MESSAGE US
  • Home
  • What We Do
    • Endpoint Management
      • Model PowerBI Dashboard
      • M365 Recon Dashboard
      • IT Maturity Health Check
    • Threat Management & Cybersecurity
      • Comprehensive vCISO Services & NIST Assessments
      • Vulnerability Remediation
    • Identity Management
    • Collaboration Management
    • Compliance Management
    • Cloud And Datacenter Infrastructure
  • Industry Specialization
    • Financial Services
    • Healthcare Services
    • Legal Services
    • Manufacturing
  • Who We Are
    • How We Work
    • Work For Us
  • Resources
    • Blog
Overview and Operational Reports | Microsoft Intune Reporting Series, Part One

Overview and Operational Reports | Microsoft Intune Reporting Series, Part One

by Steve Bowman | Jan 31, 2022 | Endpoint Management, Microsoft Intune, Patch Management, Unified Endpoint Management

Estimated Reading Time: 11 minutesIntroduction To The Series You have enrolled your endpoints into Microsoft Intune, you’ve configured policies, and you are managing your devices. What’s next? How do you validate your endpoints’ management states, and how do you track...
[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused

by Steve Bowman | Jan 4, 2022 | Case Studies, Endpoint Management, Objur, Patch Management, SCCM, Unified Endpoint Management

Estimated Reading Time: 5 minutesIn endpoint management, the less you’re noticed by end users, the better that you’re doing at your job. And when you’re a global Private Equity firm with only nine IT pros to service hundreds of employees in multiple...
Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps

by Steve Bowman | Oct 22, 2021 | Cyber Security

Estimated Reading Time: 6 minutesIn this post, we’re going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You’ll read a high-level overview of Microsoft’s CASB...
How To Securely Expose Internal Applications to the Outside World

How To Securely Expose Internal Applications to the Outside World

by Jason Rutherford | Oct 14, 2021 | Azure, Cyber Security

Estimated Reading Time: 4 minutesHey everyone, Jason Rutherford here with Model Technology Solutions. Today we’re going to talk about how to configure an external app proxy. Using application proxy from Azure enables you to expose an internal web application to...
Dynamic Data Access | Security Through Session-Level Controls

Dynamic Data Access | Security Through Session-Level Controls

by Jason Rutherford | Oct 5, 2021 | Azure, Cyber Security, Endpoint Management

Estimated Reading Time: 3 minutesHi everyone. Welcome. My name is Jason Rutherford and I’m the Managing Partner for Model Technology Solutions. Today I’m going to show you Microsoft’s cloud access security broker (CASB) implements Dynamic Access...
« Older Entries
Next Entries »
Ready to Start?

MESSAGE US

MODEL TECHNOLOGY SOLUTIONS

We’re a Microsoft Partner with multiple Gold and Silver proficiencies. Our team has decades of combined experience helping companies like yours in diverse industries to drive their digital transformations using Microsoft’s powerful solution set.

© 2025 Model Technology Solutions | Web Design by People Project Media

SERVICES

Endpoint Management

Collaboration Management

Identity Management

Compliance Management

Threat Management and Cybersecurity

Cloud and Datacenter Infrastructure Services

Help Desk Services

RESOURCES

vCISO And Risk Assessment Services

Unified Endpoint Management IT Maturity Health Check

Blogs and Articles

 

SOCIAL

  • Follow
  • Follow
  • Follow
  • Follow