• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint
      • Network
      • Cloud
      • Application
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Arraya Insights

August 6, 2019 by Arraya Insights

Let’s admit it, in terms of branding, Microsoft 365 and Office 365 look similar. Some might say too similar. However, beyond the marketing exists two distinct solutions. One offering embodies theM365 Modern Desktop Licensing in-demand idea of the modern desktop. The other is simply a part of the modernization puzzle. We sought out, with a hand from our Cloud and Workspace team, to clarify what separates Microsoft 365 and Office 365, as well as to define properly the modern desktop and how it can help.

Setting the record straight on the modern desktop

Let’s start by defining the modern desktop. Probably the best way to do this is by nailing down what it’s not. Some use Office 365 and modern desktop interchangeably, but that’s not accurate. Office 365 is just one piece of the modern desktop. Microsoft 365 is the company’s full realization of that concept.

A good way to illustrate the difference between the two is to look at the licenses.

M365, Modern Desktop Licensing

There’s a lot of similarity in that table. The real difference comes in terms of advanced security features. Microsoft 365 includes:

  • Office 365 Advanced Threat Protection for defense against threats embedded in email attachments, ransomware, zero-day hazards, and more
  • Intune’s Selective Wipe feature so admins can wipe sensitive data from misplaced or stolen company devices
  • Information Rights Management to restrict how users are able to interact with at-risk corporate data
  • Unlimited cloud archive and long-term document preservation policies powered by Exchange Online Archiving

Those are just some of the advanced security capabilities included with Microsoft 365. In terms of device management, simplification is the name of the game. Office apps can be automatically deployed to Windows 10 PCs, policies and features can be spun up or down across multiple platforms. This allows IT to focus their energies on where they’re needed most.

What’s life like with Microsoft 365?

That takes care of defining Microsoft 365. What about how it, and desktop modernization in general, can help? To answer this question, we’ll draw from a recent report by Forester. The consulting firm’s The Total Economic Impact of the Microsoft Modern Desktop explored the results experienced by organizations that have invested in modern desktop initiatives. It found:

  • Advanced security and analytics features help prevent an estimated 4,000 downtime events each year
  • Looking at the modern desktop’s security impact another way, these features can reduce both the risk of a data breach by 40% and the likelihood of an end user security incident by 20%
  • Communication and collaboration upgrades, such as replacing in-person meetings with Skype for Business, can save users 2.3 hours a week
  • On average, organizations save $5.3M in total cost of ownership by shedding licenses, infrastructure, etc. and moving to the modern desktop
  • Specific to IT, Forrester found:
    • a 20% reduction in help desk calls thanks to self service
    • admins spend 2.5 hours less per device due to automated provisioning
    • Windows Analytics made it so application provisioning ate up 45% less time while application testing took 70% less time

Learn more about M365 and modern desktop licensing

This is just a high-level look at these solutions and the benefits achievable with a modern desktop environment. Also, it is worth mentioning both Office 365 and Microsoft 365 licenses are customizable, so it’s possible to add solutions based on need. If you’d like to dive deeper into the modern desktop or any of the licenses covered in this post, our Cloud and Workspace team is ready to help! Simply visit https://www.arrayasolutions.com//contact-us/ to open up a dialogue.

Have some thoughts about this post? We want to hear from you! Leave us a comment on this or any of our blog posts through our social media accounts. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

August 1, 2019 by Arraya Insights

Are you deciding between handling your next IT project in-house or working with a partner? You might want to go with the partner. Now granted, our opinion on this topic is hardly objective. Instead, let’s check in with a less biased source: Forrester Consulting. In a recent infographic, the consulting firm documented just how much, even with a skilled in-house team at the ready, it helps having a partner in your corner to provide immediate and long-term support.

As we dive into each of these examples, we’ll also review Forrester’s supporting data:

  • Less Risk: There’s always going to be some level of risk associated with a new technology deployment. However, according to 63% of those surveyed by Forrester, working with a strategic technology partner can lessen that risk. Outside technology partners often have more experience with a technology, allowing them to guide projects around dangerous patches.
  • Greater ROI: Think of the goal your company has in mind as it prepares to deploy a new IT solution. Whatever the objective, Forrester’s data suggests working with a technology partner can help achieve it. Two separate statistics make that case. One states that 62% of those surveyed believe they lack the internal skill needed to realize the full potential of a given technology while 65% say they are unable to extract full value from investments.
  • More Time for Innovation: Rolling out new technologies – and supporting the ones already in an environment – can eat up a lot of IT’s workday. More time spent performing those tasks, leaves less time for innovative new pursuits. The vast majority of those who participated in the survey saw working with a strategic technology partner as a way to free up IT to undertake more forward-looking projects. Roughly 81% of those surveyed say deployment services allow more time for innovation and 77% believe support services do the same.
  • Gain an Outsider Perspective: No one knows your IT environment quite like your organization’s own IT team. Still, there’s something about bringing a fresh set of eyes in to review it. They may be able to spot a gap or a potential incompatibility issue that would have otherwise gone overlooked by those who’ve gotten too close to the environment. Forrester found 66% of those surveyed believe they have benefited from bringing knowledgeable outsiders into their environment.

Don’t face IT’s evolving landscape alone

Here at Arraya, we’re obviously a little biased as to the value of working with a technology partner. However, Forrester’s data demonstrates that those on the other side of the partnership, specifically technology decision-makers, see things much the same way we do. It’s a sign that do-it-yourself, even if you have the skills to do so, may not always be the best approach.

Want to learn more about how Arraya can help your organization achieve its strategic technology objectives? Start a dialogue with our diverse team of technology experts today by visiting: https://www.arrayasolutions.com//contact-us/.

Have some thoughts on this post? As always, we want to hear from you! Leave us a comment on this or any of our blog posts by way of social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

July 29, 2019 by Arraya Insights

Cloud is no longer a new frontier as some 80% of organizations leverage one form of it or another according to ITPro Today and Dell EMC’s State of the Cloud study. Yet, that doesn’t mean life inAzure Cloud Governance the cloud, or the journey to it for that matter, is easy. Challenges remain and the way organizations respond to them can mean the difference between succeeding in the cloud and possibly facing the unenviable task of bringing workloads back on prem.

Among the top challenges in the ITPro Today and Dell EMC report are:

  • Complexity around security – 57%
  • Cost (TCO, ROI) – 45%
  • Legacy infrastructure – 40%
  • GRC (governance, risk, and compliance) – 39%
  • Legacy applications or other services – 35%
  • Data locality and other services – 32%
  • Corporate or executive sponsorship – 14%

The top three challenges above probably don’t come as much of a surprise. Security is at or near the top of any list of challenges facing technology today. The same is true of cost as well as of the conflict between legacy and modern solutions. However, the fourth item on that list, challenges around governance, risk, and compliance, is one many organizations don’t consider before setting course for the cloud. Failing to do so can delay or even severely reduce cloud ROI.

Getting a handle on cloud governance strategies and solutions

Governance, risk, and compliance are three things that must be addressed prior to any type of cloud project. There’s a strategic component that must be worked out among internal stakeholders, IT resources, cloud partners, and so on. It must also be addressed from a technological perspective. Organizations leveraging Microsoft Azure have multiple native technologies they can roll out in order to turn that challenge into a strength.

Let’s review four resources included with Azure licenses that can do just that:

  • Azure Policy collects all of an organization’s compliance data into a single location. It crosschecks new cloud workloads against that stored data to ensure conformity with applicable regulations and policies. These guardrails, as Microsoft refers to them, can continue to ensure compliance even as an organization scales up (or down) its cloud footprint. Recently, Microsoft integrated Azure Policy with Azure DevOPs to allow developers access to production environments while stopping non-compliant code from being inadvertently released company-wide.
  • Azure Cost Management integrates with built-in Azure tools to help organizations get the greatest ROI from their cloud investments. For example, Azure Cost Management pairs with Azure Advisor to optimize costs by eliminating idle resources. It can also lean on Power BI to drive further cost-streamlining customizations. Recent enhancements to Azure Cost Management allow it to deliver real time cost analysis as well as budget thresholds. This latter innovation can help prevent sprawl, keeping organizations pointed squarely at the cloud goals they laid out for themselves.
  • Azure Blueprints reduce the complexity of new large-scale Azure deployments by putting everything a cloud admin might need all in one package. Azure Blueprints ties templates, access controls, and tried-and-true policies together in a single architectural design. This blueprint is applicable to new Azure deployments, ensuring best practices and regulatory compliance. Additionally, these blueprints can help manage versioning and updating an environment over time while locking out potentially harmful changes.
  • Azure Resource Graph gives admins a bird’s eye view of their cloud environment. They can clearly see and review the solutions and resources deployed throughout their Azure tenant. They’re also able to drill down to gain insights into the properties of these resources and how they interact, if at all, with each other. These can prevent issues with compatibility as well as clarify how a change to one resource could reverberate throughout the environment.

Next steps: Refine your cloud governance strategy with Azure

All you need to do is activate the above Azure resources in order for them to begin generating meaningful value for those already in the Microsoft cloud. For those only just embarking on their Azure journey, these solutions – and the tactical conversations around cloud governance, risk, and compliance – are an essential part of preparations.

Need a hand working with any of these resources? Or, would you like to bounce strategic ideas off someone who has been there before? Arraya’s Cloud and Workspace team is here to help. Head over to https://www.arrayasolutions.com//contact-us/ to start a dialogue with them today.

If you have thoughts about this post, we want to hear from you! Leave us a comment on this or any of our blog posts by way of social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

July 12, 2019 by Arraya Insights

Back in the spring, we wrapped up a months-long deep dive into the features and benefits of VMC on AWS. Along the way, we covered NSX Dell EMC Data Protection for VMC on AWSintegration and native tools, as well as the solution’s ability to power migration simplification and disaster recovery. However, a topic came up at our recent Arraya Solutions Tech Summit that compelled us to revisit the series. Even as cloud solutions like VMC on AWS become more popular, myths about what they can deliver abound. If left un-busted, one such myth could have a disastrous impact.

The myth in question pertains to data backups. Many customers assume that their cloud provider is regularly backing up their data. Unless there’s an agreement in place that says otherwise, a cloud provider’s actual responsibility here is zero. Like most cloud platforms, VMC on AWS operates under a shared responsibility model. AWS supports the infrastructure upon which its services are built. This includes hardware, software, networking, etc. Everything else? Data, applications, VMs, OS patching? All of that falls squarely on the organization itself. In short, even in the cloud, the customer’s data is the customer’s responsibility.

With that said, the question becomes: What can organizations do to ensure their cloud-based data will be accessible when they need it?

Exploring Dell EMC Data Protection for VMC on AWS

Luckily, there are quite a few ways to address this problem. Top data protection vendors have identified that gap and have flocked to address it. Diving into every such option would necessitate either one gigantic blog or a separate series unto itself. Instead, our Data Center team decided to focus, at least for now, on one possible solution: Dell EMC Data Protection for VMC on AWS.

Dell EMC’s Data Protection was the very first data protection tool available for VMC on AWS shops and remains a leader in the space. It delivers enterprise-grade protection for critical files that are housed in hybrid environments. In order to simplify the data protection process, this solution comes as part of a bundle including Dell EMC Data Protection Software as well as Data Domain Virtual Edition. The idea is to put in one spot all the tools organizations need to keep their data safe and available.

Here are a few fast facts about Dell EMC Data Protection for VMC on AWS:

  • It sports an incredibly efficient client-side deduplication capability, topping out at a best-in-class rate of 6:1
  • The solution’s powerful deduplication coupled with its built-in compression abilities can reduce demand on object storage landing places by 71%
  • Dell EMC Data Protection for VMC on AWS integrates with on-prem and cloud-based solutions, allowing for the same level of security and performance no matter where data resides
  • It ties in vSphere’s management functionality to bring time and resource-saving automation into data protection, as well as backup and recovery, saving valuable time during disaster scenarios
  • Modern organizations need to stay innovative and Dell EMC Data Protection for VMC on AWS supports this by leveraging VMware’s SDDC abilities, as well as its own inherent scalability

Next Steps: Learn more about keeping your data safe wherever it lives

As mentioned above, the subject of data protection and the cloud is far too big for a single, easily-digestible blog post. Arraya’s Data Center team can take you through this topic, or through Dell EMC Data Protection for VMC on AWS specifically, in far greater detail. They can help you assess your data protection needs and find the best solution for your organization. Start a dialogue with our team today by visiting: https://www.arrayasolutions.com//contact-us/.

As always, we want to hear from you! Leave us a comment on this or any of our blog posts by way of social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

July 10, 2019 by Arraya Insights

Toward the end of last year, Gartner released its first-ever Magic Quadrant devoted specifically to SD-WAN, or as Gartner formally defined it, WAN Edge Infrastructure. The “Leader” quadrant VeloCloud SD-WAN Use Cases was relatively sparse, but there were two names in there with which Arraya (and our regular blog readers) are very familiar. Cisco is one of them. Last summer on this blog, we explored the use cases of two of Cisco’s most popular SD-WAN options: Viptela and Meraki. While we’ve covered another company in the “Leader” square for other solutions, we haven’t yet delved into its SD-WAN capabilities. Given its high marks from Gartner, our Networking team decided to rectify the situation.

VMware was more than a Leader in Gartner’s estimation. The company – whose VMC on AWS offering we only recently completed a deep dive into – received the highest marks around for completeness of vision. It was also ranked right near the top for its ability to execute on that vision. VMware’s principal solution in the space is SD-WAN by VeloCloud. VMware acquired VeloCloud in December 2017 and it has clearly proven to be a formidable pairing.

With VMware SD-WAN by VeloCloud locked in as one of the premier SD-WAN solutions on the market, let’s dive into four use cases where it can offer the most value.

Use Case #1: Branch and/or remote offices. Far-flung or isolated locations are a longstanding feather in SD-WAN’s proverbial cap. VMware SD-WAN by VeloCloud is ideally suited for this use case. It provides additional value by further strengthening the bonds between these locations and the rest of the organization. VMware SD-WAN by VeloCloud can clear up the congestion that so-often plagues voice or video applications (particularly in such use cases) while also opening up more bandwidth wiggle room. This ensures no matter the distance or terrain between offices, communication and collaboration will be seamless.

Use Case #2: Bogged down SaaS applications. SaaS applications such as Office 365 and AWS have become instrumental to many employees’ workdays. Should these applications suffer from degraded performance – or worse, go down entirely – it could leave organizations at a standstill. SD-WAN by VeloCloud keeps traffic and requests flowing smoothly between users, the platforms they count on, and the data center.

Use Case #3: Porous connections and communication. Security must be a top-of-mind concern for all organizations, no matter their size or industry. VMware SD-WAN by VeloCloud helps support the VPN, encryption, and load balancing needed to keep employee connections safe and available. Furthermore, it can also enable admins to spin up hardened connections between endpoints on an as-needed basis.

Use Case #4: Foggy edge end-point visibility. Network admins must have eyes everywhere. This is especially true for the edge of their organizational network. Beyond just being able to monitor traffic flow, admins must also have the reach to be able to respond to problems quickly. VMware SD-WAN by VeloCloud offers admins a boost of confidence by reacting to monitoring connection health, triaging, and then reacting to issues on the fly.

Next Steps: Explore more VeloCloud and SD-WAN use cases

Want to learn more about SD-WAN and the impact it could have on your organizational network? Visit https://www.arrayasolutions.com//contact-us/ to reach out to our team of experts. They can answer any questions you may have as well as help you assess whether or not your organization is SD-WAN ready.

Remember, we want to hear from you! Leave us a comment on this or any of our blogs by via social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

July 3, 2019 by Arraya Insights

TACACS+These days, everybody is looking for a cyber security silver bullet. Organizations want something flashy, new, and most importantly, capable of besting any threat or malicious actor that may cross its path. TACACS+ is none of those things. In truth, that perfect cyber security cure-all may never materialize. Instead, the most successful security postures use a combination of reliable, proven – and yes, sometimes even low profile – tools. This describes TACACS+ to a “T.” Despite that, TACACS+ is a solution many organizations continue to overlook.

At a glance, TACACS+ is a secure network access protocol that executes authentication, authorization, and accounting (AAA) services. Cisco originally developed TACACS and then released it as an open standard in 1993. It can run on separate servers or, potentially, on hardware already at work in a given environment. For example, organizations can add a Device Administration license to an existing Cisco ISE server deployment.

It may not be flashy, but there is definitely value to be gained from making TACACS+ part of the corporate security posture. Let’s consider a trio of use cases.

Use Case #1: Managing account access and roles

In our first scenario, think of an admin deploying a new switch into the corporate environment. His or her initial inclination might be to secure that switch using local credentials, maybe even his or her own local credentials. However, this can present a few problems. If that admin leaves the company, that password could vanish alongside him or her. There’s also the general unease that sharing passwords should inspire inside any security-focused organization.

A better, more secure approach would be to use TACACS+ to authenticate access. This lets admins assign role-defined access based on group membership. So, in that initial scenario, one admin would still deploy the switch. However, he or she would secure it with TACACS+, allowing any member of their team with admin privileges for that switch to log in and access it. Unlike shared passwords, this also effectively seals out team members who shouldn’t have access to the switch in the first place.

Organizations can define their device management policies to give different levels of administrative access to different user roles, such as restricting the privilege level and command sets that an admin is allowed to execute at the CLI.

Use Case #2: General account maintenance

Next, let’s think more generally about account maintenance. Duties like adding or subtracting permissions, spinning up or deleting user accounts. These are routine tasks, but they take time to complete. Time is, of course, always at a premium.

With TACACS+, organizations can centralize their user database, making routine account maintenance easier on admins. Under this arrangement, they can control all of their accounts (users, management, etc.) from one location. In order to delete a user’s account after he or she leaves the organization, admins need only to access the central database and remove it entirely. This saves time and eliminates any concern that an ex-employee may still have access to some corner of the corporate network.

Use Case #3: Administrator accountability

For our final scenario, let’s focus on one of those three A’s mentioned above: accounting. In this case, accounting has nothing to do with the finance department. Instead, it concerns tracking the actions taken by any given account.

Let’s circle back to that newly installed switch. If an admin tasked with performing some maintenance work were to login with a local username and password, it’s difficult to know what steps were taken or tasks performed. If the organization were running TACACS+, however, it would be able to see clearly who was making a change, the commands he or she used, etc. Whatever that admin does while logged in through TACACS+, the protocol can track, adding accounting and accountability, two things auditors (and admins) love. For example, supervisors can reference the accounting logs to see exactly what changes were made, when and by whom.

Next Steps: Make TACACS+ part of your security strategy

TACACS+ may not be flashy, but it still has a role to play in keeping organizational data secure. If you’d like to learn more about this technology and its use cases or how else you can refine your security posture, reach out to us anytime at: https://www.arrayasolutions.com//contact-us/. From there, we’ll connect you to our team of cyber security experts. They can work with you to assess, and create a plan to enhance, your cyber security strategy.

Let us know what you think of this post! Leave us a comment on this or any of our entries by way of social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

June 28, 2019 by Arraya Insights

When’s the last time you checked out Microsoft Teams? For some organizations we work with, it’s been a while. When Microsoft’s unified communication platform launched just over two years ago, some of these businesses saw it almost as the Wild West. End users had the reins and they could spin up teams and share files with minimal oversight. However, Microsoft Teams has undergone significant changes since those early day and so, if you haven’t checked it out lately, now’s a good time to give it another look.

Not convinced that Teams will work for your organization? Let’s consider three ways in which it has evolved since its debut back in 2017. Once we finish going over these changes, ask yourself whether Teams still sounds like such a lawless frontier.

Admin Center

Teams’ Admin Center is the big one as far as many IT pros are concerned. As mentioned above, when Teams first launched, users had a tremendous amount of freedom. Some would even argue, too much freedom. This left many organizations’ Teams environments overrun with unnecessary or directionless team units. Instead of promoting more efficient, intelligent collaboration, some early experiences were just the opposite.

Roughly a year ago, however, Microsoft introduced the Teams Admin Center. Built on a base of PowerShell’s pre-existing Teams management commands, this more-fully realized feature put administrative control of Teams back in the hands of IT. Admins have a single spot from which to create new teams, add or remove members, or perform any other necessary management tasks. Should they choose to give more freedom to users, they can do so from the Teams Admin Center, defining permissions accordingly.

Direct Routing

Teams Admin Center isn’t the only change to Teams liable to catch IT’s eye. One of the newest additions to Teams is Direct Routing. This new addition allows calls to be routed from an on-premises phone system directly into Teams. So, for example, if User A dialed User B’s office phone, User B could answer the call through his or her Teams client.

The inclusion of direct routing is interesting for a couple of reasons. First, it centralizes Teams as a communication hub. Chat, video, meetings, collaboration and now calls – all of it nestled within the same app. It’s a simplified and streamlined approach to communication. However, Teams doesn’t have to fully replace traditional communication hardware. Instead, it integrates with them, allowing organizations to continue to realize ROI from hardware investments.

Data Loss Prevention

The last big addition to Microsoft Teams that we want to focus on in this post is one that Microsoft environment admins may already know well. Very recently, Microsoft brought its Data Loss Prevention (DLP) capabilities to Teams. If you have yet to work closely with these features, let’s do a quick overview. Essentially, they allow admins to define a set of rules governing the data end users can share with each other. For example, intelligence can be used to recognize credit card numbers or social security numbers that pop up on Teams. From there, DLP can either prevent that information from being shared or simply raise a red flag, alerting the appropriate resource.

With the help of DLP, admins can gain greater control over the kinds of information users pass back and forth on Teams. This ensures that sensitive data doesn’t end up either in the wrong hands or as public knowledge.

Next steps: Explore the present and future of Microsoft Teams

These are just some of the steps that Teams has taken to rid itself of its “Wild West” reputation. Want to learn more about these features as well as what the future holds for Microsoft’s all-in-one collaboration platform? Reach out to us anytime by visiting: https://www.arrayasolutions.com//contact-us/. From there, you’ll be put in touch with our in-house Microsoft Teams experts who can answer any questions you might have and help you plot a course forward.

As always, we want to hear from you! Leave us a comment on this or any of our blog posts by way of social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

 

June 27, 2019 by Arraya Insights

Most cybersecurity experts will advise employees to keep their personal information off their company-issued devices. In fact, most companies’ acceptable use policies require it. Yet, despite the ample warnings and policies, employees continue to use their work devices for decidedly non-work purposes.

With the growing popularity of remote working, road-warriors, bring your own device (BYOD), etc., it’s time to come to terms with employees using their work devices for personal use as well as professional. From a security management perspective, you must adapt your mindset to help protect your organization’s sensitive data.

Password management applications to the rescue!

Password management applications are not new to the marketplace. However, they have been gaining more attention recently thanks to the high volume of compromised accounts and data breaches. Some key advantages of leveraging a password manager include:

  • A different password for every website – The password manager is an encrypted vault for all of your passwords, so you only need to remember one password to get in. This allows for greater password complexity and diversity.
  • Simplicity in logging into multiple accounts – You can install browser extensions on all of your devices to autofill your login details.
  • Secure sharing – Where permitted, password managers enable you to share passwords securely with co-workers and those you trust.
  • Easily update passwords – Password managers allow for easy updating when you have to change your passwords due to expiration or reset.

Some of today’s highest rated password managers include: Keeper, 1Password, LastPass, Dashlane and Bitwarden, just to name a few.

Elevate your enterprise security with Two-Factor Authentication

Two-factor authentication (2FA) strengthens your security by requiring two methods (factors) to verify user identity. The methods used to verify include something that you know, like your username and password, as well as something you have, like a smartphone or even biometrics.

You can tie-in 2FA with password management applications and all of your organization’s important resources to ensure the person logging in is really who they say they are. This extra layer of security is vital to protecting important assets.

One tool Arraya recommends for 2FA is DUO. With DUO, users can carry one device, their smartphone. DUO makes things simple by using something called DUO Push, which utilizes the DUO Mobile authentication app. As a result, users can approve push notifications to verify their identity. Check it out for yourself:

DUO 2FA password management

 

Diving deeper with DUO: Endpoint Visibility

DUO is much more than a basic authenticator. It allows you to use endpoint visibility to track and report on all end user devices from a single dashboard. This lets your organization identify devices that may be at risk. DUO also allows administrators to have granular insight on what devices may be running outdated software so they can get ahead of vulnerabilities that may lead to a data breach.

We talked earlier about  the challenges of managing an evolving workforce. DUO can help identify corporate vs. personal devices, supporting organizations in their quest to enable flexibility and data security. By using trusted endpoints, you can utilize device certificates to have greater insight into your BYOD environment. This way, you can easily filter through devices that access your important applications.

