• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint
      • Network
      • Cloud
      • Application
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Arraya Insights

October 28, 2021 by Arraya Insights

Pre-pandemic, working from home was considered an extra perk for employees. Now, as a large portion of the workforce continues to work from home throughout the pandemic, this “perk” has become more of an expectation. 

In addition, a record number of Americans are quitting their jobs, which has been dubbed the “great resignation.” It’s now more important than ever that employees can virtually collaborate in a manner that’s convenient, productive, and meaningful. 

Based on these changes in the workforce, it’s no surprise that more companies are adopting Microsoft Teams than ever before. Microsoft reported that Teams hit 250 million monthly users this past summer.  

Microsoft Teams is built on Microsoft 365 and offers a workspace for real-time collaboration and communication. This includes meetings, team channels, file or app sharing, messaging, calls, and more.  

Whether you’re looking into collaboration tools for the first time or upgrading to Teams from Skype for Business, we’ve broken down the process of Teams adoption so you’ll know what to expect.  

The Three Phases of Teams Adoption 

When companies are in the initial stages of adopting Microsoft Teams, it’s first important to consider their individual needs. With so many companies operating remotely or on a hybrid schedule, remote collaboration has made Teams a hot item (including here at Arraya).  

Here are a few questions we ask to get an idea of our individual clients’ needs: 

  • What are the primary ways they plan to use Teams? 
  • What’s their appetite for Teams? 
  • Do they have prior experience with Teams? 
  • What is working in their current collaborative construct? What isn’t working? 
  • What are they looking to achieve through adopting Teams? 

Answering these questions allows us to better understand the existing collaborative construct and how Teams should be tailored and rolled out in a manner that ensures a successful adoption process.  

Most users are looking to streamline and optimize communication throughout their organization. For employees who are heavy email users, their overcrowded inboxes may not be as productive as they could be. Or it might be time for multiple platforms to be consolidated. Overall, Teams can simplify your workflows.  

The process of adopting Teams is broken down into three sections: 

  1. Start 

Several people need to be included in this conversation. Microsoft recommends that this team include an executive sponsor, success owner, program manager, IT specialists, and champions at a minimum.   

It’s also important to include employees to represent different areas of the workforce. There’s a variety of use cases for Teams and no company, department, or single user will engage with Teams in the same manner. Conferring with a variety of employees in different roles will allow us to develop individual use cases to ensure Teams will benefit the many roles that support your business.  

When adopting Teams, we recommend tackling what is known to your organization first. This could be messaging, sharing files, or scheduling meetings.  

  1. Experiment 

We begin with a group of pilot users to start operating through Teams on 2-3 real projects, but with certain parameters. This allows users to become familiar with Teams while providing meaningful feedback. Once these users are comfortable with the technical aspects of Teams, they’re given full access without restriction.  

  1. Scale 

Using the information gathered throughout the experimental phase, we’ll enable Teams for your entire organization. This will include defining your success measures, strategy, a training program, an awareness campaign, and preparation of adoption reviews. 

From here, we can extend to full automation. This can include enabling Tasks by Planner to help users with the organization of deliverables or projects, or integrating third-party applications to be viewed within Teams, making Teams the default workspace application. For example, we could integrate Salesforce or Power Platform so they’re automatically queued up within Teams.  

Once Teams has been rolled out, you should review four categories of outcomes to monitor your employees’ experience: 

  • Organizational: This includes the overall cultural transformation, employee retention, social engagement, and operational agility.  
  • Cultural: This includes employee sentiment, recommendations, and feedback, along with innovation measures.  
  • Tangible: This includes customer experience impacts, costs savings, revenue generation, data security, and process simplification.  
  • Individual: This includes use of desired tools and overall employee morale, productivity, and engagement.  

The Team Admin Center offers great resources to help your organization monitor how the adoption is faring. Here you can review the number of conversations being held throughout your Teams platform, how many meetings are scheduled, and more.  

Next Steps: Bring Your Organization Together with Teams 

Whether your organization is a small local business or a multi-national enterprise, Teams makes collaboration easier than ever.  

For more information on the Teams integration process, check out our Expert Q&A video with Arraya’s Senior Director of Presales Solutions, Chuck Kiessling, and Practice Manager of Workspace, Javier Barron.  

To get started on your Teams integration journey, reach out to an Arraya expert today.  

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.     

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.     

Follow us to stay up to date on our industry insights and unique IT learning opportunities.     

   

October 22, 2021 by Arraya Insights

Businesses and enterprises sent their workforce home nearly two years ago. The remote workforce appears to be here to stay and businesses often turn to Azure Virtual Desktop (formally known as Windows Virtual Desktop) to allow their employees to safely work from home.  

AVD provides businesses with remote capabilities by giving employees access to their Windows desktops from anywhere, all while providing security and the opportunity to scale quickly.  

Now, Arraya has partnered with Nerdio to further enhance our clients’ AVD experience and make managing your AVD environment even easier.  

What is Nerdio? 

Nerdio is a deployment, management, and optimization platform for Managed Service Providers (MSPs) using Azure Virtual Desktop and Windows 365. Nerdio provides MSPs with the ability to quickly deliver successful Microsoft Azure cloud services.  

All you need to get started with Nerdio is: 

  1. An Azure subscription 
  1. An Office 365 account 
  1. General IT knowledge 

Nerdio’s Main Features & Benefits 

Nerdio enhances the deployment process and management experience of Azure, all while cutting costs considerably.  

Here’s what users can expect: 

  1. Quick & Easy Deployment 

With Nerdio, businesses can automatically deploy a complete Azure environment within just a few hours without any Powershell scripting. This can be done on top of existing environments, without the need to make any changes. 

Anyone with general IT knowledge can complete the one-hour customer deployment. There’s no need to involve an experienced engineer for best-practice configuration.  

  1. Cost Savings 

Nerdio simplifies Azure pricing and provides users with the opportunity to save up to 75% with per-user Azure cost reporting. This estimates Azure compute and storage costs before deploying a WVD host pool and VMs directly on the hold pool creation page.  

With advanced auto-scaling and unified image management, users can optimize their investment and save money.  

With Nerdio’s Cost Estimater, users can fill out a short questionnaire to receive an easy-wizard driven estimate. This determines the total cost of Azure infrastructure and software licensing for your individual business or enterprise. This includes Microsoft 365 licensing, add-on licenses (like SQL server), bandwidth, VPN, and other related recurring and upfront costs.  

The cost estimator has the capability to detect intended usage patterns and recommend the number of Reserved Instances (RIs) to maximize Azure compute savings.  

  1. Streamlined & User-Friendly Management 

Users can take advantage of three-click management. This enables your Help Desk to manage all aspects of AVD or Windows 365 with a powerful and user-friendly portal.  

With Nerdio, businesses can manage several features from one central, single pane of glass platform, including:  

  • Alerts and notifications: Receive email alerts and regular notifications of events so you can take any necessary action immediately.  
  • Desktops, servers, backup, and networking: Users can create and manage WVD desktops, host pools, and server VMs. You can back up desktop images, sessions hosts, and server VMs in addition to managing networking, firewall rules, VPN, and nNet peering.  
  • RBAC with end-user portal: Role-based access controls allow different admin teams access to the Nerdio Manager console for “least privilege” administration on a defined scope. Desktop users can be granted access to Nerdio Manager to control their own pooled desktop sessions.  
  • Performance and utilization monitoring: With Nerdio, users can collect data from WVD service and inside of each VM every minute. Data is collected in Azure Log Analytics and can be retained for a customizable time period. Actionable dashboards will show all users, hosts, and application utilization/performance.  
  • MSIX AppAttach: Automatically create MSIX AppAttach VHDX packages from MSIX installer files. This includes the ability to link Azure Files shares and automatically upload MSIX packages to assign them to users. You can also add MSIX AppAttach applications to host pools and deliver applications to users without the need to install them on the image.  
  • Users and sessions: Nerdio provides the ability to view all users in a Workspace who are currently active or disconnected and shadow/remotely control user sessions to provide secure support.  
  • Image creation and management: Users can create images from Azure marketplace, shared image gallery, existing session host VM, or create custom images. They can both automatically update and package images on a schedule and schedule automated image deployments to host pools on a recurring basis (without any admin intervention).  
  • 3-click complete UI: You can now manage all aspects of the WVD environment from a single user interface with an easy-to-use UX. Most activities can be completed in three clicks or less.  
  1. AVD Optimized 

Nerdio is all about making your technology work harder for you. With Nerdio, you can leverage auto-scale visualization to understand user behavior and the impact on costs. This allows users to better match infrastructure size in comparison to user demand.  

With the auto-heal feature, users can detect “broken” session hosts and quickly repair them. Further, the auto-scale feature automatically matches the size of infrastructure to real-time user demand with algorithms. This combination of features can result in up to 75% in savings.  

Next Steps: Make the Most of Your AVD Environment with Nerdio 

Nerdio customers come from a wide range of deployment scenarios, including: 

  • Greenfield (no Azure footprint) 
  • Landing zone only (existing AD or AADDs)  
  • Existing IAAS environment (existing Azure environment)  
  • Existing AVD (existing AVD deployment) 

Deployment can take anywhere from 10 minutes or up to only one hour, depending on the customers’ existing environment.  

Nerdio allows businesses to manage all aspects of AVD. It’s customizable features and single, user-friendly portal make it easier than ever to control your environment.  

Contact an Arraya expert today to learn more about how we can enhance your entire AVD experience through our partnership with Nerdio.  

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.  

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.   

Follow us to stay up to date on our industry insights and unique IT learning opportunities.  

October 19, 2021 by Arraya Insights

Technology continues to infiltrate our lives in new ways. With every advancement in technology, new cyber threats follow. While many of these advancements impact our lives for the better, they also open another door for a potential cyber vulnerability.  

As we move into the end of the year, there are high hopes for better times ahead. But as one pandemic subsides, another could be lurking. The World Economic Forum warns that a cyber pandemic could spread faster and further than any biological pandemic.  

If there’s anything we’ve learned after the past two years, it’s to be prepared and expect the unexpected.  

Cyber security means constant vigilance against cyber threats. Many businesses and enterprises are falling behind in their security posture. While passwords have long been the industry standard to securing accounts, networks, and devices, in today’s climate they’re no longer enough to prevent a bad actor from gaining unauthorized access.  

Multi-factor authentication has now become the industry standard. This offers more security, better control, and helps companies meet regulatory requirements.  

What is Multi-Factor Authentication? 

Multi-factor authentication is a security enhancement that requires users present two forms of credentials to access their network, account, or device. The two layers of credentials are often comprised of, 1) a password and, 2) a PIN, code, or fingerprint.  

Why Has MFA Become So Important? 

Microsoft reported that this one extra step can prevent 99.9% of attacks against your account.  

Here’s why MFA has become a necessity today: 

1) Passwords Alone Are Not Secure 

Microsoft recently announced that they’re disabling Basic Authentication for all users. This practice is now an outdated industry standard and can pose a significant security risk for those still using it.  

MFA adds a second layer of protection, making it twice as hard for cyber hackers to get through.  

2) The Workforce Remains Remote 

The pandemic forced hundreds of thousands of workers to shift from on-site networks to remote work. This surge left businesses grappling to provide remote access for their employees without compromising security.  

This quick transition pushed many businesses and enterprises to adopt MFA as a security measure. This led to a significant increase in spending on MFA and it’s anticipated that the global MFA market could reach $40 billion by 2030. Many employees continue to work from home today and it’s anticipated that remote work will carry on long after the pandemic.  

3) Cyber Attacks Are More Frequent & Severe 

Both 2020 and 2021 have shown that cyber security has become an enormous risk to our livelihood. Attacks on healthcare, critical infrastructure, and government agencies made it clear that our battle against cyber attacks is only just beginning.  

President Biden recently signed an executive order to bring focus to our need to improve the nation’s cyber security. 

Ransomware has posed a significant threat, in particular. These cyber attacks are occurring more frequently, becoming smarter, and the demands are increasing. The first recommendation in the executive order was to implement MFA immediately.  

4) It’s a Requirement for Cyber Insurance 

The cyber insurance market is at a complicated crossroads. The demand for cyber insurance is high and it’s clear businesses and enterprises are more aware than ever of their potential risk. However, the damages associated with these attacks are rising and carriers are facing higher claims payouts. This is making it very difficult for these companies to profit. 

In an attempt to control their risk, cyber carriers are requiring that potential policy holders implement MFA. Those seeking cyber insurance should be prepared for MFA to be a basic requirement.  

Many of us are already familiar with some form of MFA in our everyday lives. You may have to provide a separate code before logging into your bank account or you use both a password and a fingerprint to access your company laptop.  

Implementing MFA has quickly become the industry standard, and for good reason. Those who continue using usernames and passwords alone should immediately reconsider.  

Next Steps: Implement MFA Today to Secure Your Data & Information 

It’s time to stop avoiding it. There’s no question that MFA is one of the most important steps you can take to secure your information. Without it, you’re a sitting duck for bad actors.  

Implementing MFA is often a simpler undertaking than many expect. 

If you’re still operating without MFA, contact an Arraya expert to add this to your security posture today. Whether through Azure AD MFA or Cisco’s Duo, we have the service capability to get MFA turned on and running to keep you secure. 

Reach out to an Arraya expert today to start a conversation.  

 Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.     

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.     

Follow us to stay up to date on our industry insights and unique IT learning opportunities.     

   

October 14, 2021 by Arraya Insights

Last week’s VMworld 2021 kicked off virtually for the second year in a row.  

