• All
  • Articles
  • Case Studies
  • Guides
  • News
making cybersecurity boring again: why simplicity and consistency are key to effective defense

Making Cybersecurity Boring Again: Why Simplicity and Consistency Are Key to Effective Defense

Making Cybersecurity Boring Again I’ve dedicated my career to a single mission: building the world’s best cyber defense solutions for organizations. And it’s been a lot of fun. Starting back in the late nineti...
building successful partnerships with technology vendors: insights from experience

Building Successful Partnerships with Technology Vendors: Insights from Experience

25 Years of Insights: Keys to Successful Tech Partnerships Over the past 25 years, as a second-generation IT professional, I have had the privilege of consulting for and delivering technology solutions to m...
streamlining nist csf v2.0 compliance with devicie and microsoft intune

Streamlining NIST CSF v2.0 Compliance with Devicie and Microsoft Intune

By leveraging Microsoft Intune, Devicie helps accelerate your organization's National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) program. Devicie’s advanced platform simplifie...
devicie: streamlining your essential eight compliance

Devicie: Streamlining Your Essential Eight Compliance

By leveraging Microsoft Intune, Devicie can accelerate and simplify your Essential Eight program. Our advanced platform streamlines delivery and ongoing management of endpoint devices, ensuring seamless comp...
tom plant discusses preparing for windows 10 end of support on risky.biz

Tom Plant discusses preparing for Windows 10 end of support on Risky.Biz

With the end of support deadline for Windows 10 looming, Tom Plant discussed with Risky Business’ Catalin Cimpanu how partners can help their customers ensure they’re ready. Some customers will require hardware...
how windows 10 end of support is accelerating modern device management transformation

How Windows 10 end of support is accelerating modern device management transformation

IT innovation is exploding. Mainstream AI products are becoming more prevalent, and with them come more complex productivity, security and compliance requirements, especially for endpoints. Whilst some organiza...
entering a new era of efficiency with zero touch provisioning

Entering a new era of efficiency with zero touch provisioning  

Using traditional device provisioning methods ties up IT resources for days or weeks, pulling them away from more business-critical tasks and negatively impacting the bottom line.
tom plant discusses windows security policy on risky.biz

Tom Plant discusses Windows security policy on Risky.Biz

Our Technical Product Manager, Tom Plant, caught up with Risky.Biz founder Patrick Gray on the Risky.Biz podcast.   They discussed Microsoft Windows Policy Management an...
devicie co-founder and cto awarded microsoft mvp

Devicie Co-founder and CTO awarded Microsoft MVP

We are delighted to reveal that our co-founder and CTO, Jose Schenardie, has been awarded the title of Microsoft Most Valuable Professional (MVP), recognising his contributions to the tech com...
devicie doubling down on growth by appointing colin britton as chief operating officer

Devicie doubling down on growth by appointing Colin Britton as Chief Operating Officer

TAMPA BAY, Feb. 29, 2024 – Devicie, a leader in hyperautomation and orchestration for Microsoft 365 environments, is excited to announce the appointment of Colin Britton as Chief Operating Officer. In th...
asd cyber threat report key findings

ASD Cyber Threat Report key findings

ASD Cyber Threat Report key findings Developed by the Australian Signals Directorate (ASD), the ASD Cyber Threat Report 2...
predictions on trends and emerging technologies in cyber security

Predictions on trends and emerging technologies in cyber security

Introduction What does the future hold for cybersecurity and cyberspace?  In the past few years, cyber attacks have surged in both volume and attention, with constant phishing and ransomware cam...
expert tips for implementing intune

Expert tips for implementing Intune

Implementing Intune   i mplementing Intune is a significant project. Historically many Intune migrations have come unstuck due to complexity, leaving organisations in a hybrid state, or no better ...
implementing essential eight controls with devicie

Implementing Essential Eight controls with Devicie

With most enterprises now adopting some form of remote work arrangements, the need and demand for robust security to protect employee devices has never been greater.   In the face of rising cyber...
why a breaker became a maker

Why a breaker became a maker

Introduction Cutting to the chase: The breaker   Why does my opinion matter?  Well, to many people it might not.  But, I’ve been hacking stuff for quite a while.  In fact, I...
the role of ux in cyber security

