In endpoint management, the less you're noticed by end users, the better that you're doing at your job. And when you're a global Private Equity firm...
Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security
Microsoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality,...
In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)
Hello, and welcome to Model Technology Solutions' approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our...
Partially Secured | Defined Endpoint Security (Level 3)
Welcome to Model's approach to Unified Endpoint Management Maturity Model overview series! My name is Jason Ruthford and I'm the managing partner of...
It Really Works! How To Do More With The Same Resources in Multiple Industries Through UEM [Case Studies]
You might be wondering, "What is Unified Endpoint Management?" The common definition of UEM is a single platform for management of devices such as...
All Recent Posts
Navigating Compliance and Cybersecurity in Healthcare IT with Co-Managed Services
In the rapidly evolving world of healthcare IT, Directors and Managers are increasingly confronted...
Integrating Advanced Threat Protection Features of Microsoft 365 in Healthcare Cybersecurity Strategies
In the ever-evolving landscape of healthcare IT, the surge in cyber threats, particularly phishing...
FAQs About vCISO Services
The vCISO concept has been gaining prominence as of late, particularly as small and medium-sized...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.