- All
- Articles
- Case Studies
- Guides
- News

Making Cybersecurity Boring Again: Why Simplicity and Consistency Are Key to Effective Defense
Making Cybersecurity Boring Again
I’ve dedicated my career to a single mission: building the world’s best cyber defense solutions for organizations. And it’s been a lot of fun. Starting back in the late nineti...

Building Successful Partnerships with Technology Vendors: Insights from Experience
25 Years of Insights: Keys to Successful Tech Partnerships
Over the past 25 years, as a second-generation IT professional, I have had the privilege of consulting for and delivering technology solutions to m...

Streamlining NIST CSF v2.0 Compliance with Devicie and Microsoft Intune
By leveraging Microsoft Intune, Devicie helps accelerate your organization's National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) program. Devicie’s advanced platform simplifie...

Devicie: Streamlining Your Essential Eight Compliance
By leveraging Microsoft Intune, Devicie can accelerate and simplify your Essential Eight program. Our advanced platform streamlines delivery and ongoing management of endpoint devices, ensuring seamless comp...

Tom Plant discusses preparing for Windows 10 end of support on Risky.Biz
With the end of support deadline for Windows 10 looming, Tom Plant discussed with Risky Business’ Catalin Cimpanu how partners can help their customers ensure they’re ready. Some customers will require hardware...

How Windows 10 end of support is accelerating modern device management transformation
IT innovation is exploding. Mainstream AI products are becoming more prevalent, and with them come more complex productivity, security and compliance requirements, especially for endpoints. Whilst some organiza...

Entering a new era of efficiency with zero touch provisioning
Using traditional device provisioning methods ties up IT resources for days or weeks, pulling them away from more business-critical tasks and negatively impacting the bottom line.

Tom Plant discusses Windows security policy on Risky.Biz
Our Technical Product Manager, Tom Plant, caught up with Risky.Biz founder Patrick Gray on the Risky.Biz podcast.
They discussed Microsoft Windows Policy Management an...

Devicie Co-founder and CTO awarded Microsoft MVP
We are delighted to reveal that our co-founder and CTO, Jose Schenardie, has been awarded the title of Microsoft Most Valuable Professional (MVP), recognising his contributions to the tech com...

Devicie doubling down on growth by appointing Colin Britton as Chief Operating Officer
TAMPA BAY, Feb. 29, 2024 – Devicie, a leader in hyperautomation and orchestration for Microsoft 365 environments, is excited to announce the appointment of Colin Britton as Chief Operating Officer. In th...

ASD Cyber Threat Report key findings
ASD Cyber Threat Report key findings
Developed by the Australian Signals Directorate (ASD), the ASD Cyber Threat Report 2...

Predictions on trends and emerging technologies in cyber security
Introduction
What does the future hold for cybersecurity and cyberspace?
In the past few years, cyber attacks have surged in both volume and attention, with constant phishing and ransomware cam...

Expert tips for implementing Intune
Implementing Intune
i
mplementing Intune is a significant project. Historically many Intune migrations have come unstuck due to complexity, leaving organisations in a hybrid state, or no better ...

Implementing Essential Eight controls with Devicie
With most enterprises now adopting some form of remote work arrangements, the need and demand for robust security to protect employee devices has never been greater.
In the face of rising cyber...

Why a breaker became a maker
Introduction
Cutting to the chase: The breaker
Why does my opinion matter?
Well, to many people it might not.
But, I’ve been hacking stuff for quite a while.
In fact, I...

The role of UX in cyber security
Ensuring the security of digital infrastructure and data is a basic responsibility of IT.
But, what about enabling a good end user experience (UX)?
There's a misconception that robust device ...

Fostering a culture of empathy and pragmatism for effective patch management
Introduction
Patch management is a tough nut to crack.
Even with all the information available out there, patching remains a notoriously challenging IT task that companies of all sizes struggle with.&nb...

Challenging mindsets on admin privileges
Introduction
According to the International Data Corporation (IDC), 70 per cent of security threats originate from user endpoints. And, according to industry reports 82 per cent of data breaches in 2021 involv...

Removing admin privileges without compromising productivity
How to remove local admin privileges without compromising productivity or employee satisfaction
...

How to build a strong foundation for privacy protection
Introduction
There is no denying public discussion around data breaches and privacy violations are becoming...

Don't start your Intune project without considering these factors
Introduction
When it comes to designing an Intune project, there are things to do and there are things to avoid.
There is what good looks like and then there is every...

Drawbacks of managing your own SOE
Introduction
Infrastructure-as-a-service is now a smarter, safer and cheaper way for many organisations to manage their SOE.
Years ago, when I worked in an IT helpdesk role, the boss pointed out ...

A Zero Trust security model for the modern workplace
The pandemic changed the modern workplace with innumerable businesses moving off-premises and adopting a hybrid work culture almost overnight.
And, since the world changed at the end...

Security versus productivity: The dilemma
It’s time to redefine best-practice security in terms of greater productivity and a better user experience.
Keeping businesses secure is a top priority for CISOs, but best-practice security ...

Pros and Cons of Virtual Desktop Infrastructure
Introduction
Improved security, long-term savings and centralised management are all pitched as some of the top reasons to invest in virtual desktop infrastructure (V...

Device fleet rebuild and Intune configurations delivered in 48 hours
Overview
A Managed Service Provider (MSP) supported a financial services organization and its parent company to swiftly recover from an incident. The entire device fleet needed to be rebuilt in a weekend to pr...

Modernizing device management and provisioning for a trusted financial institution
Overview
A respected lending institution had an immediate need to deploy hundreds of devices. They needed to...

How one Australian research university achieved modern management
Introduction
A well-respected Australian research university with 10,000 students is modernising its device management.

State Library of New South Wales accelerates Essential Eight compliance
Introduction
The State Library of New South Wales is a large reference and research library open to the pub...

How one school automated device management to bridge a skills gap
Introduction
The IT team of an independent school in NSW plays a critical role in managing devices for 250 staff and 1,000 students. With staff turnover and growing technology demands, the School f...

Modernising a council’s device fleet with automation
Introduction
A local government council with over 700 employees, serving over 150,000 community members set out to achieve modern management.
Challenge
Council employees, including tho...

How cloud-managed devices accelerated global expansion
Supporting international expansion
Launched in 2015 in Australia, PointsBet cut their teeth as a small online bookmaker before expanding to international markets.

Achieving Over $1.2 Million ROI and Full Compliance: How a Construction Giant Transformed with Devicie
Revolutionizing IT
In today’s digital era, even the most robust industries need IT solutions that offer flexibility, security, and cost-efficiency. One construction company recently partnered...

How Arrow saved time by automating device management
Automating device management
Arrow is one of the largest privately-owned telecommunication and IT service providers in Australia. They offer managed service provider (MSP) services and indust...

ISP reaches Essential Eight maturity on end user devices
Modernise without overspending
An ISP with 80+ employees was operating in a hybrid environment, with a mix of cloud and on-prem infrastructure. The team was making incremental technology changes in an effort t...

Capabilities for application lifecycle management
Applications support businesses with various day-to-day operations and communication, making them indispensable in the modern workplace.
When executed correctly, application management becomes the catalyst...

Risk of local administrator privileges in ransomware and malware attacks
Introduction
Many of the most infamous and devastating data breaches of recent years have shared something in common—poorly secured local administrator privileges.
Local administrator privileges g...

Application management best practices with modern management
Introduction
While applications are indispensable to any modern organisation, managing them at scale can take time, manual effort and money. To such an extent, application management stands as the most expensi...

Guide: Best practices for efficient patch management
Introduction
Efficient patch management plays a critical role in maintaining the security and integrity of an organisation’s systems and networks.

A guide to remove admin priviledges
Misused and unmanaged admin privileges pose a significant risk to your company.
In fact, according to Forrester Research, at least 80 per cent of security breaches involve compromised pri...

Key challenges facing education technology
Education technology (EdTech) has been rapidly evolving over the past few years, bringing significant changes to the way students learn and teachers teach. From online learning platforms and digital textbooks, ...

Devicie Inks Exclusive Deal with Managed Service Provider Entag to Provide Secure Modern Endpoint Management, Powered by Microsoft Intune
Partnership positions Devicie at the heart of Entag’s Microsoft-first strategy and to drive its Telstra business
Tampa Bay, Fla., Nov. 14, 2024 – Devicie, a leader in optimised Microsoft Int...

Devicie Joins the Microsoft Intelligent Security Association
Tampa Bay, Florida, USA — August 5, 2024 — Devicie, a leader in optimized Microsoft Intune deployment and maintenance solutions, today announced it has become a member of the Microsoft Intelligent Secur...

Devicie achieves AICPA SOC 2 Type 2 compliance
We’re pleased to announce that Devicie has again officially achieved SOC 2 Type 2 compliance and added SOC 3 this year. This milestone highlights our continuing resolute dedication to safeguarding data security...

Devicie Partners with Lansweeper
New integration simplifies IT management, enhances cybersecurity and ensures compliance for Microsoft Intune deployments.
Tampa Bay, FL, ...

Devicie Now Available in Microsoft AppSource
Tampa Bay, Florida, USA — June 5, 2024 — Devicie, a leader in optimized Microsoft Intune deployment and maintenance solutions, today announced the availa...

Devicie Joins Microsoft for Startups Pegasus Program and is Now Available in Microsoft Azure Marketplace
Devicie is working with Microsoft to make its hyperautomation and orchestration solutions more robust and easily accessible
TAMPA BAY, May 6, 2024 – Devicie, a ...

Behind the investment: Devicie – Intune-native device management & security
With the proliferation of connected devices, the explosion of best-of-breed B2B applications, and the increasingly dynamic types of working environments (from a public café to y...

Sydney school sets the standard for modern management
As schools nationwide grapple with the challenges of resource limitations, skills shortages, device maintenance and security concerns, one independent NSW school saw this as an opportun...

Devicie Appoints Shane Harding as Chief Executive Officer
Introduction
Today we announced the appointment of Shane Harding as Chief Executive Officer of Devicie. Shane joined us seven months ago as Chief Operating Officer. His appointment is part of...

Device bags $14m Series A for global expansion
Sydney-based Devicie has raised $14 million in a Series A to expand offshore with its end-user device security management software.
The round was led by New York VC giant Insight Partners, suppor...
No result Found!