• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint
      • Network
      • Cloud
      • Application
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Arraya Insights

December 14, 2020 by Arraya Insights

Ransomware Attacks Spike Against Healthcare Facilities: How to Keep Yours Safe

Already bracing for a potentially long winter due to spiking COVID-19 cases, those in the healthcare industry could soon be forced to fight a battle on a different front. Last month, a trio of government agencies warned of “an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” This comes as multiple institutions have already reported falling victim to what one expert described as “the most significant cybersecurity threat we’ve ever seen in the United States.”

At the end of October – which is coincidentally Cyber Security Awareness Month – the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) – issued Alert AA20-302A “Ransomware Activity Targeting the Healthcare and Public Sector.” This alert warned of an ongoing campaign leveraging malware-boosting platforms like TrickBot and BazarLoader as well as ransomware strands like Ryuk for profit, data theft, and service disruption. Included within the alert were technical deep dives into the malicious technologies at play as well as indicators of compromise.  

Reporting by NBC News suggests more than 60 separate healthcare ransomware infections so far this year in the US, up from 50 in 2019. And those are just the incidents that have been made public. Given the usual lag that exists between the onset of an incident and its disclosure, it’s likely that number is far higher. So far, those attacks have forced doctors and nurses to resort to paper and pen record-keeping and even necessitated the re-routing of ambulances. While far from ideal, these complications also don’t fit the bill of a true worst-case scenario. Germany experienced exactly that kind of tragic outcome earlier this year when a ransomware attack left a hospital’s systems offline, resulting in the death of a person seeking emergency care.

Ransomware best practices for IT and users

Even under the best of circumstances, an attack on a healthcare facility could leave lives hanging in the balance. Now, as providers fight to beat back the steadily rising tide of COVID-19 cases nationwide, it’s clear why an expert dubbed one of the groups allegedly behind these campaigns as “one of most brazen, heartless and disruptive threat actors I’ve observed over my career.” While it may seem like a tremendous task given the scarcity of resources and mental bandwidth within most facilities right now, it is possible to stay digitally safe during these incredibly trying times.

Here’s how IT admins and end users can both help stop ransomware, informed by the government’s AA20-302A alert and our team’s own in-the-field experiences.

IT admins should:

  • apply patches throughout their technology environment, preferably as soon as they’re released from manufacturers. If IT is continually underwater with patch releases, look into shifting that responsibility over to a managed services provider.  
  • practice proper password hygiene for admin accounts, including choosing unique, complex passwords and activating multifactor authentication where available.
  • scan the network for open ports, taking care to disable any that remain open but are going unused. Still-active ports should be closely monitored to vet the authenticity of traffic.
  • partner with users to identify critical digital assets, including patient data and telehealth/work infrastructure and create the necessary redundancies to keep those assets available even in a worst case scenario. This should include performing regular backups, apply air-gapping between production and backup files, and securing with password/encryption.     
  • audit all account access privileges, particularly those granted admin rights, with an eye toward reducing access to the lowest level necessary for the account to still function.
  • implement network segmentation, to keep valuable data points separate from each other and to make it harder for attackers to move freely throughout an environment should they gain an initial foothold. 
  • deploy intelligent automation where possible to speed up malware detection and mitigation efforts, also minimizing the error risk often associated with manual processes.
  • never agree to pay a ransom and do whatever is necessary to avoid ending up in a situation where that seems to be the best, or only, option. Paying a ransom encourages future attacks and doesn’t guarantee access to data will be restored (See: Last year’s NotPetya attacks).

As for users, they should:

  • know how to spot red flags indicating a phishing email, a frequent first step in ransomware campaigns, including:
    • unexpected requests for sensitive or high-value information (ex., credentials, financial details, etc.).
    • persistent typos or awkward phrasing. No one is immune to the occasional typo. However, emails that would wear out spelling and grammar checks might indicate the person on the other end isn’t who they claim to be.
    • email addresses that, at first glance, appear legitimate but upon closer inspection are shown to only be close approximations of an authentic account (ex., replacing an uppercase I with a lower case L).
    • links that, when hovered over, are revealed to direct the recipient to somewhere other than where the text of the message claims.  
  • feel empowered to confirm requests for credentials or financial information with leadership using alternate channels (IM, phone, etc.) rather than by responding directly via a potentially compromised email thread.
  • participate in regular training to better understand the methods cyber criminals will use to try to compromise them.
  • understand where to turn if they feel a message they received might be malicious.
  • feel comfortable reporting any interactions with a potentially malicious message or link right away, giving IT valuable time to react.

Next Steps: Living out your ransomware worst case scenario (sort of)

The most basic thing every organization needs to have in order to survive a ransomware attack is a plan. Every level and department needs to understand that, if something goes wrong, they should respond by doing X,Y and Z. This plan should lay out in detail how technical teams, organizational leadership, those on the operational side, PR teams, etc. should respond. However, having a plan isn’t enough. Every potential tripping point or question should be smoothed over and answered before that plan is put into practice.

Need a hand building out or stress-testing your incident response plan? The Arraya Cyber Team (ACT) can help. Our experts can work with you to build out and then step through a fictional disaster scenario. Such exercises are completely customizable and can cover everything from attempts to repel attacks to what would happen should hackers actually get inside your network. This latter point may be uncomfortable to think about, but is too important to overlook. Reach out to ACT to learn more about our Tabletop Incident Response Workshops or to schedule yours now!

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now. 

Comment on this and all of our posts on: LinkedIn, Twitter, and Facebook. 

Follow us to stay up to date on our industry insights and unique IT learning opportunities. 

December 9, 2020 by Arraya Insights

End of Support Looms for Adobe Flash: Is Your IT Environment Ready?

December 31, 2020 won’t just mark the end of what has been a trying year (to put it mildly), it’s also the day support will run out for a utility that was once a cornerstone of the internet. On that date, Adobe Flash will stop receiving updates and security patches. It’s an event that has been a long time coming – Adobe announced the end of support date back in July 2017 – although security conscious admins have likely been waiting a lot longer to say goodbye to the often-troubled Flash. Before they can finally close the book on Flash (and on 2020), there are some thing admins will need to consider first.

Despite it being something of a persistent security red flag, industry leaders, and the customers they serve, have found themselves struggling to quit Flash. The utility has remained a cog in a variety of solutions, found throughout the IT environments of organizations in all industries. This is something that, as of January 1, 2021, will need to change as Flash hits new levels of problematic.

Here’s how Flash end of support will impact solutions from a pair of the industry’s biggest providers and the steps admins should take to mitigate the fallout. 

VMware

Several popular legacy VMware offerings still leverage Flash, although each has a clear path forward for admins seeking to avoid leaning too heavily on unsupported software.

  • vSphere: Many vSphere iterations up to 6.7 shipped with support for a Flash-based management client built-in to the solution. However, 6.7 also brought feature parity between the Flash-based client and a new, HTML5-based management tool. VMware’s recommended approach is to migrate to the newest version of 6.7 (which is Update 3) prior to support running out for Flash. Organizations are then encouraged to embrace using the HTML5 client to run their vSphere environment. A few other points worth noting in regard to vSphere and Flash:
    • Addressing the Flash issue doesn’t require upgrading ESXi hosts to 6.7
    • Before moving to the most recent version of vSphere or to the HTML5 client, it’s important to audit an environment to fully understand the effect doing so could have throughout a technology footprint.     
  • Horizon: Earlier versions of Horizon (7.8 and under) included an Administrator utility based on Flash. An HTML5 alternative, dubbed Horizon Console, was first released with 7.8, later reaching feature complete status in 7.11. Admins are encouraged to upgrade to a more modern version of Horizon to avoid complications when Flash reaches end of support. 
  • Cloud Director: Versions of Cloud Director older than 10.0 featured Flash-based Provider and Tenant portals that were turned on by default. The 10.0 release reversed this and disabled these features by default in favor of HTML5 alternatives. Subsequent releases, including 10.1, have substantially built-out the HTML5 tools. VMware recommends upgrading to Cloud Director 10.1 or higher to take full advantage of the solution’s HTML5 capabilities.
  • There’s also a grab bag of other solutions in need of modernizing:
    • NSX for vSphere
      • Impacted versions: 6.4 and below
      • Suggested upgrade path: version 6.4.8
    • Site Recovery Manager
      • Impacted versions: 6.5 and below
      • Suggested upgrade path: version 8.1
    • vSAN
      • Impacted versions: 6.5 and below
      • Suggested upgrade path: version 6.7 Update 3
    • vRealize Orchestrator
      • Impacted versions: 7.5 and below
      • Suggested upgrade path: version 7.6
    • vRealize Operations
      • Impacted versions: 6.5 and below
      • Suggested upgrade path: version 6.6

Microsoft

Want to (mostly) get Flash out of Windows and don’t want to wait until December? Microsoft has a solution. Last month, the company released update KB4577586 which, when installed, will remove Adobe Flash from all versions of Windows 10 and Windows Server. And it goes a step further by preventing Flash from ever being reinstalled on said device. What’s more, this update can’t be undone. If for whatever reason Flash needs to be put back on a device post update, that device will need to either be reset to an earlier restore point or Windows 10 will need to be reinstalled from scratch.  

