[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused
By William Bracken
Published January 4, 2022
Estimated Reading Time: 6 minutes

In endpoint management, the less you’re noticed by end users, the better that you’re doing at your job. And when you’re a global Private Equity firm with only nine IT pros to service hundreds of employees in multiple departments across two continents, successfully keeping under the radar is even more difficult.

  • Our Unified Endpoint Management (UEM) as a Service offering presented this small, but wide-reaching group of IT professionals with the perfect opportunity to:
  • Offload many of their tedious yet essential tasks
  • Focus more on money-making tasks and processes for their company
  • Still keep end users happy and stay successfully behind the scenes as a result of effective endpoint management

If you’d rather read a PDF version of this case study, you can download it here.

A Global Private Equity Firm With Less Than a Dozen IT Professionals

This global Private Equity customer employs just nine IT professionals to service 12 offices and 350 employees in Europe and Asia.

The team was “drowning” in maintenance tasks like application packaging, imaging, and updates. A lack of deep expertise in MECM/Intune resulted in under utilization of these powerful Microsoft tools. Non-standard device provisioning had also lead to an inconsistent OS environment and inefficient troubleshooting. There was no automated provisioning capabilities outside of their main headquarters, so too many hours were spent on manual provisioning.

The firm was looking to delegate some of those tasks to a third-party contractor to help relieve the pressure and reallocate their time. They were also going through a merger at the time, so senior IT professionals wanted the team to be able to focus more on business application and processing tasks specifically to make it as smooth as possible.

A Loaded Bench of IT Pros For Hire

The firm narrowed their contractor choices to two, including Model Technology Solutions. They’d worked with both before in different capacities. After meeting with both contractors, they ultimately made the decision to go with Model for several reasons:

Expertise – Part of the mission at Model Technology is to hire the best talent in endpoint management and pass that expertise on to our customers. This level of talent was apparent to the venture firm, giving them greater confidence in our ability to implement their UEM.

Honesty – Model’s goal is to stick close to their core areas of expertise, never failing to over-deliver on projects that they pitch, and never claiming abilities they do not have. This transparency goes a long way towards inspiring confidence in clients, including this Private Equity firm’s decision to move forward with UEM.

Automation and Standardization With (Mostly) Their Current Tools

Once the decision was made, Model and the IT team began meeting weekly to hash out the logistics of the project. Model immediately identified multiple areas where automation could be improved, specifically around device provisioning.

The Model and the firm’s IT team ultimately decided to:

  • Improve automation around computer naming standards and remove the human error potential in computer naming.
  • Automate the manual steps through a new MECM Task Sequence deployment process. This process would account for core and ancillary applications, driver sets for multiple models, language packs for global locations, and Co-Management configurations for Intune managed Windows Update for Business and automatic enrollment in Defender for Endpoint.
  • Establish global deployment servers to ensure the provisioning process could be standardized across the organization.

Through the entire discovery process Model attempted to engage the desktop support team at the firm. Model suggested using MECM/Intune to implement most of these improvements. There were several questions as to whether MECM could provide some of the needed functionality. However, Model knew it could. With Model’s reassurances, the team decided to move forward primarily using the Microsoft software suite the firm already knew and owned.

The firm’s IT team also requested that deployment be done using SCCM online, and Model was easily able to accommodate this request.

Once the plan was established, Model began automating processes one by one, including:

  • Packaging of applications
  • Scripting of custom desktop configurations and computer naming standards
  • Packaging drivers sets and language packs for each supported model

Model also leveraged their in-house Dynamic Deployment Interface (DDI) software. This software allows for the dynamic provision process to be driven by decisions made at the outset of the deployment.

Model also implemented:

  • New PXE based deployment services at the global locations for consistent provision across the firm.
  • Patch My PC for third-party application updating during and after device provisioning.

[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

[fusion_builder_container type=”legacy” hundred_percent=”no” hundred_percent_height=”no” min_height_medium=”” min_height_small=”” min_height=”” hundred_percent_height_scroll=”no” align_content=”stretch” flex_align_items=”flex-start” flex_justify_content=”flex-start” flex_column_spacing=”0px” hundred_percent_height_center_content=”yes” equal_height_columns=”yes” container_tag=”div” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”” id=”” margin_top_medium=”” margin_bottom_medium=”” margin_top_small=”” margin_bottom_small=”” margin_top=”25″ margin_bottom=”75″ padding_top_medium=”” padding_right_medium=”” padding_bottom_medium=”” padding_left_medium=”” padding_top_small=”” padding_right_small=”” padding_bottom_small=”” padding_left_small=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” link_color=”” link_hover_color=”” border_sizes_top=”” border_sizes_right=”” border_sizes_bottom=”” border_sizes_left=”” border_color=”” border_style=”solid” box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” z_index=”” overflow=”” gradient_start_color=”” gradient_end_color=”” gradient_start_position=”0″ gradient_end_position=”100″ gradient_type=”linear” radial_direction=”center center” linear_angle=”180″ background_color=”” background_image=”” skip_lazy_load=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_blend_mode=”none” video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”” video_loop=”yes” video_mute=”yes” video_preview_image=”” render_logics=”” absolute=”off” absolute_devices=”small,medium,large” sticky=”off” sticky_devices=”small-visibility,medium-visibility,large-visibility” sticky_background_color=”” sticky_height=”” sticky_offset=”” sticky_transition_offset=”0″ scroll_offset=”0″ animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” filter_hue=”0″ filter_saturation=”100″ filter_brightness=”100″ filter_contrast=”100″ filter_invert=”0″ filter_sepia=”0″ filter_opacity=”100″ filter_blur=”0″ filter_hue_hover=”0″ filter_saturation_hover=”100″ filter_brightness_hover=”100″ filter_contrast_hover=”100″ filter_invert_hover=”0″ filter_sepia_hover=”0″ filter_opacity_hover=”100″ filter_blur_hover=”0″][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ align_self=”auto” content_layout=”column” align_content=”flex-start” valign_content=”flex-start” content_wrap=”wrap” spacing=”0″ center_content=”yes” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” class=”” id=”” background_image_id=”” type_medium=”” type_small=”” order_medium=”0″ order_small=”0″ spacing_left_medium=”” spacing_right_medium=”” spacing_left_small=”” spacing_right_small=”” spacing_left=”” spacing_right=”0″ margin_top_medium=”” margin_bottom_medium=”” margin_top_small=”” margin_bottom_small=”” margin_top=”” margin_bottom=”” padding_top_medium=”” padding_right_medium=”” padding_bottom_medium=”” padding_left_medium=”” padding_top_small=”” padding_right_small=”” padding_bottom_small=”” padding_left_small=”” padding_top=”50″ padding_right=”50″ padding_bottom=”50″ padding_left=”50″ hover_type=”none” border_sizes_top=”” border_sizes_right=”” border_sizes_bottom=”” border_sizes_left=”” border_color=”” border_style=”solid” border_radius_top_left=”15″ border_radius_top_right=”15″ border_radius_bottom_right=”15″ border_radius_bottom_left=”15″ box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” background_type=”image” gradient_start_color=”rgba(141,198,63,0.9)” gradient_end_color=”rgba(141,198,63,0.9)” gradient_start_position=”0″ gradient_end_position=”100″ gradient_type=”linear” radial_direction=”center center” linear_angle=”180″ background_color=”” background_image=”https://model-technology.com/wp-content/uploads/2021/07/cheerful-black-businessman-checking-reports-and-ma-EL69BQS-600×338.jpg” background_position=”center center” background_repeat=”no-repeat” background_blend_mode=”none” render_logics=”” filter_type=”regular” filter_hue=”0″ filter_saturation=”100″ filter_brightness=”100″ filter_contrast=”100″ filter_invert=”0″ filter_sepia=”0″ filter_opacity=”100″ filter_blur=”0″ filter_hue_hover=”0″ filter_saturation_hover=”100″ filter_brightness_hover=”100″ filter_contrast_hover=”100″ filter_invert_hover=”0″ filter_sepia_hover=”0″ filter_opacity_hover=”100″ filter_blur_hover=”0″ animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” content_alignment_medium=”” content_alignment_small=”” content_alignment=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” class=”” id=”” margin_top=”” margin_right=”” margin_bottom=”” margin_left=”” font_size=”” fusion_font_family_text_font=”” fusion_font_variant_text_font=”” line_height=”” letter_spacing=”” text_color=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Identify Infrastructure Security Holes and Growth Opportunities

[/fusion_text][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” content_alignment_medium=”” content_alignment_small=”” content_alignment=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” class=”” id=”” margin_top=”” margin_right=”” margin_bottom=”” margin_left=”” font_size=”” fusion_font_family_text_font=”” fusion_font_variant_text_font=”” line_height=”” letter_spacing=”” text_color=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

How mature is your infrastructure? Have your infrastructure assessed by Model Technology engineers, and identify exactly where and how Unified Endpoint Management could improve your security, compliance, and efficiency.

[/fusion_text][fusion_button link=”https://model-technology.com/uemmaturity” text_transform=”” title=”” target=”_self” link_attributes=”” alignment_medium=”” alignment_small=”” alignment=”left” modal=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” class=”” id=”” color=”custom” button_gradient_top_color=”#ff9800″ button_gradient_bottom_color=”#ff9800″ button_gradient_top_color_hover=”#ffbe5e” button_gradient_bottom_color_hover=”#ff9800″ accent_color=”#ffffff” accent_hover_color=”#ffffff” type=”” bevel_color=”” border_color=”#ffffff” border_hover_color=”#ffffff” size=”” stretch=”no” margin_top=”25″ margin_right=”” margin_bottom=”” margin_left=”” icon=”” icon_position=”left” icon_divider=”no” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” border_radius_top_left=”8px” border_radius_top_right=”8px” border_radius_bottom_right=”8px” border_radius_bottom_left=”8px”]learn more[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

[fusion_builder_container type=”flex” hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”true” min_height=”” hover_type=”none” link=”” border_sizes_top=”” border_sizes_bottom=”” border_sizes_left=”” border_sizes_right=”” first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” content_alignment_medium=”” content_alignment_small=”” content_alignment=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” class=”” id=”” margin_top=”” margin_right=”” margin_bottom=”” margin_left=”” font_size=”” fusion_font_family_text_font=”” fusion_font_variant_text_font=”” line_height=”” letter_spacing=”” text_transform=”none” text_color=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

A Standardized Dynamic Deployment Process & Feelings of Camaraderie

The end result of the app deployment project was a standardized, structured, automated, and dynamic deployment process that could be used across the entire firm. This process:

  • Reduced the time to provision from days to hours (in many cases, less than an hour)
  • Created a more consistent infrastructure and endpoint environment
  • Reclaimed time for desktop techs to focus on business-oriented tasks
  • Increased speed of deployment for getting end users up and productive and decreased time to market

According to the VP of Cybersecurity and Infrastructure, as a result of this project he “hasn’t touched” Windows imaging in a year and a half.

“Model completely stepped in to take care of all the updates and testing that was lots of work for me,” he said. He is also no longer the bottleneck for his team or end users, and he can focus more on the tasks he wants to focus on.

The VP of Cybersecurity also said that as a result of Model’s engaging the firm’s support and IT staff in the process, they’ve experienced a renewed sense of buy-in and teamwork at the company.
“Model really made them feel a little more empowered to request change,” he said, “and to be part of the testing of updates and new features and new software.”

Continued Partnership For Better Endpoint Management

But the projects did not end there. The firm has continued to delegate tasks to Model Technology Solutions, including:

  • Redesigning their disaster recovery strategy
  • Various automation and cleanup tasks
  • Ongoing support for their endpoint management

Model now meets weekly with the firm to ensure satisfaction and assist with any other necessary tasks they may need to delegate.

In the end, Model’s involvement has resulted in:

  • A standardized deployment process
  • Increased patching compliance
  • Improved security both objectively and as a felt-sense
  • End users remaining happy and, for the most part, “blissfully ignorant” to the behind the scenes happenings in IT
  • The ability for the IT team to stay lean but effective

…and, most importantly, the senior IT staff being practically and mentally freed up to focus on the tasks they wanted to focus on: building a better, more-profitable business, and learning how to leverage IT services to be a part of that.

Our Maturity Model Assessment

Are you a Private Equity or other business in the financial sector looking to implement UEM or just improve your endpoint management? We’d love to help you orient yourself.

Model is currently offering a comprehensive maturity assessment. This assessment is an excellent first step toward implementing Unified Endpoint Management. This assessment will allow you to identify key security holes and areas for improvement that you could use to free up time and capital like this venture firm did through UEM (plus get a bunch of other benefits!).

As a part of the assessment, Model Technology Solution will assess your infrastructure through the lens of our proprietary maturity model. After the assessment is complete, Model will provide a prioritized list of projects to improve your maturity in different areas. This list can be used to decide which projects to tackle first (and last) and also to identify the most cost-effective projects to undertake.

Want to learn more about this assessment? Visit this link to learn more.

Article By William Bracken
Partner – Model Technology Solutions William is an experienced and results-driven IT geek who is passionate about the “automation of things,” with an extensive background in systems management, advanced OS deployment automation, and overall infrastructure automation. He has more than 19 years of experience in IT, and has designed and implemented management solutions that have dramatically reduced support costs and ultimately brought consistent and well managed operating environments to organizations across the US.

Related Posts

Paying high cyber-insurance premiums?

Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.

Learn More