MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune

How To Distribute Apps and Reduce Infrastructure Overhead With Microsoft Intune

by Steve Bowman | Nov 4, 2021 | Endpoint Management, Intune, Patch Management

Estimated Reading Time: 4 minutesInefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology Solutions. Having a non-automated solution for app deployment: Steals valuable time from your...
Limiting Your Attack Surface with Microsoft Defender for Endpoint

Limiting Your Attack Surface with Microsoft Defender for Endpoint

by Steve Bowman | Oct 27, 2021 | Cyber Security, Microsoft Defender

Estimated Reading Time: 4 minutesEvery day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. To prevent this, you can use Microsoft...
Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

by Steve Bowman | Oct 22, 2021 | Cyber Security

Estimated Reading Time: 6 minutesIn this post, we’re going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You’ll read a high-level overview of Microsoft’s CASB...
Partially Secured | Defined Endpoint Security (Level 3)

Partially Secured | Defined Endpoint Security (Level 3)

by Model Technology Solutions | Sep 22, 2021 | Cyber Security, Unified Endpoint Management

Estimated Reading Time: 6 minutesWelcome to Model’s approach to Unified Endpoint Management Maturity Model overview series! My name is Jason Ruthford and I’m the managing partner of Model Technology Solutions. Today, we’re going to be reviewing...
It’s All About the Boot | How Our UNUI Tool Increases Endpoint Security

It’s All About the Boot | How Our UNUI Tool Increases Endpoint Security

by Model Technology Solutions | Aug 25, 2021 | Endpoint Management, Objur, Patch Management

Estimated Reading Time: 4 minutesIt’s all about the boot, not just the patch. Endpoint patching only increases security when the end user reboots and applies the update to their machine. Now, in the world of 2003 where everyone had a desktop and a 9-5 job, this...
« Older Entries
Next Entries »
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow