|
Blog
|
Page
|
55

VMworld 2015 Recap

Halim Chtourou| September 10, 2015

Sometimes technology evolves gradually, other times it takes dramatic leaps that change the landscape of the industry. Examples of recent revolutionary technology leaps would be the Apple iPhone, VMware ESX, YouTube and Facebook. This year at VMworld I believe I saw several technologies that will be game-changing technology leaps. Project Enzo Having attended a roadmap […]

Read More >

One Must-Have Ingredient for a Simple, Secure UC&C Deployment

Arraya Insights| September 9, 2015

Larger budgets and the need for better teamwork among employees are going to make Unified Communications & Collaboration (UC&C) solutions a hot topic over the course of the next three years. Despite the upsides and the fact that the corporate purse strings have been loosened, there are still obstacles IT will need to overcome before […]

Read More >

Industry-leader paves the way for secure enterprise mobility

Arraya Insights| September 8, 2015

Securing today’s mobile workforce is a tough job and it keeps getting tougher. As more workers push for new BYOD policies, for more mobility and for more choices in terms of the technology they use to do their jobs, it falls on IT to deliver on all of those wants without exposing the company to […]

Read More >

Combating Malware: Advanced Threats Call for an Advanced Solution

Arraya Insights| September 4, 2015

Malware is everywhere. In fact, take the number of malware events from 2014 – roughly 170 million, according to the 2015 Data Breach Investigations Report by Verizon – and divide that by the number of seconds in a year and the result is an average of five malware events per second. Of course, as the study points […]

Read More >

Top 5 Reasons You Should Consider Cisco ASA with FirePOWER

Arraya Insights| September 2, 2015

IT has reported a rising number of cyberattacks over the past twelve months. While threats are on the upswing, IT has also gotten pretty good at repelling those attacks during that same period. That’s certainly good news, however, there’s still work to be done to ensure cybercriminals’ persistence doesn’t start to pay off any time […]

Read More >

Personal email makes for a big business risk

Arraya Insights| September 1, 2015

I’ve been writing a lot on LinkedIn lately about personal email communication. For me, it’s been on the decline and turned into something more functional around my consumer lifecycle. I don’t use it for emailing my friends anymore. Instead, it is just used for bill paying and finding sales for sites I frequent. Something has […]

Read More >

Improve Network Access Control with Cisco’s ISE Portal Builder

Arraya Insights| August 28, 2015

How’s this for a balancing act? A company’s network must be an impenetrable fortress to the wrong people (hackers and cyber crooks) while being easily accessible and user-friendly to the right ones (employees, guests and all of their devices). That’s the security tightrope today’s IT pros must walk. However, there is a solution: Cisco’s Identity […]

Read More >

What is Advanced Threat Analytics?

Arraya Insights| August 27, 2015

In early August, I happened to be working on some Enterprise Mobility Suite collateral and noticed that the price of it went up about a dollar per user per month. What could account for this change? Well, Advanced Threat Analytics had been added to the Enterprise Mobility Suite. Just to recap, EMS is much more than […]

Read More >

End-of-Support Announced for Popular Cisco Security Offering

Arraya Insights| August 26, 2015

Windows Server 2003’s July 14 end of life wasn’t the only deadline IT pros were keeping an eye on this past summer. Also on the radar was July 25, which was when Cisco’s Intrusion Prevention System (IPS) was shipped for the last time. That date was just the latest in a long line of “lasts” […]

Read More >

4 Ways IT Vendors May Be Coming Up Short for Healthcare

Arraya Insights| August 25, 2015

Extended care facilities put a lot of faith in their IT vendors to supply the advanced, secure technologies they need to ensure residents receive a high level of care and service. However, the very same vendors those facilities are counting on could inadvertently be leaving sensitive data – including resident’s protected health information (PHI) – […]

Read More >