISO Platforms To Mitigate Emerging Threats
As a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for...
Generative AI Implications for Law Firms
You’re a managing partner, principal, or senior IT staff at a law firm. Your team is starting to...
Anticipate, Prepare, Protect | A Security Checklist for a Proactive Defense
Navigating the digital landscape demands more than passive measures; it calls for a proactive...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.