- All
- Articles
- Case Studies
- Guides
- News

Making Cybersecurity Boring Again: Why Simplicity and Consistency Are Key to Effective Defense
Making Cybersecurity Boring Again
I’ve dedicated my career to a single mission: building the world’s best cyber defense solutions for organizations. And it’s been a lot of fun. Starting back in the late nineti...

Building Successful Partnerships with Technology Vendors: Insights from Experience
25 Years of Insights: Keys to Successful Tech Partnerships
Over the past 25 years, as a second-generation IT professional, I have had the privilege of consulting for and delivering technology solutions to m...

Streamlining NIST CSF v2.0 Compliance with Devicie and Microsoft Intune
By leveraging Microsoft Intune, Devicie helps accelerate your organization's National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) program. Devicie’s advanced platform simplifie...

Devicie: Streamlining Your Essential Eight Compliance
By leveraging Microsoft Intune, Devicie can accelerate and simplify your Essential Eight program. Our advanced platform streamlines delivery and ongoing management of endpoint devices, ensuring seamless comp...

Tom Plant discusses preparing for Windows 10 end of support on Risky.Biz
With the end of support deadline for Windows 10 looming, Tom Plant discussed with Risky Business’ Catalin Cimpanu how partners can help their customers ensure they’re ready. Some customers will require hardware...

How Windows 10 end of support is accelerating modern device management transformation
IT innovation is exploding. Mainstream AI products are becoming more prevalent, and with them come more complex productivity, security and compliance requirements, especially for endpoints. Whilst some organiza...

Entering a new era of efficiency with zero touch provisioning
Using traditional device provisioning methods ties up IT resources for days or weeks, pulling them away from more business-critical tasks and negatively impacting the bottom line.

Tom Plant discusses Windows security policy on Risky.Biz
Our Technical Product Manager, Tom Plant, caught up with Risky.Biz founder Patrick Gray on the Risky.Biz podcast.
They discussed Microsoft Windows Policy Management an...

Devicie Co-founder and CTO awarded Microsoft MVP
We are delighted to reveal that our co-founder and CTO, Jose Schenardie, has been awarded the title of Microsoft Most Valuable Professional (MVP), recognising his contributions to the tech com...

Devicie doubling down on growth by appointing Colin Britton as Chief Operating Officer
TAMPA BAY, Feb. 29, 2024 – Devicie, a leader in hyperautomation and orchestration for Microsoft 365 environments, is excited to announce the appointment of Colin Britton as Chief Operating Officer. In th...

ASD Cyber Threat Report key findings
ASD Cyber Threat Report key findings
Developed by the Australian Signals Directorate (ASD), the ASD Cyber Threat Report 2...

Predictions on trends and emerging technologies in cyber security
Introduction
What does the future hold for cybersecurity and cyberspace?
In the past few years, cyber attacks have surged in both volume and attention, with constant phishing and ransomware cam...

Expert tips for implementing Intune
Implementing Intune
i
mplementing Intune is a significant project. Historically many Intune migrations have come unstuck due to complexity, leaving organisations in a hybrid state, or no better ...

Implementing Essential Eight controls with Devicie
With most enterprises now adopting some form of remote work arrangements, the need and demand for robust security to protect employee devices has never been greater.
In the face of rising cyber...

Why a breaker became a maker
Introduction
Cutting to the chase: The breaker
Why does my opinion matter?
Well, to many people it might not.
But, I’ve been hacking stuff for quite a while.
In fact, I...

The role of UX in cyber security
Ensuring the security of digital infrastructure and data is a basic responsibility of IT.
But, what about enabling a good end user experience (UX)?
There's a misconception that robust device ...

Fostering a culture of empathy and pragmatism for effective patch management
Introduction
Patch management is a tough nut to crack.
Even with all the information available out there, patching remains a notoriously challenging IT task that companies of all sizes struggle with.&nb...

Challenging mindsets on admin privileges
Introduction
According to the International Data Corporation (IDC), 70 per cent of security threats originate from user endpoints. And, according to industry reports 82 per cent of data breaches in 2021 involv...

Removing admin privileges without compromising productivity
How to remove local admin privileges without compromising productivity or employee satisfaction
...

How to build a strong foundation for privacy protection
Introduction
There is no denying public discussion around data breaches and privacy violations are becoming...

Don't start your Intune project without considering these factors
Introduction
When it comes to designing an Intune project, there are things to do and there are things to avoid.
There is what good looks like and then there is every...

Drawbacks of managing your own SOE
Introduction
Infrastructure-as-a-service is now a smarter, safer and cheaper way for many organisations to manage their SOE.
Years ago, when I worked in an IT helpdesk role, the boss pointed out ...

A Zero Trust security model for the modern workplace
The pandemic changed the modern workplace with innumerable businesses moving off-premises and adopting a hybrid work culture almost overnight.
And, since the world changed at the end...

Security versus productivity: The dilemma
It’s time to redefine best-practice security in terms of greater productivity and a better user experience.
Keeping businesses secure is a top priority for CISOs, but best-practice security ...

Pros and Cons of Virtual Desktop Infrastructure
Introduction
Improved security, long-term savings and centralised management are all pitched as some of the top reasons to invest in virtual desktop infrastructure (V...

Device fleet rebuild and Intune configurations delivered in 48 hours
Overview
A Managed Service Provider (MSP) supported a financial services organization and its parent company to swiftly recover from an incident. The entire device fleet needed to be rebuilt in a weekend to pr...

Modernizing device management and provisioning for a trusted financial institution
Overview
A respected lending institution had an immediate need to deploy hundreds of devices. They needed to...

How one Australian research university achieved modern management
Introduction
A well-respected Australian research university with 10,000 students is modernising its device management.

State Library of New South Wales accelerates Essential Eight compliance
Introduction
The State Library of New South Wales is a large reference and research library open to the pub...

How one school automated device management to bridge a skills gap
Introduction
The IT team of an independent school in NSW plays a critical role in managing devices for 250 staff and 1,000 students. With staff turnover and growing technology demands, the School f...

Modernising a council’s device fleet with automation
Introduction
A local government council with over 700 employees, serving over 150,000 community members set out to achieve modern management.
Challenge
Council employees, including tho...

How cloud-managed devices accelerated global expansion
Supporting international expansion
Launched in 2015 in Australia, PointsBet cut their teeth as a small online bookmaker before expanding to international markets.

Achieving Over $1.2 Million ROI and Full Compliance: How a Construction Giant Transformed with Devicie
Revolutionizing IT
In today’s digital era, even the most robust industries need IT solutions that offer flexibility, security, and cost-efficiency. One construction company recently partnered...

How Arrow saved time by automating device management
Automating device management
Arrow is one of the largest privately-owned telecommunication and IT service providers in Australia. They offer managed service provider (MSP) services and indust...

ISP reaches Essential Eight maturity on end user devices
Modernise without overspending
An ISP with 80+ employees was operating in a hybrid environment, with a mix of cloud and on-prem infrastructure. The team was making incremental technology changes in an effort t...

Capabilities for application lifecycle management
Applications support businesses with various day-to-day operations and communication, making them indispensable in the modern workplace.
When executed correctly, application management becomes the catalyst...

Risk of local administrator privileges in ransomware and malware attacks
Introduction
Many of the most infamous and devastating data breaches of recent years have shared something in common—poorly secured local administrator privileges.
Local administrator privileges g...

Application management best practices with modern management
Introduction
While applications are indispensable to any modern organisation, managing them at scale can take time, manual effort and money. To such an extent, application management stands as the most expensi...

Guide: Best practices for efficient patch management
Introduction
Efficient patch management plays a critical role in maintaining the security and integrity of an organisation’s systems and networks.

A guide to remove admin priviledges
Misused and unmanaged admin privileges pose a significant risk to your company.
In fact, according to Forrester Research, at least 80 per cent of security breaches involve compromised pri...

Key challenges facing education technology
Education technology (EdTech) has been rapidly evolving over the past few years, bringing significant changes to the way students learn and teachers teach. From online learning platforms and digital textbooks, ...

Devicie Inks Exclusive Deal with Managed Service Provider Entag to Provide Secure Modern Endpoint Management, Powered by Microsoft Intune
Partnership positions Devicie at the heart of Entag’s Microsoft-first strategy and to drive its Telstra business
Tampa Bay, Fla., Nov. 14, 2024 – Devicie, a leader in optimised Microsoft Int...

Devicie Joins the Microsoft Intelligent Security Association
Tampa Bay, Florida, USA — August 5, 2024 — Devicie, a leader in optimized Microsoft Intune deployment and maintenance solutions, today announced it has become a member of the Microsoft Intelligent Secur...

Devicie achieves AICPA SOC 2 Type 2 compliance
We’re pleased to announce that Devicie has again officially achieved SOC 2 Type 2 compliance and added SOC 3 this year. This milestone highlights our continuing resolute dedication to safeguarding data security...

Devicie Partners with Lansweeper
New integration simplifies IT management, enhances cybersecurity and ensures compliance for Microsoft Intune deployments.
Tampa Bay, FL, ...

Devicie Now Available in Microsoft AppSource
Tampa Bay, Florida, USA — June 5, 2024 — Devicie, a leader in optimized Microsoft Intune deployment and maintenance solutions, today announced the availa...

Devicie Joins Microsoft for Startups Pegasus Program and is Now Available in Microsoft Azure Marketplace
Devicie is working with Microsoft to make its hyperautomation and orchestration solutions more robust and easily accessible
TAMPA BAY, May 6, 2024 – Devicie, a ...

Behind the investment: Devicie – Intune-native device management & security
With the proliferation of connected devices, the explosion of best-of-breed B2B applications, and the increasingly dynamic types of working environments (from a public café to y...

Sydney school sets the standard for modern management
As schools nationwide grapple with the challenges of resource limitations, skills shortages, device maintenance and security concerns, one independent NSW school saw this as an opportun...