The role of UX in cyber security

Ensuring the security of digital infrastructure and data is a basic responsibility of IT.  But, what about enabling a good end user experience (UX)?  There's a misconception that robust device ...
fostering a culture of empathy and pragmatism for effective patch management

Fostering a culture of empathy and pragmatism for effective patch management

Introduction Patch management is a tough nut to crack.  Even with all the information available out there, patching remains a notoriously challenging IT task that companies of all sizes struggle with.&nb...
challenging mindsets on admin privileges

Challenging mindsets on admin privileges

Introduction According to the International Data Corporation (IDC), 70 per cent of security threats originate from user endpoints. And, according to industry reports 82 per cent of data breaches in 2021 involv...
removing admin privileges without compromising productivity

Removing admin privileges without compromising productivity

How to remove local admin privileges without compromising productivity or employee satisfaction  ...
how to build a strong foundation for privacy protection

How to build a strong foundation for privacy protection

Introduction There is no denying public discussion around data breaches and privacy violations are becoming...
don't start your intune project without considering these factors

Don't start your Intune project without considering these factors

Introduction When it comes to designing an Intune project, there are things to do and there are things to avoid.   There is what good looks like and then there is every...
drawbacks of managing your own soe

Drawbacks of managing your own SOE

Introduction Infrastructure-as-a-service is now a smarter, safer and cheaper way for many organisations to manage their SOE.  Years ago, when I worked in an IT helpdesk role, the boss pointed out ...
a zero trust security model for the modern workplace

A Zero Trust security model for the modern workplace

The pandemic changed the modern workplace with innumerable businesses moving off-premises and adopting a hybrid work culture almost overnight.   And, since the world changed at the end...
security versus productivity: the dilemma

Security versus productivity: The dilemma

It’s time to redefine best-practice security in terms of greater productivity and a better user experience.  Keeping businesses secure is a top priority for CISOs, but best-practice security ...
pros and cons of virtual desktop infrastructure

Pros and Cons of Virtual Desktop Infrastructure

Introduction Improved security, long-term savings and centralised management are all pitched as some of the top reasons to invest in virtual desktop infrastructure (V...
device fleet rebuild and intune configurations delivered in 48 hours

Device fleet rebuild and Intune configurations delivered in 48 hours

Overview A Managed Service Provider (MSP) supported a financial services organization and its parent company to swiftly recover from an incident. The entire device fleet needed to be rebuilt in a weekend to pr...
modernizing device management and provisioning for a trusted financial institution

Modernizing device management and provisioning for a trusted financial institution

Overview A respected lending institution had an immediate need to deploy hundreds of devices. They needed to...
how one australian research university achieved modern management

How one Australian research university achieved modern management

Introduction A well-respected Australian research university with 10,000 students is modernising its device management. 
state library of new south wales accelerates essential eight compliance

State Library of New South Wales accelerates Essential Eight compliance

Introduction The State Library of New South Wales is a large reference and research library open to the pub...
how one school automated device management to bridge a skills gap

How one school automated device management to bridge a skills gap

Introduction The IT team of an independent school in NSW plays a critical role in managing devices for 250 staff and 1,000 students. With staff turnover and growing technology demands, the School f...
modernising a council’s device fleet with automation

Modernising a council’s device fleet with automation

Introduction A local government council with over 700 employees, serving over 150,000 community members set out to achieve modern management. Challenge  Council employees, including tho...
how cloud-managed devices accelerated global expansion

How cloud-managed devices accelerated global expansion

Supporting international expansion Launched in 2015 in Australia, PointsBet cut their teeth as a small online bookmaker before expanding to international markets.  
achieving over $1.2 million roi and full compliance: how a construction giant transformed with devicie

Achieving Over $1.2 Million ROI and Full Compliance: How a Construction Giant Transformed with Devicie

Revolutionizing IT In today’s digital era, even the most robust industries need IT solutions that offer flexibility, security, and cost-efficiency. One construction company recently partnered...
how arrow saved time by automating device management

How Arrow saved time by automating device management

Automating device management  Arrow is one of the largest privately-owned telecommunication and IT service providers in Australia. They offer managed service provider (MSP) services and indust...
isp reaches essential eight maturity on end user devices

ISP reaches Essential Eight maturity on end user devices

Modernise without overspending An ISP with 80+ employees was operating in a hybrid environment, with a mix of cloud and on-prem infrastructure. The team was making incremental technology changes in an effort t...
capabilities for application lifecycle management

Capabilities for application lifecycle management

Applications support businesses with various day-to-day operations and communication, making them indispensable in the modern workplace. When executed correctly, application management becomes the catalyst...
risk of local administrator privileges in ransomware and malware attacks

Risk of local administrator privileges in ransomware and malware attacks

Introduction Many of the most infamous and devastating data breaches of recent years have shared something in common—poorly secured local administrator privileges.   Local administrator privileges g...
application management best practices with modern management

Application management best practices with modern management

Introduction While applications are indispensable to any modern organisation, managing them at scale can take time, manual effort and money. To such an extent, application management stands as the most expensi...
guide: best practices for efficient patch management

Guide: Best practices for efficient patch management

Introduction Efficient patch management plays a critical role in maintaining the security and integrity of an organisation’s systems and networks. 
a guide to remove admin priviledges

A guide to remove admin priviledges

Misused and unmanaged admin privileges pose a significant risk to your company.   In fact, according to Forrester Research, at least 80 per cent of security breaches involve compromised pri...
key challenges facing education technology

Key challenges facing education technology

Education technology (EdTech) has been rapidly evolving over the past few years, bringing significant changes to the way students learn and teachers teach. From online learning platforms and digital textbooks, ...
devicie inks exclusive deal with managed service provider entag to provide secure modern endpoint management, powered by microsoft intune

Devicie Inks Exclusive Deal with Managed Service Provider Entag to Provide Secure Modern Endpoint Management, Powered by Microsoft Intune

Partnership positions Devicie at the heart of Entag’s Microsoft-first strategy and to drive its Telstra business   Tampa Bay, Fla., Nov. 14, 2024 – Devicie, a leader in optimised Microsoft Int...
devicie joins the microsoft intelligent security association

Devicie Joins the Microsoft Intelligent Security Association

Tampa Bay, Florida, USA — August 5, 2024 — Devicie, a leader in optimized Microsoft Intune deployment and maintenance solutions, today announced it has become a member of the Microsoft Intelligent Secur...
devicie achieves aicpa soc 2 type 2 compliance

Devicie achieves AICPA SOC 2 Type 2 compliance

We’re pleased to announce that Devicie has again officially achieved SOC 2 Type 2 compliance and added SOC 3 this year. This milestone highlights our continuing resolute dedication to safeguarding data security...
devicie partners with lansweeper

Devicie Partners with Lansweeper

New integration simplifies IT management, enhances cybersecurity and ensures compliance for Microsoft Intune deployments. Tampa Bay, FL, ...
devicie now available in microsoft appsource

Devicie Now Available in Microsoft AppSource

Tampa Bay, Florida, USA — June 5, 2024 — Devicie, a leader in optimized Microsoft Intune deployment and maintenance solutions, today announced the availa...
devicie joins microsoft for startups pegasus program and is now available in microsoft azure marketplace

Devicie Joins Microsoft for Startups Pegasus Program and is Now Available in Microsoft Azure Marketplace

Devicie is working with Microsoft to make its hyperautomation and orchestration solutions more robust and easily accessible TAMPA BAY, May 6, 2024 – Devicie, a ...
behind the investment: devicie – intune-native device management & security

Behind the investment: Devicie – Intune-native device management & security

With the proliferation of connected devices, the explosion of best-of-breed B2B applications, and the increasingly dynamic types of working environments (from a public café to y...
sydney school sets the standard for modern management

Sydney school sets the standard for modern management

As schools nationwide grapple with the challenges of resource limitations, skills shortages, device maintenance and security concerns, one independent NSW school saw this as an opportun...
devicie appoints shane harding as chief executive officer

Devicie Appoints Shane Harding as Chief Executive Officer

Introduction Today we announced the appointment of Shane Harding as Chief Executive Officer of Devicie. Shane joined us seven months ago as Chief Operating Officer. His appointment is part of...
device bags $14m series a for global expansion

Device bags $14m Series A for global expansion

Sydney-based Devicie has raised $14 million in a Series A to expand offshore with its end-user device security management software. The round was led by New York VC giant Insight Partners, suppor...
No result Found!