MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

by Steve Bowman | Jan 4, 2022 | Case Studies, Endpoint Management, Objur, Patch Management, SCCM, Unified Endpoint Management

Estimated Reading Time: 5 minutesIn endpoint management, the less you’re noticed by end users, the better that you’re doing at your job. And when you’re a global Private Equity firm with only nine IT pros to service hundreds of employees in multiple...
Investigating Entity Profiles With Microsoft Defender for Identity

Investigating Entity Profiles With Microsoft Defender for Identity

by Steve Bowman | Dec 9, 2021 | Cyber Security, Endpoint Management

Estimated Reading Time: 3 minutesThis post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little bit spread out, using Microsoft Defender for Identity will allow...
Limiting Your Attack Surface with Microsoft Defender for Endpoint

Limiting Your Attack Surface with Microsoft Defender for Endpoint

by Steve Bowman | Oct 27, 2021 | Cyber Security, Microsoft Defender

Estimated Reading Time: 4 minutesEvery day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. To prevent this, you can use Microsoft...
Top 10 Desktop Security Risks and How to Fix Them (2018 edition)

Top 10 Desktop Security Risks and How to Fix Them (2018 edition)

by Jason Rutherford | Aug 8, 2018 | Cyber Security, Patch Management

Estimated Reading Time: 5 minutesDesktop security risks are an unfortunate constant in any environment. Not a year goes by where we don’t hear about a high-profile cyber attack or data breach. Target, Home Depot, Adobe… the list of high-profile targets is large...
Next Entries »
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow