• All
  • Articles
  • Case Studies
  • Guides
  • News
making cybersecurity boring again: why simplicity and consistency are key to effective defense

Making Cybersecurity Boring Again: Why Simplicity and Consistency Are Key to Effective Defense

Making Cybersecurity Boring Again I’ve dedicated my career to a single mission: building the world’s best cyber defense solutions for organizations. And it’s been a lot of fun. Starting back in the late nineti...
building successful partnerships with technology vendors: insights from experience

Building Successful Partnerships with Technology Vendors: Insights from Experience

25 Years of Insights: Keys to Successful Tech Partnerships Over the past 25 years, as a second-generation IT professional, I have had the privilege of consulting for and delivering technology solutions to m...
streamlining nist csf v2.0 compliance with devicie and microsoft intune

Streamlining NIST CSF v2.0 Compliance with Devicie and Microsoft Intune

By leveraging Microsoft Intune, Devicie helps accelerate your organization's National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) program. Devicie’s advanced platform simplifie...
devicie: streamlining your essential eight compliance

Devicie: Streamlining Your Essential Eight Compliance

By leveraging Microsoft Intune, Devicie can accelerate and simplify your Essential Eight program. Our advanced platform streamlines delivery and ongoing management of endpoint devices, ensuring seamless comp...
tom plant discusses preparing for windows 10 end of support on risky.biz

Tom Plant discusses preparing for Windows 10 end of support on Risky.Biz

With the end of support deadline for Windows 10 looming, Tom Plant discussed with Risky Business’ Catalin Cimpanu how partners can help their customers ensure they’re ready. Some customers will require hardware...
how windows 10 end of support is accelerating modern device management transformation

How Windows 10 end of support is accelerating modern device management transformation

IT innovation is exploding. Mainstream AI products are becoming more prevalent, and with them come more complex productivity, security and compliance requirements, especially for endpoints. Whilst some organiza...
entering a new era of efficiency with zero touch provisioning

Entering a new era of efficiency with zero touch provisioning  

Using traditional device provisioning methods ties up IT resources for days or weeks, pulling them away from more business-critical tasks and negatively impacting the bottom line.
tom plant discusses windows security policy on risky.biz

Tom Plant discusses Windows security policy on Risky.Biz

Our Technical Product Manager, Tom Plant, caught up with Risky.Biz founder Patrick Gray on the Risky.Biz podcast.   They discussed Microsoft Windows Policy Management an...
devicie co-founder and cto awarded microsoft mvp

Devicie Co-founder and CTO awarded Microsoft MVP

We are delighted to reveal that our co-founder and CTO, Jose Schenardie, has been awarded the title of Microsoft Most Valuable Professional (MVP), recognising his contributions to the tech com...
devicie doubling down on growth by appointing colin britton as chief operating officer

Devicie doubling down on growth by appointing Colin Britton as Chief Operating Officer

TAMPA BAY, Feb. 29, 2024 – Devicie, a leader in hyperautomation and orchestration for Microsoft 365 environments, is excited to announce the appointment of Colin Britton as Chief Operating Officer. In th...
employee device management is winning over boardrooms

Employee device management is winning over boardrooms

Employee device management is having a moment—it's now a tremendous business enabler and a winning boardroom conversation.  Historically, when pitching top solutions to the board, employee device m...
the smart way to manage apps on employee devices

The smart way to manage apps on employee devices

A smarter way to manage applications on employee devices Managing applications on employee devices at scale is complex and...
asd cyber threat report key findings

ASD Cyber Threat Report key findings

ASD Cyber Threat Report key findings Developed by the Australian Signals Directorate (ASD), the ASD Cyber Threat Report 2...
predictions on trends and emerging technologies in cyber security

Predictions on trends and emerging technologies in cyber security

Introduction What does the future hold for cybersecurity and cyberspace?  In the past few years, cyber attacks have surged in both volume and attention, with constant phishing and ransomware cam...
expert tips for implementing intune

Expert tips for implementing Intune

Implementing Intune   i mplementing Intune is a significant project. Historically many Intune migrations have come unstuck due to complexity, leaving organisations in a hybrid state, or no better ...
gain a competitive advantage with device management

Gain a competitive advantage with device management

Introduction Enhanced device security, ongoing compliance and increased productivity are just some benefits of sound device management.  Device management, done right, is the secret sauce your bus...
insights from the microsoft digital defense report 2023

Insights from the Microsoft Digital Defense Report 2023

Microsoft has released the fourth edition of its Digital Defence Report.  Informed by data collected from Microsoft and its partners from July 2022 to June 2023, the report details security threa...
implementing essential eight controls with devicie

Implementing Essential Eight controls with Devicie

With most enterprises now adopting some form of remote work arrangements, the need and demand for robust security to protect employee devices has never been greater.   In the face of rising cyber...
why a breaker became a maker

Why a breaker became a maker

Introduction Cutting to the chase: The breaker   Why does my opinion matter?  Well, to many people it might not.  But, I’ve been hacking stuff for quite a while.  In fact, I...
cyber security practices for small and medium-sized businesses

Cyber security practices for small and medium-sized businesses

Introduction Defending against cybercrime is a fundamental requirement for every business, regardless of its size.    In the past, many small and medium-sized enterprises (SMEs) a...
devicie’s martin mcgregor on the risky.biz podcast

Devicie’s Martin McGregor on the Risky.Biz podcast

Introduction Device co-founder Martin McGregor caught up with Risky.Biz founder Patrick Gray on the Risky.Biz podcast.   They discussed:   Devicie being selected to join the Mic...
securing your endpoints is critical for defence in depth

Securing your endpoints is critical for defence in depth

Endpoint security crucial: Prevent initial breaches; strengthen defence in depth 60-75% of all successful cyber-attacks start at an endpoint. But whenever we read about a breach, the focus moves q...
the role of ux in cyber security

The role of UX in cyber security

Ensuring the security of digital infrastructure and data is a basic responsibility of IT.  But, what about enabling a good end user experience (UX)?  There's a misconception that robust device ...
fostering a culture of empathy and pragmatism for effective patch management

Fostering a culture of empathy and pragmatism for effective patch management

Introduction Patch management is a tough nut to crack.  Even with all the information available out there, patching remains a notoriously challenging IT task that companies of all sizes struggle with.&nb...
farewell to cyrise: reflecting on the venture accelerator's impact on australian cyber security

Farewell to CyRise: Reflecting on the venture accelerator's impact on Australian cyber security

Farewell to CyRise Venture accelerator, supporter, and champion of cyber security startups in the Asia Pacific, CyRise officially closed their doors on 19 May 2023. 
creativity can help ease australia’s it skills shortage

Creativity can help ease Australia’s IT skills shortage

How creativity can help ease Australia’s IT skills shortage  Australia is amid a major skills shortage across the Information and Communications Technology (ICT) sector—and the cybersecurity sector is ...
challenging mindsets on admin privileges

Challenging mindsets on admin privileges

Introduction According to the International Data Corporation (IDC), 70 per cent of security threats originate from user endpoints. And, according to industry reports 82 per cent of data breaches in 2021 involv...
microsoft intune helps devicie reinvent end-user device security

Microsoft Intune helps Devicie reinvent end-user device security

Introduction There’s a big misconception about how people view Devicie and Microsoft Intune.  
removing admin privileges without compromising productivity

Removing admin privileges without compromising productivity

How to remove local admin privileges without compromising productivity or employee satisfaction  ...
privacy protection: what a tech expert does to protect their data online

Privacy Protection: What a tech expert does to protect their data online

Introduction In today's perilous digital environment, the importance of keeping personal data secure cannot be overstated. With the rise of cybercrime and data breaches, it is more crucial than ever to take st...
how to build a strong foundation for privacy protection

How to build a strong foundation for privacy protection

Introduction There is no denying public discussion around data breaches and privacy violations are becoming...
don't start your intune project without considering these factors

Don't start your Intune project without considering these factors

Introduction When it comes to designing an Intune project, there are things to do and there are things to avoid.   There is what good looks like and then there is every...
drawbacks of managing your own soe

Drawbacks of managing your own SOE

Introduction Infrastructure-as-a-service is now a smarter, safer and cheaper way for many organisations to manage their SOE.  Years ago, when I worked in an IT helpdesk role, the boss pointed out ...
a zero trust security model for the modern workplace

A Zero Trust security model for the modern workplace

The pandemic changed the modern workplace with innumerable businesses moving off-premises and adopting a hybrid work culture almost overnight.   And, since the world changed at the end...
security versus productivity: the dilemma

Security versus productivity: The dilemma

It’s time to redefine best-practice security in terms of greater productivity and a better user experience.  Keeping businesses secure is a top priority for CISOs, but best-practice security ...
why organisations are failing to close the gap on ransomware

Why organisations are failing to close the gap on ransomware

Introduction When COVID-19 spread across the globe in 2020, countless businesses swiftly migrated to the c...
pros and cons of virtual desktop infrastructure

Pros and Cons of Virtual Desktop Infrastructure

Introduction Improved security, long-term savings and centralised management are all pitched as some of the top reasons to invest in virtual desktop infrastructure (V...
meeting security challenges in the remote workplace

Meeting security challenges in the remote workplace

Introduction When COVID-19 spread across the globe in 2020, many organisations were forced to accelerate their digital transformation to ensure business continuity.    While the trans...
why the white house zero trust memo is a game changer

Why the White House zero trust memo is a game changer

Many zero trust advocates are thrilled to learn about the White House memorandum for US government agencies to accelerate the adoption of a Zero Trust security model.  In case you missed it, the Offic...
devicie supports a new approach to uem

Devicie supports a new approach to UEM

Gone are the days when employees solely worked from company-provided devices and only within the office walls.  As we continue to adapt to the post-COVID workplace, more and more businesses are shifting t...
device fleet rebuild and intune configurations delivered in 48 hours

Device fleet rebuild and Intune configurations delivered in 48 hours

Overview A Managed Service Provider (MSP) supported a financial services organization and its parent company to swiftly recover from an incident. The entire device fleet needed to be rebuilt in a weekend to pr...
modernizing device management and provisioning for a trusted financial institution

Modernizing device management and provisioning for a trusted financial institution

Overview A respected lending institution had an immediate need to deploy hundreds of devices. They needed to...
how one australian research university achieved modern management

How one Australian research university achieved modern management

Introduction A well-respected Australian research university with 10,000 students is modernising its device management. 
state library of new south wales accelerates essential eight compliance

State Library of New South Wales accelerates Essential Eight compliance

Introduction The State Library of New South Wales is a large reference and research library open to the pub...
how one school automated device management to bridge a skills gap

How one school automated device management to bridge a skills gap

Introduction The IT team of an independent school in NSW plays a critical role in managing devices for 250 staff and 1,000 students. With staff turnover and growing technology demands, the School f...
modernising a council’s device fleet with automation

Modernising a council’s device fleet with automation

Introduction A local government council with over 700 employees, serving over 150,000 community members set out to achieve modern management. Challenge  Council employees, including tho...
how cloud-managed devices accelerated global expansion

How cloud-managed devices accelerated global expansion

Supporting international expansion Launched in 2015 in Australia, PointsBet cut their teeth as a small online bookmaker before expanding to international markets.  
achieving over $1.2 million roi and full compliance: how a construction giant transformed with devicie

Achieving Over $1.2 Million ROI and Full Compliance: How a Construction Giant Transformed with Devicie

Revolutionizing IT In today’s digital era, even the most robust industries need IT solutions that offer flexibility, security, and cost-efficiency. One construction company recently partnered...
how arrow saved time by automating device management

How Arrow saved time by automating device management

Automating device management  Arrow is one of the largest privately-owned telecommunication and IT service providers in Australia. They offer managed service provider (MSP) services and indust...
isp reaches essential eight maturity on end user devices

ISP reaches Essential Eight maturity on end user devices

Modernise without overspending An ISP with 80+ employees was operating in a hybrid environment, with a mix of cloud and on-prem infrastructure. The team was making incremental technology changes in an effort t...
capabilities for application lifecycle management

Capabilities for application lifecycle management

Applications support businesses with various day-to-day operations and communication, making them indispensable in the modern workplace. When executed correctly, application management becomes the catalyst...
risk of local administrator privileges in ransomware and malware attacks

Risk of local administrator privileges in ransomware and malware attacks

Introduction Many of the most infamous and devastating data breaches of recent years have shared something in common—poorly secured local administrator privileges.   Local administrator privileges g...
application management best practices with modern management

Application management best practices with modern management

Introduction While applications are indispensable to any modern organisation, managing them at scale can take time, manual effort and money. To such an extent, application management stands as the most expensi...
guide: best practices for efficient patch management

Guide: Best practices for efficient patch management

Introduction Efficient patch management plays a critical role in maintaining the security and integrity of an organisation’s systems and networks. 
a guide to remove admin priviledges

A guide to remove admin priviledges

Misused and unmanaged admin privileges pose a significant risk to your company.   In fact, according to Forrester Research, at least 80 per cent of security breaches involve compromised pri...
key challenges facing education technology

Key challenges facing education technology

Education technology (EdTech) has been rapidly evolving over the past few years, bringing significant changes to the way students learn and teachers teach. From online learning platforms and digital textbooks, ...
devicie inks exclusive deal with managed service provider entag to provide secure modern endpoint management, powered by microsoft intune

Devicie Inks Exclusive Deal with Managed Service Provider Entag to Provide Secure Modern Endpoint Management, Powered by Microsoft Intune

Partnership positions Devicie at the heart of Entag’s Microsoft-first strategy and to drive its Telstra business   Tampa Bay, Fla., Nov. 14, 2024 – Devicie, a leader in optimised Microsoft Int...
devicie joins the microsoft intelligent security association

Devicie Joins the Microsoft Intelligent Security Association

Tampa Bay, Florida, USA — August 5, 2024 — Devicie, a leader in optimized Microsoft Intune deployment and maintenance solutions, today announced it has become a member of the Microsoft Intelligent Secur...
devicie achieves aicpa soc 2 type 2 compliance

Devicie achieves AICPA SOC 2 Type 2 compliance

We’re pleased to announce that Devicie has again officially achieved SOC 2 Type 2 compliance and added SOC 3 this year. This milestone highlights our continuing resolute dedication to safeguarding data security...
devicie partners with lansweeper

Devicie Partners with Lansweeper

New integration simplifies IT management, enhances cybersecurity and ensures compliance for Microsoft Intune deployments. Tampa Bay, FL, ...
devicie now available in microsoft appsource

Devicie Now Available in Microsoft AppSource

Tampa Bay, Florida, USA — June 5, 2024 — Devicie, a leader in optimized Microsoft Intune deployment and maintenance solutions, today announced the availa...
devicie joins microsoft for startups pegasus program and is now available in microsoft azure marketplace

Devicie Joins Microsoft for Startups Pegasus Program and is Now Available in Microsoft Azure Marketplace

Devicie is working with Microsoft to make its hyperautomation and orchestration solutions more robust and easily accessible TAMPA BAY, May 6, 2024 – Devicie, a ...
behind the investment: devicie – intune-native device management & security

Behind the investment: Devicie – Intune-native device management & security

With the proliferation of connected devices, the explosion of best-of-breed B2B applications, and the increasingly dynamic types of working environments (from a public café to y...
sydney school sets the standard for modern management

Sydney school sets the standard for modern management

As schools nationwide grapple with the challenges of resource limitations, skills shortages, device maintenance and security concerns, one independent NSW school saw this as an opportun...
one-on-one with martin mcgregor of devicie

One-on-one with Martin McGregor of Devicie

Originally featured in ARN on 10 June, 2022. Following his father’s footsteps into IT, Martin McGregor decided to branch out into setting up Devicie, focusing on security and de...
martin mcgregor on the auscert share today, save tomorrow podcast

Martin McGregor on the AusCERT Share Today, Save Tomorrow podcast

Introduction  Device co-founder Martin McGregor caught up with Anthony Caruana on the AusCERT Share Today, Save Tomorrow podcast.  They discussed:   U...
sydney cyber start-up devicie lands $14m from us vc giant

Sydney cyber start-up Devicie lands $14m from US VC giant

Devicie, a Sydney-based software start-up that helps companies secure their workers’ laptops, has landed $14 million in series A funding from New York-based private equity and venture capital firm&n...
aussie security isv devicie raises $14 million series a round

Aussie security ISV Devicie raises $14 million Series A round

Sydney-headquartered, end-user security device management software company Devicie has raised $14 million in a series A round. The capital injection was led by New York-based private equity firm ...
get to know martin mcgregor, devicie ceo and co-founder

Get to Know Martin McGregor, Devicie CEO and Co-founder

Martin McGregor, CEO and co-founder of Devicie, answers questions from Intelligent CIO in a get-to-know-you interview. Most memorable achievement What would you describe as your most memorable achiev...
how australian cybersecurity organisations can foster innovation one role at a time

How Australian cybersecurity organisations can foster innovation one role at a time

Introduction There are big benefits for cybersecurity businesses prepared to widen the recruitment net and invest in training promisin...
the challenge of effective device management in a world of remote working

The challenge of effective device management in a world of remote working

Introduction The proliferation of remote devices and the decentralisation of work have given rise to numerous challenges for businesses. One of the most pressing is re...
devicie appoints shane harding as chief executive officer

Devicie Appoints Shane Harding as Chief Executive Officer

Introduction Today we announced the appointment of Shane Harding as Chief Executive Officer of Devicie. Shane joined us seven months ago as Chief Operating Officer. His appointment is part of...
three core privacy mantras for aussie businesses to live by

Three core privacy mantras for Aussie businesses to live by

Introduction There’s a growing body of evidence to suggest consumers are pulling back from sharing data about themselves and their preferences in greater numbers.  In a recent PwC study, half of s...
australian privacy reform gathers momentum with new report

Australian privacy reform gathers momentum with new report

The Australian Attorney-General’s Department has recently published the outcome of its long-awaited review of the Privacy Act 1988. This marks a significant step towards reforming the country’s priv...
devicie selected for microsoft-austrade go global program

Devicie selected for Microsoft-Austrade Go Global program

We’re thrilled to have been selected as one of Microsoft’s SaaS partners with high growth potential to participate in the new Microsoft-Austrade Go Global program. This new initiative will give u...
neurodiverse technophiles: working at devicie

Neurodiverse technophiles: working at Devicie

Originally featured in Balance the Grind. Devicie is a fast-growing technology start-up that automates layered device security and management to ensure ongoing protection and productivity in the moder...
iwd 2023: why it’s time the cyber sector improved its gender ratio

IWD 2023: Why it’s time the cyber sector improved its gender ratio

Introduction What a difference a few years and a few dozen high-profile hacks can make.  Not so long ago, cybersecurity was seen as a decidedly unglamorous subset of the ICT...
why you must secure employee devices

Why you must secure employee devices

Introduction So, you’ve jumped on the hybrid work train and let your employees take their work devices home to use – but have you ensured those devices are safe from cyberattack? Martin McGregor, CEO and co...
why australian organisations should aim higher on privacy

Why Australian organisations should aim higher on privacy

When the Government revised the Privacy Act at the end of last year, additional reforms were flagged. But according to Glyn Geoghegan, Security and Compliance Director at Devicie, there are now many reasons for...
device bags $14m series a for global expansion

Device bags $14m Series A for global expansion

Sydney-based Devicie has raised $14 million in a Series A to expand offshore with its end-user device security management software. The round was led by New York VC giant Insight Partners, suppor...
employee device management is key to essential eight maturity levels

Employee device management is key to Essential Eight maturity levels

The Essential Eight is a set of guidelines to assist government agencies and businesses to bolster cybersecurity defences. In parallel with the evolution of the Essential Eight, there has been an i...
risky.biz podcast with devicie

Risky.Biz podcast with Devicie

Risky.Biz podcast with Devicie In this episode of Risky.Biz, host Patrick Gray chats with Devicie CEO Martin McGregor about why Devicie chose Microsoft Intune as its foundation. Listen to learn why Devici...
health, finance among the hardest hit in 497 australian data breaches in h2 2022

Health, finance among the hardest hit in 497 Australian data breaches in H2 2022

In total, 497 notifiable data breaches were reported between July and December 2022, a 26 per cent increase in the year’s first half. The latest Notifiable data breaches report released today reveals that ...
devicie demo with risky.biz podcast

Devicie demo with Risky.Biz podcast

In this Risky.Biz product demo, Devicie CEO Martin McGregor gives a comprehensive demo of the Devicie platform. Highlights: Provisioning Subscription model Applying controls Devicie c...
devicie on the top five trends to watch in the future of work

Devicie on the top five trends to watch in the future of work

Human-centric technology and experiences: In today’s hyper-connected world, people expect the best from their technology and their devices. They want access to the latest gadgets; they want speed and hi...
10 minute it jams - an update from devicie

10 Minute IT Jams - An update from Devicie

Co-Founder and CEO of Devicie, Martin McGregor talks with TechDay's 10 Minute IT Jams to discuss why the company was created, how Devicie helps their customers, and what's next. In the video, Ma...
what is this essential eight thing i keep hearing about and (why) should i care

What is this Essential Eight thing I keep hearing about and (why) should I care

Introduction One of the most well-known and effective ways to demonstrate security maturity is by aligning with the Essential Eight, a set of Australian government-developed baseline mitigation strateg...
data privacy lessons marketers must take heed of in 2023

Data privacy lessons marketers must take heed of in 2023

CMO Australia speaks to a host of technology and industry thought leaders, including our very own Glyn Geoghegan, to discuss what organisations must do to safeguard data and what technology will help or hind...
No result Found!