Channel partners, IT professionals, industry leaders, and more logged in remotely to hear about VMware’s latest updates, strategies, products, and plans for the future.  

In case you missed it, Arraya’s Data Center team compiled the announcements that should be on your radar: 

Dell Technologies Apex Cloud Service with VMware Cloud 

It’s expected that organizations will continue to shift towards cloud modernization and application modernization. Microsoft reported that it expects 500 million apps will be built in the next 5 years, which is more than all the apps built in the last 40 years. Those on this transformation journey will now have another option for their infrastructure as a service needs. 

VMware and Dell Technologies have partnered to offer Apex Cloud Services with VMware Cloud. This new infrastructure as a service offering will allow organizations to deploy pre-configured cloud instances in their data center, or at an edge location or co-location facility.  

This service will provide better performance, more security, and more predictable pricing and costs.  

The solution is in private preview now and is planned to be made available at the end of 2022.  

Cross-Cloud Services 

VMware CEO, Raghu Raghuram advised that “it’s no longer about a ‘cloud first’ approach—it’s about being ‘cloud smart’… We give every organization the power to accelerate their innovation and control their own destiny in the multi-cloud era.” 

These new Cross-Cloud Services will offer three key advantages: 

  • An accelerated journey to the cloud 
  • Cost efficiency 
  • Flexibility and control across any cloud 

These services will allow the customer to pick and choose the services needed on the desired cloud to meet evolving business demands.  

These are comprised of five building blocks: 

  • A state-of-the-art platform for building and deploying cloud-native apps 
  • Cloud infrastructure for operating and running enterprise apps 
  • Cloud management for monitoring and managing the performance and cost of apps across different clouds 
  • Security and networking that spans across entire multi-cloud operations to connect and better secure all apps 
  • A digital workspace to empower the distributed workforce along with edge solutions to deploy and manage edge-native apps. 

This multi-cloud approach will allow organizations to be more agile and resilient.  

VMware Horizon 

During VMworld 2021, the future of VMware Horizon was revealed. Currently, VMware Horizon is split into two platforms. One is for environments running on vSphere (Horizon 8) and the second is for environments running natively on Microsoft Azure (Horizon Cloud on Microsoft Azure).  

The next generation of VMware Horizon will be a single platform for all Horizon environments, either on VMware SDDC or running natively in the cloud.  

This next-gen architecture means that much like VMware’s other cloud SaaS solutions, like vRealize Cloud and VMC, they host and maintain the management components. This frees up customer resources and time for things like upgrades and patching, all while running the actual Horizon end-user workloads anywhere the customer chooses. This includes both on-prem or in a cloud environment. 

vSphere 7.0 Update 3 

vSphere 7 Update 3 was announced at VMworld and is already generally available. It was reported that this latest update “continues to enhance the industry’s leading virtualization and workload platform to add more value for customers in these key areas.”  

This will offer a number of new capabilities, including: 

  • Enhanced Virtual Machine (SM) Service 
  • Simplified set up for VMware vSphere with VMware Tanzu 
  • Enhanced support for persistent memory  
  • Added support for NVMe over TCP 
  • New vCenter Server plug-in for NSX 

This latest version will further help customers deliver both AI and developer-ready infrastructure, scale without compromise, and simplify operations. 

VMware Cloud Disaster Recovery 

A strong protection plan includes both preventative and recovery measures. Delivered as a SaaS solution, VMware Cloud Disaster Recovery will now provide file- and folder-level recovery for customers to extract specific files or folders from VMs without powering up those VMs. This allows users to quickly extract recent, uncorrupted files and data. With VMware Cloud DR’s planned file-level recovery, users can find the right files and the best versions to restore without spending hours going through each individual file.  

In addition, VMware Cloud DR will provide an integrated, simpler way to backup and restore VMware Cloud on AWS VMs that don’t require full DR capabilities.  

Next Steps: Accelerate Your Digital Transformation with the Latest from VMware 

VMware continues to rethink technology to allow businesses to stay agile, without sacrificing security.  

While we’re excited about the announcements included in this blog, there are numerous additional updates not included here that could make a significant impact for your business. 

To learn more about the latest releases from VMware, contact an Arraya expert today to start a conversation.  

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.     

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.     

Follow us to stay up to date on our industry insights and unique IT learning opportunities.    

October 13, 2021 by Arraya Insights

Transitioning to hybrid cloud has numerous benefits, including data protection, reliability, optimized workflows and resources, and scalability. However, the transition to hybrid cloud can feel overwhelming. With the right solutions, it doesn’t have to be. 

VMware Cloud Foundation provides the “simplest path to hybrid cloud through an integrated software platform that is the foundation for both private and public cloud environments. Cloud Foundation provides a complete set of software-defined services for compute, storage, network, and security, along with cloud management capabilities.”  

While we’ve been familiar with VMware Cloud Foundation 4.2 since March 2021, the latest release is now here. 

VMware Cloud Foundation 4.3 was released at the end of August 2021 and we’ve put together a list to highlight the most important updates, so you’ll know what to expect. 

1. Enhanced Workload Domain Deployment and Lifecycle Management 

VCF 4.3 supports large scale VM and container architectures with robust pre-checks for vLCM for faster time to value.  

2. Integration with vSphere 7.0 U2 

This includes VM Service support, AVI load balancer, security enhancements through a native key provider, and confidential containers. In addition, prechecks will proactively identify issues that may affect upgrade operations. This will enable concurrent upgrades for NSX-T Data Center components and provide/upgrade Workload Management.  

Users can add up to 10 vSphere clusters to a workload domain in parallel, improving performance and speed. 

VMware ESXI 7.0 Update 2 was just released with several new features, including: 

  • Enhanced debugging with VMware vSphere Virtual Volumes statistics:

You can now track performance statistics for vSphere Virtual Volumes to quickly identify issues, such as latency in third-party VASA provider responses.  

  • NVIDIA Ampere architecture support:  

This adds support for the NVIDIA Ampere architecture that enables you to perform high end AI/ML training and ML inference workloads by using the accelerated capacity of the A100 GPU.  

  • Performance improvements for AMD Zen CPUs: 

Out-of-the-box optimizations can increase AMD Zen CPU performance by up to 30% in various benchmarks, taking full advantage of the AMD NUMA architecture to make the most appropriate placement decisions for virtual machines and containers.  

  • Confidential vSphere Pods on a Supervisor Cluster in vSphere with Tanzu: 

You can now run confidential vSphere Pods, keeping guest memory encrypted and protected against access from the hypervisor. You can also configure confidential vSphere Pods by adding Secure Encrypted Virtualization-Encrypted State (SEV-ES).  

  • vSphere Lifecycle Manager fast upgrades:  

You can now significantly reduce upgrade time, system downtime, and minimize system boot time by suspending virtual machines to memory and using the Quick Books functionality.  

3. Integration with vSAN 7.0 U2 

This provides enhancements to the vSAN Data Persistence Platform for improved cloud native storage. It also affords persistent services support to the vSAN file system. 

4. Enhanced Multi-Cloud Management 

VMware Cloud Foundation 4.3 supports vRealize Suite 8.4, including the ability to automate deployment of vRSLCM and provide a more complete cloud management experience. 

vRealize Suite Lifecycle Manager can be used to deploy vRealize Automation, vRealize Operations Manager, vRealize Log Insight, and WorkSpace ONE Access. This delivers and manages infrastructure and applications to increase business agility while maintaining IT control.  

5. Networking Automation 

The new 4.3 version provides faster expansion and better scaling of NSX Edge Clusters with enhanced guidance for federated multi-site networking deployments. This provides flexibility in Application Virtual Networks (AVN), as the NSX Edge Cluster and NSX network segments are implemented as a Day-N operation in SDDC Manager.  

6. Enhanced Security Operations  

New, stronger security mechanisms improve the management and administration of security settings within VMware Cloud Foundation and add new support for FIPS 140-2 within SDDC Manager.  

With VMware Advanced Security for Cloud Foundation, users can expect world-class protection, intrusion detection/prevention, advanced load balancing, and web application firewall for public and private clouds. This includes VMware Carbon Black technology, NSX Distributed IDS/IPS, and VMware NSX Advanced Load Balancer with WAF capabilities.  

Next Steps: Increase Your Hybrid Cloud Capabilities with VCF 4.3  

With VMware Cloud Foundation 4.3, businesses can expect a simple, secure, and agile cloud infrastructure that can be deployed on premises and consumed as a service from the public cloud.  

To learn more about VMware Cloud Foundation, contact an Arraya expert today to start a conversation or answer any questions you may have.  

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.  

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.   

Follow us to stay up to date on our industry insights and unique IT learning opportunities.  

October 12, 2021 by Arraya Insights

Microsoft has announced that they’ll be turning off Basic Authentication permanently, as of October 1, 2022. This will be turned off for all protocols in all tenants for Exchange Online. Your Exchange account hosts your work emails, contacts, and calendar.  

Basic authentication (also known as proxy authentication) requires only a username and a password for client access requests. The username and password are often stored locally on the device.  

While this authentication model was previously the industry standard, it’s now outdated and can pose a significant security risk for those still using it. Attackers can easily steal these credentials when connections are not secured. 

Many users who transitioned from on premises to the cloud have continued to use basic authentication. Microsoft is removing this as an option, so all users are forced to use modern authentication, a more secure method.  

Users should begin transitioning to modern authentication if they haven’t already done so.  

What is Modern Authentication? 

Modern authentication is a more secure method of identity management.  

Modern authentication is an umbrella term for a combination of authentication and authorization methods between a client (for example, your laptop or your phone) and a server, as well as some security measures that rely on access policies that you may already be familiar with. 

This includes: 

  • Authentication methods: Multi-factor authentication (MFA); smart card authentication; client certificate-based authentication 
  • Authorization methods: Microsoft’s implementation of Open Authorization (OAuth) 
  • Conditional access policies: Mobile Application Management (MAM) and Azure Active Directory (Azure AD) Conditional Access 

Microsoft is disabling basic authorization to protect the millions of Microsoft Exchange online users. Requiring MFA significantly improves the security of data in your tenant.  

Before You Block Basic Authentication, Complete the Following Steps:   

  • Verify that modern authentication is enabled in your Exchange Online organization (it’s enabled by default) 
  • Verify that your email clients and apps support modern authentication and verify that your Outlook desktop clients are running the minimum required cumulative updates 
  • Connect to Exchange Online PowerShell 

Disabling Basic Authentication in Exchange Online 

You can block Basic Authentication in Exchange online by creating and assigning authentication policies to individual users. You’ll need to create and assign auth policies to individual users to disable Basic Authorization in Exchange Online.  

Here’s how: 

  1. Create the authentication policy 

Note that you can’t change the name of the policy after you create it.  

  1. Assign the authentication policy to users 

This can be done through individual user accounts, through filtering user accounts by attributes, using a list of specific user accounts, or by filtering on-premises Active Directory user accounts that are synchronized to Exchange Online.  

  1. Wait 24 hours for the policy to be applied to users, or force the policy to be immediately applied 

By default, the changes take effect within 24 hours, but by using the following syntax, you can force the policy to take effect within 30 minutes: 

Set-User -Identity <UserIdentity> -STSRefreshTokensValidFrom $([System.DateTime]::UtcNow) 

Next Steps: Begin the Transition from Basic to Modern Authorization 

Active Directory Federation Services (ADFS) will be affected through this transition. Those still using ADFS will need to migrate to Azure authentication. If you’re still using ADFS, we can help you with the process of migrating to Azure Active Directory (AD).  

The longer you rely on basic authorization, the more you’re putting your business at risk. Contact an Arraya expert today to begin the transition to modern authentication.  

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.     

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.     

Follow us to stay up to date on our industry insights and unique IT learning opportunities.     

   

October 6, 2021 by Arraya Insights

On this episode of the Arraya Insights Vodcast, our panel welcomes special guests, Tim Chase, Field CTO, and Alain Lubin, Channel Sales Engineer, from Lacework. The discussion covers a wide range of topics including threat detection and response, M&A security challenges, and Lacework’s unique approach to cloud security. Hosted by Chuck Kiessling, Senior Director, Presales Solutions, this episode’s panel also includes Scott Brion (Director, Cyber Security) and Mike Piekarski (Enterprise Security Architect).

Prefer an audio format? Subscribe to our Arraya Insights Radio feed in your Apple or Android podcast catcher for an audio-only version of our vodcast. Or, you can use the player below.

https://soundcloud.com/user-166960433-952960141/arraya-insights-vodcast-a-proactive-approach-to-cloud-security-getting-to-know-lacework?si=93cc3a562426449eb5e3afdab13d1504

October 5, 2021 by Arraya Insights

Cyber Security Awareness Month was launched in 2004 by the National Cyber Security Alliance and the U.S. Department of Homeland Security (DHS). Since then, this topic has become even more important as cyber-attacks continue to surge in recent years. A combination of our growing reliance on technology, the worldwide pandemic, and lucrative ransom demands are contributing to this increase.  

Continued education and awareness are key in identifying and preventing cyber attacks. Throughout this month, CISA and the NCSA are offering a number of resources to help organizations and individuals focus on and improve their cyber security.  

To magnify the focus on cyber security throughout October, we’ve put together a list of the most common “security fails” that can lead to cyber exposure.  

Is your business or enterprise guilty of any of these? 

1. Weak Passwords 

Cyber hackers can guess thousands of password combinations in a matter of seconds. Users should implement these password best practices immediately to make it as difficult as possible for unauthorized individuals to gain access.  

  • Use a different password for each account: Every digital account should have its own unique password, so one compromised account won’t lead to more.  
  • Create strong passwords: A complicated password is a strong password. All passwords should contain a combination of upper- and lower-case letters, symbols, and numbers. The longer the password, the better.  
  • Don’t base passwords on personal information: Our digital footprint is extensive. Hackers can gather personal information on users from a variety of sources to help them crack passwords.  

2. Improper WIFI Use 

Businesses should establish two separate networks to separate employees and the public. Passwords should be updated regularly with any changes in employees.  

Are your firewalls activated? These aren’t always turned on automatically and encryption should be used, whenever available. Many routers implement a generic network name during set up. This should be changed to avoid giving away the make and model of your router to the public.  

While private WIFI is much more secure, there are times when public WIFI is all that’s available. However, all public WIFI, such as a coffee shop, hotel, or airport, should be verified with appropriate staff before connecting. Try to avoid sensitive activities, such as online shopping or exchanging private information, while on public WIFI. When necessary, your personal cellular hotspot is usually a better alternative.  

3. Lack of Fraud Vigilance 

Despite technology’s advancements, many successful cyber attacks rely on simple fraud techniques that bank on human error.  

Social engineering occurs when “an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.” Hackers will present themselves as a credible party, business, or enterprise in order to trick their victims into giving away credentials that they can use to gain unauthorized access to accounts, networks, and more.  

There are several forms of social engineering: 

  • Phishing: These attacks solicit private information through emails 
  • Vishing: These attacks leverage voice communications, such as phone calls or voicemails 
  • Smishing: These attacks exploit SMS, or text messages 

It’s important that users remain vigilant in identifying these attacks. When properly identified, they can be discarded or ignored. A short moment of inattention can result in clicking on an infected link or giving information to the wrong party. 

Here’s what to look for in identifying these attacks: 

  • Poor grammar and spelling errors 
  • Generic greetings, such as “Dear customer,” rather than addressing you by name 
  • Suspicious email addresses, links, and attachments (hover your cursor over these before clicking or replying) 
  • Aggressive messages that incite emotion, such as warnings that a bill is overdue, or an account is going to be cancelled 

It’s best to do some research if you’re ever suspicious. Don’t reply to the contact information provided by the sender. Instead, contact the company or individual through publicly available contact information to verify whether the correspondence is legitimate before taking further action. 

4. Ignored Hardware & Software Vulnerabilities 

While these software update notifications can be pesky, they’re important. These constant patches close potential access points for hackers and ensure your business is equipped with the most current security available.  

For hardware, vulnerabilities can stem from several issues including reaching the end of its life, lack of regular maintenance, and more.  

Both software and hardware should be consistently updated, properly cared for, and replaced when appropriate. This basic, regular maintenance goes a long way.  

5. Poor Cloud Security Parameters  

A large portion of asset management within the cloud is identifying what data requires maximum security and what doesn’t. Data classification is an important step of transitioning to the cloud to allocate your security resources properly.  

In the cloud, data should be protected with a multilayer approach that includes encryption to ensure that an intruder will not be able to read your sensitive information, should they gain access. 

It’s up to the user to manage employee access and permissions for the cloud. Businesses should both limit cloud access to only the necessary parties and adopt a zero trust model, which requires continuous verification of all who have access.  

6. Failure to Implement MFA  

Multi-factor authentication (MFA), also called two-factor authentication, is a simple, but effective security measure. This requires that all users supply a second set of credentials (in addition to their password) prior to accessing a network, account, etc. This second layer of security can make it significantly more difficult for hackers to gain access to unauthorized accounts.  

Many businesses fail to implement MFA as they’re not sure where to start or they worry about the cost. However, this security enhancement has become a necessary expense to avoid the financial consequences of a data breach.  

7. Inadequate Cyber Security Training  

Businesses should seek to create an ongoing culture of security awareness within their organizations. Cyber attacks present a unique challenge due to their constant evolution. While a cyber security training session may have been comprehensive at the time, three months later it’s outdated.  

Despite robust security resources, employees are often the weakest link in the cyber security chain. Employers must encourage constant vigilance against cyber threats by investing in regular training sessions, leading by example through management, and making it a known priority.  

8. Vulnerable Physical Security 

Most cyber attacks are conducted remotely, with bad actors often operating from across the globe. However, it’s important to consider the physical safety of your hardware as well.  

Here are a few steps to secure the physical safety of your technology, office, and data: 

  • Restrict access to your hardware, such as routers, servers, and more  
  • Require access ID badges for employees to limit those with physical access 
  • Consistently review access privileges and promptly revoke employee access when appropriate 
  • Secure all private physical information, such as printed memos, notes, and reports 
  • Never write down your username, password, or other identifying information  

Next Steps: Do Your Part & Review Your Cyber Security Posture Today! #BeCyberSmart 

Cyber security is an ongoing battle as our reliance on technology continues to grow.  