KB4577586 is a seriously powerful update, however, even it won’t fully close the book on Flash. Researchers found that KB4577586 only removed the version of Flash bundled in Windows 10 and managed through Control Panel. Flash components built into browsers like Microsoft Edge won’t be touched, although those are often disabled by default these days, reducing the risk they pose. Additionally, the update won’t affect standalone and manually-installed versions of Flash.

Microsoft plans a more complete eradication of Flash once the utility officially reaches its end of support date. In the meantime, the KB4577586 update can be installed from the Microsoft Catalog.

Next Steps: Preparing your technology environment for life after Flash

Adobe Flash was once a cornerstone technology, but it’s been a long time since it held the trust of those in the know. As such, this move by Adobe to cut support for Flash feels more like a formality than anything else. However, organizations will still want to make sure their environment is ready to seamlessly transition to a post-Flash world when the ball drops this New Year’s Eve.

Need help ensuring a smooth changeover? Arraya is here to help. We can help you modernize the core components of your data center to leave behind legacy, high-risk solutions like Flash. Reach out to our team today to get the conversation started.

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.

Comment on this and all of our posts on: LinkedIn, Twitter, and Facebook.

Follow us to stay up to date on our industry insights and unique IT learning opportunities.

December 7, 2020 by Arraya Insights

Arraya Inside Sales Engineer Matt Rush reviews some of the changes that have come to the Meraki platform and Meraki licensing recently. One of the revisions Matt spotlights involves the MX Security Appliance and its applicable licensing.

November 25, 2020 by Arraya Insights

To put it bluntly, no one enjoys password resets. For IT, they mean time away from more pressing tasks. The same is true for end users left locked out of their workdays, while they wait for the help desk to step in. It’s a time drain for both sides, but it’s one that can be easily prevented through the miracle of self-service password resets.

Microsoft 365 includes a self-service password reset feature that can get users back to work quickly without pulling IT resources away from higher value deliverable. As an admin, here’s how you can activate this feature for your users:

  • From the admin portal, select Settings, then Org Settings
  • Select the Security & Privacy tab located near the top of the Org Settings page
  • Click on Self-service Password Reset
  • From this menu, choose Go to the Azure portal to turn on self-service password reset
  • From the navigation pane on the left side of the screen, select Users
  • Select Password reset on the Users | All users page
  • While on the Properties page, select All to give everyone across the organization the ability to perform self-service password resets
  • Click Save

Just like that, users will have the ability to reset their own expired or simply forgotten passwords by themselves. Having that ability and actually doing it are two separate things. After all, not all users will be comfortable addressing their own password problems. At least not right away. Here’s a step-by-step guide on how to change a password within Microsoft 365 that can help them feel more at ease.

  • Sign in to your Microsoft 365 account (Note: You can do this by visiting office.com/signin)
  • Click on the gear icon in the upper right hand corner of the screen. This will open the Settings sidebar
  • From the Settings sidebar, click on the Password option to launch the Change Password screen
  • Enter your current password into the Old password field
  • Type a new password into the Create new password field (Note: Your organization’s password complexity requirements will be highlight at the top of the page. These will need to be followed in order for the new password to be accepted. A drop down will appear under the Create new password field to let you know when your new password has met the complexity requirements)
  • Enter that new password a second time into the Confirm new password field
  • Click Submit  

That’s it! It’s a simple enough process that can be accomplished so much faster than the old process of “File a support ticket” and “Wait.”

Next Steps: Get more tips for working in (and managing) M365 and beyond

Want more tips and best practices on how to get the most out of your technology footprint, including but not limited to the Microsoft 365 platform? Arraya can help. Reach out to our team today for more advice and insights on building and managing a high-performing, secure IT environment.   

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.

Comment on this and all of our posts on: LinkedIn, Twitter, and Facebook.

Follow us to stay up to date on our industry insights and unique IT learning opportunities.

November 19, 2020 by Arraya Insights

Cisco and Microsoft Bring Microsoft Teams to Your Webex Room

Are you a Cisco shop or a Microsoft shop? When it comes to collaboration, many organizations – Arraya included – reside somewhere in the middle. The appeal of a diversified, multi-vendor collaboration footprint isn’t lost on Cisco and Microsoft. Even though they are competitors at heart, the tech giants have a history of making their solutions play nicely together in order to help keep their customers connected and productive. That partnership was on full display earlier this year, although it may have gone overlooked due to coronavirus-necessitated lockdowns.

Late last year, Cisco and Microsoft pledged to move toward a new era of interoperability between their Webex and Teams solutions. Specifically, that idea would materialize in a couple of different forms. The companies planned to release a Microsoft Cloud Video Interop (CVI) certified solution that would allow Cisco Webex Room and SIP video conferencing devices to join Microsoft Teams meetings. Additionally, they also proposed creating a direct guest join pathway connecting their respective video conferencing devices with their meeting web apps. This pledge of greater interoperability has started coming to fruition with the release of a pair of solutions: the aforementioned CVI offering and another option called WebRTC.

Let’s take a closer look at these offerings and what they could mean for organizations pursuing reopening their facilities.

Microsoft CVI

First up is the Cloud Video Gateway (CVI-enabled) option. Those looking to connect to a Microsoft Teams meeting hosted internally, by their own company could do so using this pathway. It delivers a Cisco Webex-based experience to those making the connection, including multi-screen capabilities, flexible layouts, and wired/wireless bi-directional content sharing. In terms of devices supported, this route is travelable by all Cisco and SIP-capable video devices, registered either on premises or in the cloud. Users can connect via this path through one-button-to-push (OBTP) join which includes calendar service, direct dial-in complete with an interactive voice response (IVR) experience. Lastly, it is worth noting that this service will require additional licensing to make it operable.

WebRTC  

Then, there’s the WebRTC application. This allows users to connect to any other type of Microsoft Teams meeting. Connecting via this method delivers a Microsoft Teams-oriented meeting experience, including a single-screen Teams layout with only the ability to be on the receiving end of shares. This pathway is accessible from Cisco Room Kits, Room series, Boards, and Desk Pro devices. These devices can be cloud connected. Once again, this method offers OBTP join with calendar service. Webex Room registration, which is part of Flex licensing, is required. As of right now, WebRTC is one way only as Microsoft Teams doesn’t support any browsers compatible with the tool. User can, however, add the Webex bot to their Teams client, which, in turn, will enable them to access a Webex Meeting. 

Next Steps: Put the joint power of Microsoft and Cisco together for you

Hopefully, we’ll all be able to dust off our Cisco Room devices sooner rather than later and start putting these new abilities to work. In the meantime, if you’d like to learn more about how your organization can benefit from the above advances or from Cisco and Microsoft’s ongoing partnership in general, our collaboration experts can help. Reach out any time to get the conversation started.

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.

Comment on this and all of our posts on: LinkedIn, Twitter, and Facebook.

Follow us to stay up to date on our industry insights and unique IT learning opportunities.

November 16, 2020 by Arraya Insights

SASE: What Is It and What Can It Do For You?

All Posts

Coined by Gartner in the summer of 2019, SASE – short for Secure Access Service Edge and pronounced “sassy” – has become one of IT’s favorite buzzwords. Sure, it’s fun to say, but the appeal of SASE is far greater. SASE technology has real potential as a solution to a set of pain points that have been exacerbated since the term’s early days, particularly over the last several months.  

Workforces were already trending toward greater distribution in recent years. Then, the COVID-19 pandemic struck and that trend became an imperative. However, workforces were never unique in that regard. The tools and the data sets that those modern workers use every day have followed suit, finding new homes beyond traditional on premises data centers. It’s this hybrid environment, spanning public and private clouds as well as onsite servers – and the challenges it creates – where SASE seemed able to make a considerable difference.    

Here’s the thing: As is often the case with buzzwords, a growth in popularity can obscure a term’s true meaning – and value. SASE has been no different in this regard, with organizations hoping to tweak the term to fit their own product portfolio. So, we reached out to our networking team to nail down what defines a legitimate SASE solution and its benefits.  

SASE: What is it? 

Since SASE can trace its origins back to Gartner, let’s start there. Gartner defines SASE as a combination of “comprehensive network security functions” able to support the “dynamic secure access needs of digital enterprises.” Those necessary security functions include: 

  • a secure web gateway (SWG) to stave off web-based threats and keep Internet-connected devices aligned with company policies by filtering unwanted or dangerous web traffic. SWGs should include, at the very least, URL filtering, malicious code detection/filtering, application control capabilities.  
  • a cloud access security broker (CASB) standing between cloud users and their cloud service providers. These utilities can be either cloud-based or locally-hosted and serve as a central hub for cloud security policy enforcement. A CASB can enforce policies ranging from encryption to authentication to malware detection and prevention (among others).  
  • Firewall as a Servce (FWaaS) eliminates the need for a physical firewall appliance, hosting the capabilities instead in the cloud and offering them as a service. This allows the entirety of an organization’s network and sites to be collected and protected behind a global firewall solution. 
  • Zero Trust Network Access (ZTNA) replaces traditional approaches to network access requiring organizations to grant widespread, blanket access to employees or corporate partners for the purposes of collaboration. Instead, ZTNA builds a perimeter around applications or data sets and grants access only to approved identities, devices, etc.  

Those features work in conjunction with advanced SD-WAN functionality, such as dynamic path selection, to create the SASE user experience. 

What can SASE do for me?    

Now that we’ve covered what SASE is, let’s look at what it can do. It should be no surprise given its popularity as a buzzword that the upsides of SASE are plentiful. Organizations that adopt SASE have experienced benefits that include the following:  

  • Reduction in security cost and complexity. SASE unites secure access into a single portal, cutting the number of solutions an organization must deploy and, potentially, the number of vendors it works with. This consolidation should drive down environmental complexity and spend in both the near and the long term.     
  • Modern collaboration enablement. Organizations can take a more advanced approach to working with those outside their metaphorical four walls – think contractors or vendors. Instead of leaning on solutions like a VPN, outside traffic can route into an organization via secure, dependable SASE solutions.  
  • Performance boosts. Staying connected with co-workers in this moment is done mostly via solutions like video or VoIP. These capabilities have put a massive strain on network bandwidth. It’s in these scenarios where the SD-WAN capabilities of SASE shine. SASE solutions can intelligently adjust network traffic to ensure an optimal user experience, replicating the feeling of working shoulder-to-shoulder with co-workers or contacts no matter the actual distance. 
  • Streamlined network and security management. As the cloud often does, SASE shifts workloads off IT’s already-full plate. Adapting to new threats or deploying new policies are no longer manual-intensive processes. Instead, updates can be pushed out across an organization from a single source. Additionally, no new hardware or infrastructure will needed to support evolving security and capacity efforts.     
  • Greater security. These other benefits are great, but let’s face it, if you’re investing in “Secure Access Service Edge” technology, you’re doing so because you want better security. SASE can deliver this in multiple ways. It amplifies and enforces security policies. It can identify and restrict possible threats before they become an issue. It also fundamentally shifts and hardens the way access is handled, redefining it based on user identity, device type, etc.     

Next Steps: Bypass the buzz – is SASE right for you?  

The business implications for SASE in a world where many employees remain tethered to their home offices are seemingly vast. Leaders in the networking and security spaces have taken notice. 

Earlier this fall, Cisco was named a leader in the space in a Gartner Magic Quadrant study on the topic. More recently, VMware jumped into the conversation by releasing a SASE solution of its own at this year’s all-virtual VMworld. Interest in these solutions on the client side is also on the rise. Gartner has projected that by 2024, at least 40% of enterprises will have developed their own SASE strategies. That figure stood at less than 1% back during the closing days of 2018.  

Interested in going beyond the hype and discussing what makes SASE tick? Our networking team can help you determine whether or not SASE makes sense for the present or future of your organization. Reach out to them today to start a dialogue!   

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now. 

Comment on this and all of our posts on: LinkedIn, Twitter, and Facebook. 

Follow us to stay up to date on our industry insights and unique IT learning opportunities. 

November 9, 2020 by Arraya Insights

Cisco released its third version of Identity Services Engine (ISE) back in September. If you are not familiar with Cisco ISE, it is an industry leading Network Access Control (NAC) system that provides security policy management and access to your network infrastructure. Cisco ISE enables you to gather real-time contextual information from the users and devices that connect to your network. Having this information allows you to create granular proactive policies regarding how and when users and devices connect to your network and what parts of the network they have access to. In other words, it gives network administrators visibility of who, what, where, when and how users and devices connect to the network and allows them to create network access policies based on those attributes.

Feature changes or updates with Cisco ISE 3.0 

There are too many updates to list, but here are few to highlight in detail and few more to just call out:

The ISE dashboard has gotten a makeover

  • It looks similar to Cisco’s Digital Network Architecture Center (DNAC) dashboard
  • A new search bar has been added to look up features
  • Most features have moved to the hamburger menu
  • The help menu has moved. You can type in a feature and it will provide all related documentation
  • There is a new Make a Wish feature button which enables you to make requests to add new features

The licensing structure for ISE 3.0 is changing from ISE 2.0

  • ISE 2.0 used Base, Plus and Apex licenses. 3.0 is transiting to Essentials, Advantage and Premier license
  • ISE 3.0 is 100% term based licensing. The bottom tier license, Essentials, is NOT perpetual
  • There are some changes when it comes supported features per license tier.  So when migrating from 2.0 to 3.0, you need to make sure you have comparative features
  • ISE 2.0 used a consumption model where licenses were consumed in a Lego model. This meant as you consumed a feature, you consumed the licenses tied to that feature. For example, if a user used AAA to authenticate, it consumed a Base license. If that user used Profiling as well, it would also consume a Plus license. With 3.0, licenses are consumed by each licensing tier. So if you use Profiling and AAA features, you will consume only one Advantage license
  • TACACS+ (Network Device Administration) licenses do not require 100 Base licenses in 3.0
  • There is a migration process to migrate existing 2.0 licenses to 3.0 licenses

Note: Some of these licensing changes can be a little confusing. Please reach out if you need a deeper understanding of the licenses.

ISE nodes supported with 3.0

  • You can still use Cisco SNS appliances, but be aware SNS 3515 & 3595 are end of life
  • Virtual appliances are supported on VMware, KVM and Hyper-V
  • You can also support a cloud deployment platform using VMware Cloud in AWS. Other clouds will be supported in the near future.

Agentless Posturing is now supported on Windows & macOS

  • You can enforce endpoint compliance without an agent on the endpoint
    • There are caveats with this – you need admin credentials and there is no support for remediation, grade periods, and re-assessments
    • It is still recommended to use an agent, like AnyConnect, to perform posturing on a device. There is not full feature comparison between agent and agentless deployments.

Here are a few other new features I wanted to bring to your attention:

  • 802.1X with Azure AD using OAuth-ROPC (Resource Owner Password Credentials)
  • Cisco’s new ISE API Gateway provides a new single point to interface and manage API calls
  • Certificate Fingerprinting using SHA256 to evaluate certificates. This allows you to use multiple trusted certificates.
  • Health Checks – run an on-demand health check to diagnose all the nodes in your deployment, helping you to identify critical issues and avoid downtime
  • Interactive Help that provides tips and step-by-step guidance to complete tasks
  • pxGrid has a new interface
  • SAML SSO for Multi-Factor Authentication

I hope you found some of these new features beneficial. Before upgrading to ISE 3.0, make sure you convert your existing licenses to the new 3.0 licenses. If you need a hand or would like to learn more, reach out to myself and the Arraya team today.

November 2, 2020 by Arraya Insights

What is Microsoft Lists? Lists is a Microsoft 365 app that can help keep you and your team organized and on the same page by way of the same intuitive collaboration you have come to expect from Microsoft. Whether you create a template from scratch or choose a pre-defined one, there is something there for everyone. Keep reading to learn how to enable this great feature inside your Microsoft Teams client.

Step 1:  Open your Teams client and check for any updates

Step 2: Click Apps and in the search box type “Lists” and then “Add to a team”.

Step 3: Type in the name of the channel to which you would like to add the Lists capability. Here I chose the Retail channel.

Step 4: Click Save and the Lists tab will be added to that channel.

Now you can create a list from scratch or use one of the many pre-defined templates. Here I chose the issue tracker template to track software bugs on the company homepage.

Now you have added the Lists functionality into Teams allowing even more collaboration and organization into your channel to keep everyone on track.

October 29, 2020 by Arraya Insights

John Salmons, an Arraya Inside Sales Engineer, discusses recent and upcoming changes to Microsoft Teams. Later, he demos Teams integration with the SharePoint list application.

