Why Enterprises are Thinking Windows 10

Windows 10 has been touted by Microsoft as the most secure operating system ever. Only time will tell whether or not this will hold true. It is certainly a visually pleasing and robust operating system, as is evident by the 27 million downloads that have happened through August 8th. With a lot of Enterprises skipping […]
Are Your Users Following These IT Security Best Practices?

Stop. Think. Connect. Those three words are the basis of a global campaign designed to raise cyber security awareness. If end users follow along, it can go a long way towards making IT’s job of providing a safer, more secure technological environment that much easier. The campaign began in Oct. 2010 and it’s the brainchild […]
Cisco's Midyear Security Report Shines Light on Emerging Threats

The first half of the year saw security pros and cybercrooks locked in a veritable arms race according to Cisco’s 2015 Midyear Security Report. The brand new report explored the latest threats, gave updates on some old favorites of attackers and looked at the ways in which they’re adapting their methods and tools to evade […]
Managers Struggling to Manage Without the Aid of Interoperability

Are you a manager in IT? Do you have a relentless stream of incidents, requests, changes and requests coming in for projects from the business? Can you even see all the work that is coming in from all over the company? Are you struggling with managing all the work because you can’t see it all? […]
Healthcare's Top IT Mobility Risk - And What You Can Do About It

A mobile, untethered workforce is becoming essential in order for extended care facilities to deliver the highest level of care possible to residents. The flexibility and freedom that are hallmarks of IT mobility make it easier to communicate with residents, solve and report problems as they happen and to closely monitor critical health data. Staffers […]
Free IT of Time-Consuming, Resource-Draining Malware False Alarms

IT teams are struggling to spot legitimate malware threats over the white noise generated by false alarms and it’s costing their employers. How much? In terms of the financial cost, the price tag comes out to $1.27 million annually. Switching gears and looking at the human element, IT teams waste an average of 395 combined […]
How to Build Confidence and Secure Buy-In for Office 365 within Your Organization

Microsoft just welcomed a pair of massive – and also very different – organizations into the Office 365 (O365) fold. All told, these deals represent a combined commitment of roughly 400,000 licenses, which will be utilized by end users across the globe. A level of trust is an essential precondition in any IT engagement. However, […]
Microsoft 2015 Worldwide Partner Conference Recap

I have a confession to make. I’m new to consulting. However, I have been working with Microsoft technologies for over 15 years now. From support to architecture to managing IT teams, I’ve seen Microsoft from many different angles. Now that I work for Arraya Solutions, I can experience Microsoft from a new side – as […]
Bringing the Online Shopping Experience to Service Requests

Even though Amazon’s Prime Day deals weren’t all winners, you at least have to admit the company’s user experience remains top notch. Now you can incorporate a similar interface into the day-to-day operations of your company with Service Catalog from ServiceNow. Before you know it, employees will be ordering services from Marketing or HR just […]
Going Beyond Protecting Your Data with Just MDM

It is a fact of our modern life. Mobile devices and ubiquitous access back into our company allows us to work on our own terms. Employees love it, but IT Security hates it. There is a huge inherent risk when we allow our company’s sensitive data to be accessed with a username and password. We […]