Martin McGregor on the AusCERT Share Today, Save Tomorrow podcast
Introduction
Device co-founder Martin McGregor caught up with Anthony Caruana on the AusCERT Share Today, Save Tomorrow podcast.
They discussed:
U...

Sydney cyber start-up Devicie lands $14m from US VC giant
Devicie, a Sydney-based software start-up that helps companies secure their workers’ laptops, has landed $14 million in series A funding from New York-based private equity and venture capital firm&n...

Aussie security ISV Devicie raises $14 million Series A round
Sydney-headquartered, end-user security device management software company Devicie has raised $14 million in a series A round.
The capital injection was led by New York-based private equity firm ...

Get to Know Martin McGregor, Devicie CEO and Co-founder
Martin McGregor, CEO and co-founder of Devicie, answers questions from Intelligent CIO in a get-to-know-you interview.
Most memorable achievement
What would you describe as your most memorable achiev...

How Australian cybersecurity organisations can foster innovation one role at a time
Introduction
There are big benefits for cybersecurity businesses prepared to widen the recruitment net and invest in training promisin...

The challenge of effective device management in a world of remote working
Introduction
The proliferation of remote devices and the decentralisation of work have given rise to numerous challenges for businesses. One of the most pressing is re...

Devicie Appoints Shane Harding as Chief Executive Officer
Introduction
Today we announced the appointment of Shane Harding as Chief Executive Officer of Devicie. Shane joined us seven months ago as Chief Operating Officer. His appointment is part of...

Three core privacy mantras for Aussie businesses to live by
Introduction
There’s a growing body of evidence to suggest consumers are pulling back from sharing data about themselves and their preferences in greater numbers.
In a recent PwC study, half of s...

Australian privacy reform gathers momentum with new report
The Australian Attorney-General’s Department has recently published the outcome of its long-awaited review of the Privacy Act 1988. This marks a significant step towards reforming the country’s priv...

Devicie selected for Microsoft-Austrade Go Global program
We’re thrilled to have been selected as one of Microsoft’s SaaS partners with high growth potential to participate in the new Microsoft-Austrade Go Global program.
This new initiative will give u...

Neurodiverse technophiles: working at Devicie
Originally featured in Balance the Grind.
Devicie is a fast-growing technology start-up that automates layered device security and management to ensure ongoing protection and productivity in the moder...

IWD 2023: Why it’s time the cyber sector improved its gender ratio
Introduction
What a difference a few years and a few dozen high-profile hacks can make.
Not so long ago, cybersecurity was seen as a decidedly unglamorous subset of the ICT...

Why you must secure employee devices
Introduction
So, you’ve jumped on the hybrid work train and let your employees take their work devices home to use – but have you ensured those devices are safe from cyberattack? Martin McGregor, CEO and co...

Why Australian organisations should aim higher on privacy
When the Government revised the Privacy Act at the end of last year, additional reforms were flagged. But according to Glyn Geoghegan, Security and Compliance Director at Devicie, there are now many reasons for...

Device bags $14m Series A for global expansion
Sydney-based Devicie has raised $14 million in a Series A to expand offshore with its end-user device security management software.
The round was led by New York VC giant Insight Partners, suppor...

Employee device management is key to Essential Eight maturity levels
The Essential Eight is a set of guidelines to assist government agencies and businesses to bolster cybersecurity defences. In parallel with the evolution of the Essential Eight, there has been an i...

Risky.Biz podcast with Devicie
Risky.Biz podcast with Devicie
In this episode of Risky.Biz, host Patrick Gray chats with Devicie CEO Martin McGregor about why Devicie chose Microsoft Intune as its foundation.
Listen to learn why Devici...

Health, finance among the hardest hit in 497 Australian data breaches in H2 2022
In total, 497 notifiable data breaches were reported between July and December 2022, a 26 per cent increase in the year’s first half.
The latest Notifiable data breaches report released today reveals that ...

Devicie demo with Risky.Biz podcast
In this Risky.Biz product demo, Devicie CEO Martin McGregor gives a comprehensive demo of the Devicie platform.
Highlights:
Provisioning
Subscription model
Applying controls
Devicie c...

Devicie on the top five trends to watch in the future of work
Human-centric technology and experiences: In today’s hyper-connected world, people expect the best from their technology and their devices. They want access to the latest gadgets; they want speed and hi...

10 Minute IT Jams - An update from Devicie
Co-Founder and CEO of Devicie, Martin McGregor talks with TechDay's 10 Minute IT Jams to discuss why the company was created, how Devicie helps their customers, and what's next.
In the video, Ma...

What is this Essential Eight thing I keep hearing about and (why) should I care
Introduction
One of the most well-known and effective ways to demonstrate security maturity is by aligning with the Essential Eight, a set of Australian government-developed baseline mitigation strateg...

Data privacy lessons marketers must take heed of in 2023
CMO Australia speaks to a host of technology and industry thought leaders, including our very own Glyn Geoghegan, to discuss what organisations must do to safeguard data and what technology will help or hind...
No result Found!