MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
Increasing A Clients’ Microsoft Defender Score from 30% to 68% In Less Than 7 Days

Increasing A Clients’ Microsoft Defender Score from 30% to 68% In Less Than 7 Days

by Steve Bowman | Feb 3, 2025 | Case Studies, Manufacturing

Estimated Reading Time: 3 minutesThe hard reality is there’s often enough IT work for a hundred engineers, but only one or two to handle it all. Small IT budgets and a lack of available talent make it hard for manufacturing companies to find skilled, affordable...
The Essential Role of Intune Management and Patching Strategies in Healthcare IT

The Essential Role of Intune Management and Patching Strategies in Healthcare IT

by Steve Bowman | Apr 17, 2024 | Endpoint Management, Intune, Microsoft Intune, Patch Management, Unified Endpoint Management

Estimated Reading Time: 2 minutesIn healthcare IT, the management of devices and applications is paramount, more so today as IT environments grow in complexity and reach, particularly with the surge in remote healthcare services. The transition to remote work and...
Protect Business Data On Personal Devices With M65 Endpoint Security

Protect Business Data On Personal Devices With M65 Endpoint Security

by Steve Bowman | Dec 8, 2022 | Cyber Security, Microsoft Intune

Estimated Reading Time: 5 minutesBring your own device (BYOD) refers to a policy of permitting employees to use personally-owned devices (laptops, tablets, and smartphones) to access company information and applications. BYOD continues to grow in popularity among...
Advanced Reporting with Microsoft Graph API and Power BI | Microsoft Intune Reporting Series, Part Four

Advanced Reporting with Microsoft Graph API and Power BI | Microsoft Intune Reporting Series, Part Four

by Steve Bowman | Jul 12, 2022 | Endpoint Management, Microsoft Intune, Patch Management

Estimated Reading Time: 12 minutesWelcome to the fourth post in our Microsoft Intune Reporting series. In our first post, we introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn...
Advanced Reporting with Intune Data Warehouse and Log Analytics | Microsoft Intune Reporting Series, Part Three

Advanced Reporting with Intune Data Warehouse and Log Analytics | Microsoft Intune Reporting Series, Part Three

by Steve Bowman | Apr 11, 2022 | Microsoft Intune

Estimated Reading Time: 10 minutesWelcome to the third post of our Intune Reporting Series. The first post introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn throughout the system. The...
« Older Entries
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow