MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

by Steve Bowman | Jan 4, 2022 | Case Studies, Endpoint Management, Objur, Patch Management, SCCM, Unified Endpoint Management

Estimated Reading Time: 5 minutesIn endpoint management, the less you’re noticed by end users, the better that you’re doing at your job. And when you’re a global Private Equity firm with only nine IT pros to service hundreds of employees in multiple...
In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

In Capable Hands: Managed/Capable Endpoint Security Maturity (Level 4)

by Jason Rutherford | Nov 12, 2021 | Cyber Security, Unified Endpoint Management

Estimated Reading Time: 7 minutesHello, and welcome to Model Technology Solutions’ approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our maturity model. If you’ve missed the introductory video or any other video in...
Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365

by Steve Bowman | Nov 4, 2021 | Cyber Security, Office 365

Estimated Reading Time: 4 minutesThese days there’s many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as a credentials harvest attack. According to...
How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune

How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune

by Steve Bowman | Nov 4, 2021 | Endpoint Management, Intune, Patch Management

Estimated Reading Time: 4 minutesInefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology Solutions. Having a non-automated solution for app deployment: Steals valuable time from your...
Limiting Your Attack Surface with Microsoft Defender for Endpoint

Limiting Your Attack Surface with Microsoft Defender for Endpoint

by Steve Bowman | Oct 27, 2021 | Cyber Security, Microsoft Defender

Estimated Reading Time: 4 minutesEvery day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. To prevent this, you can use Microsoft...
« Older Entries
Next Entries »
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow