by Mike Brimberry | Dec 8, 2022 | Cyber Security, Microsoft Intune
Estimated Reading Time: 5 minutesBring your own device (BYOD) refers to a policy of permitting employees to use personally-owned devices (laptops, tablets, and smartphones) to access company information and applications. BYOD continues to grow in popularity among...
by Model Technology Solutions | Aug 23, 2022 | Endpoint Management, Patch Management, Unified Endpoint Management
Estimated Reading Time: 7 minutesWelcome to Model’s Approach to Unified Endpoint Management. This is the final post in our Management Infrastructure Maturity Model series, which is series of posts and videos we’ve done about our proprietary approach to UEM and...
by Gabriel Taylor | Jul 12, 2022 | Endpoint Management, Microsoft Intune, Patch Management
Estimated Reading Time: 12 minutesWelcome to the fourth post in our Microsoft Intune Reporting series. In our first post, we introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn...
by Gabriel Taylor | Apr 11, 2022 | Microsoft Intune
Estimated Reading Time: 10 minutesWelcome to the third post of our Intune Reporting Series. The first post introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn throughout the system. The...
by Jason Rutherford | Mar 30, 2022 | Endpoint Management, Unified Endpoint Management
Estimated Reading Time: 5 minutesWelcome to Model’s approach to Unified Endpoint Management Application Management Level 5. This is part of the Maturity Model series on Unified Endpoint Management. Today’s post will cover: A definition of Unified Endpoint...