While this presents many challenges, these small steps can make an enormous impact in your organization’s ability to protect itself from hackers.  

With proactive implementation of these security techniques and an ongoing focus on cyber security, your team can significantly reduce your risk.  

To learn more about enhancing your cyber security, contact an Arraya expert today.  

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.  

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.   

Follow us to stay up to date on our industry insights and unique IT learning opportunities.  

October 1, 2021 by Arraya Insights

Chuck Kiessling, Arraya’s Senior Director, Presales Solutions, and Javier Barron, Practice Manager, Workspace, discuss Microsoft Teams adoption, including planning, optimizing user experience, and best practices for a successful rollout.

September 29, 2021 by Arraya Insights

Many aspects of life feel unpredictable these days. However, what we can predict is that a hybrid and remote workforce is here to stay. Organizations are adopting a cloud-first strategy to take advantage of the flexibility and scalability that cloud computing has to offer.  

Cisco reported that 92% of enterprises have already adopted a multi-cloud strategy. However, dedicated MPLS circuits are no longer enough to ensure security and a reliable connection. This will ultimately affect user experience. With flexible work schedules and employees working in various locations, users now expect access to applications whenever and wherever they are.  

Previously, your environment could rely on traditional WAN (wide area network). This connected users at the branch or campus with applications hosted on servers in the data center. Now that so many businesses and enterprises are transitioning to the cloud, IT teams are realizing that they’re facing some issues: 

  1. A poor user experience due to complexity and lack of control 
  1. An expanded attack surface due to a multi-cloud environment  

WANs were designed for a different era and are not capable of handling the extensive traffic that the cloud brings. This leaves businesses and enterprises at risk.  

Enter SD-WAN, a software defined approach that manages WAN. This tech creates an enhanced experience for both customers and employees.  

What Does SD-WAN Do? 

SD-WAN stands for software-defined wide area network. This networking technology uses a virtualized network overlay to connect and remotely manage branch offices. This allows businesses and enterprises to protect their assets while allowing employees, partners, contractors, and vendors to access applications securely. SD-WAN takes your traditional WAN transports (internet) and runs a dynamic VPN overlay over them.  

SD-WAN allows users to extend their visibility into the internet, cloud, and SaaS applications and is the foundation for SASE-enabled architecture. 

The Top 3 Benefits of SD-WAN 

With SD-WAN, you’re not restrained by the traditional methods of routing as this tech has dynamic capabilities. Users can manage connectivity across their WAN from one single dashboard, while enjoying both flexibility and scalability.  

There are several useful benefits that SD-WAN provides, including: 

  • Increased Simplicity, Intelligence, & Visibility  

SD-WAN simplifies network management, no matter the number of branch locations or the distance. With a single WAN networking solution, SD-WAN can read the tunnel and latency on traffic and provide real time statistics so users can identify issues quickly, with real-time alerts. Further, SD-WAN can automatically re-route traffic as needed with a feature that you simply turn on.  

By extending visibility into the cloud, internet, and applications, businesses can obtain and take advantage of real-time data insights. 

This transportation independence improves application performance and increases agility. Here, predictability and consistency are a very good thing.  

  • Reduced Costs 

With SD-WAN, you can rely on broadband links. These are more economical then costly MPLS links as you’re simply forming tunnels over transport. This gives you the option to get rid of your traditional legacy WAN links or reutilize them.  

SD-WAN offers transport independence which increases efficiency, optimizes user experience, and reduces costs overall.   

  • Enhanced Cloud Security 

The pandemic has forced networks to provide access to various authorized users anywhere and anytime, all while maintaining security. Connecting multiple clouds over the internet leads to greater exposure to cyber threats.  

SD-WAN offers a full security stack built in to safely connect users on any application, whether on-premises or in the cloud.   

Next Steps: How to Find the Right SD-WAN Solutions 

To learn more, check out our Expert Q&A: Exploring SD-WAN. Chuck Kiessling (Senior Director, Presales Solutions) and Kyle Dillon (Senior Network Solutions Architect), answer the most common questions about SD-WAN and what licensing and purchasing options are available.  

For additional guidance on how to determine which SD-WAN solution is right for your business, our Arraya expert networking team can explain solution capabilities and answer any questions you may have. Reach out today to start a conversation.  

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.    

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.    

Follow us to stay up to date on our industry insights and unique IT learning opportunities.    

  

Primary Sidebar

Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}