October 27, 2020 by Arraya Insights

Dell Technologies World 2020: 4 Key Announcements

Members of Arraya’s engineering team journeyed to Dell Technologies World 2020 last week to learn all about the latest and greatest solutions from the IT giant. As has become standard practice this year, that journey lasted only as long as the trip from their bedrooms to their home offices. Despite an all-virtual and condensed (just two days of sessions) format, Dell Technologies World 2020 still had plenty to offer in the way of news and highlights.

During his opening keynote, Michael Dell, CEO of Dell Technologies, acknowledged both the uncertainty of the early days of the coronavirus pandemic as well as the inspirational stories of resiliency that followed. He also highlighted technology’s role in these successes. “One thing is clear,” Dell remarked. “Technology has never been more central than it is right now.”

In addition to our here and now, Dell also spent some time looking to IT’s future during his remarks. He theorized about the potential for rapid-paced digital transformation with the expanding availability of powerful solutions such as 5G and artificial intelligence. Dell believes that newfound computing might, coupled with growing adoption of connected endpoints and devices, will lead to massive influx of meaningful, highly valuable data for organizations.

Dell’s insights were no doubt compelling, as they always are, however, the real highlights came after the keynote wrapped.    

Project APEX

Project APEX sounds vaguely like a plot thread borrowed from a summer blockbuster, back when those were still a thing we could all enjoy. That’s actually fitting considering the impressive scope of this change and the impact it promises to have on those organizations leveraging best of breed Dell Technologies solutions.

Here’s what Project APEX actually is: It’s a strategic shift by Dell Technologies aimed to simplify IT operating models that have grown increasingly complex in recent years. Specifically, it addresses adding increased scalability to the company’s slate of as-a-Service offerings. 

There are three tent poles about the cloud experience that support Project APEX. They are:

  • It should be simple, turnkey and fully manageable through the Dell Cloud Console.
  • It should be consistent across public, private and edge solutions.
  • It should be flexible, allowing organizations to choose how they pay and consume their cloud. This includes choosing between pay as you go, use, or subscription financial models and well as selecting performance and capacity parameters that best fit an organization’s individual needs.

The first phase of Project APEX will be Storage as-a-Service, which will utilize Power portfolio resources. This will be available during the first half of 2021. Dell Technologies will gradually grow from there, launching additional as-a-Service solutions, including servers, networking, hyperconverged. 

Dell Technologies Cloud Console

Reading through that description of Project APEX, you might have noticed an unfamiliar solution: Dell Technologies Cloud Console. Described as a “key part of the Project APEX vision,” Cloud Console debuted at this year’s conference. This console will serve as a central hub from which organizations can manage all facets of their cloud experience.

What’s included under “all facets?”  Essentially, organizations will be able to access a digital marketplace from which they can purchase the cloud solutions or services they need. This marketplace will double as a portal from which admins can deploy and manage cloud-spanning workloads while also keeping an eye on costs to keep spend in line with organizational targets.  

Dell Technologies Cloud Console is now in preview. It will be generally available to customers by the end of 2021’s first quarter.

Storage as-a-Service

Another element of Project APEX worth highlighting on its own is its first offering: Storage as-a-Service. This solution is something of a hybrid in its own right, combining on-prem storage with the as-a-Service flexibility and scalability of the cloud. It offers a variety of storage resources that can be wound up or down – via Cloud Console – to meet an organization’s workload needs. 

As workflows change, admins can log in to Cloud Console select a storage type (block, file, object) as well as their performance, capacity and terms needs. Those chosen resources can be spun up, either by Dell Technologies or via a trusted channel partner as a fully managed service.

Storage as-a-Service is set for general availability during the first half of 2021.

Revised Financing

Dell Technologies also made a few revisions to alleviate the financial strain of modernizing an organization’s data center. These included:

  • lowering the barrier to entry for the Dell Technologies Cloud Platform through a new per-instance pricing scheme. This will make life easier for those managing their digital footprint via Cloud Console.
  • expanding pre-approved Flex On Demand pricing for popular preconfigured solution options. This program covers most of Dell EMC’s portfolio and allows customers to select the build that works best for them.

Next Steps: Put Dell Technologies World to work for you    

Want to learn more about what took place at this year’s Dell Technologies World? Want to start a conversation about any of the above announcements? Our data center team can help. Arraya’s experts can break down these items, strip off the hype, and help you determine what role, if any, they can play in the future of your data center.

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.

Comment on this and all of our posts on: LinkedIn, Twitter, and Facebook.

Follow us to stay up to date on our industry insights and unique IT learning opportunities.

Primary Sidebar

Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}