 

DUO 2FA password management

Trusted Access

In addition to device visibility, DUO offers policies tailored to the taste of your business needs by using groups, roles, or even responsibilities. Your main priority is simple, protect what is important. By using geolocation, you can easily prevent access from anywhere in the world. You can also control access by IP address or anonymous networks like Tor.

DUO 2FA password management

Want to learn more about DUO, 2FA security and building a secure technology environment? Be sure to reach out to our team of cyber security experts now by visiting: https://www.arrayasolutions.com//contact-us/.

June 25, 2019 by Arraya Insights

A common problem with SharePoint, regardless of version, is that once a list or library has more than 2000 items in it, performance is impacted. Once you reach 5000 items, the impact becomes severe. The issue lies with a fundamental part of the interaction between SQL and SharePoint and, because of that, it is not easily solved.

While the usual solution is to leverage views to minimize the impact on any one user, we’re going to look at using a PowerShell script to clean up older items and move them to an archive. Our scenario is this: You have a list you made last year for sales contacts; but you’re well over 2000 items now and want to move the 2018 entries to an “archive” list. Ideally, you want a process you can easily leverage and you don’t want to use the document management feature for a variety of reasons that we’ll leave out for now.

If you’re looking at the above scenario, you’re looking for a PowerShell script solution for a reason and we have it. This script could be leveraged once a year, every year, to clear out the prior year’s list contents to an “Archive.” This archive list presumably won’t grow as each successive year would be its own list. The data remains in SharePoint and is easily leveraged, but you’re not crowding and slowing the most current entries.

The first part of this process is to create the archive list in SharePoint. This is simple enough, we’re just going to save an empty template of our current list to get all of the settings and columns just right.

 

SharePoint Archive script SharePoint archive script sharepoint archive script

Now that we have our destination list, we just need the script. With a few minor changes, we could alter this script to be selective for any date or other criteria captured by our fields. The first part is our establishment of the values for our operations:

 

# Created by Matt Vignau, Arraya Solutions, Inc. 4-16-2019

Add-PSSnapin Microsoft.SharePoint.PowerShell -erroraction SilentlyContinue

 

#Configuration variables

$WebURL = “<Insert Site URL here>”

$SourceListName = “<Name of list that needs archiving>”

$TargetListName= “<Name of list to archive content to>”

 

We need only add the URL of the website that contains our lists and the name of the source list, the one we wish to trim from, and the target list, where we want our items to appear.  When we say the “name”, we mean the actual display name of the list that you have chosen for them.

The next part of the code sets up the objects we need to carry out the operation and are fairly straightforward:

 

#Get Objects

$web = Get-SPWeb $WebURL

$SourceList = $web.Lists[$SourceListName]

$TargetList = $web.Lists[$TargetListName]

$CutOffDate = [datetime](“1/1/19”)

 

#Get all source items

$SourceColumns = $sourceList.Fields

$SourceItems = $SourceList.GetItems();

 

Note that you could set the date to be anything you wish to change the created date you want to trim from.  After this, we need only set up a loop to go through and make item copies, one column at a time.

 

#Iterate through each item and add to target list

Foreach($SourceItem in $SourceItems)

{

$CreatedDate = [datetime]($SourceItem[“Created”])

if( $CreatedDate -le $CutOffDate)

{

Write-Host $SourceItem[“ID”]

$TargetItem = $TargetList.AddItem()

Foreach($column in $SourceColumns)

{

if($column.ReadOnlyField -eq $False -and $column.InternalName -ne “Attachments”)

{

$TargetItem[$($column.InternalName)] = $sourceItem[$($column.InternalName)]

}

}

$itemsToDelete += $SourceItem

$TargetItem.Update()

}

}

 

Finally, we need to clean up the old items with the following loop:

 

#Movement is complete, move on to delete

Write-Host “Item movement completed, proceeding to delete old items…”

 

Foreach ($itemToDelete in $itemsToDelete)

{

Write-Host “Now deleting item #” + $itemsToDelete[“ID”]

$itemToDelete.Delete()

}

 

Write-Host “Items have been deleted”

 

That’s all there is to it!

Next Steps: Learn more SharePoint tips and tricks

Interested in learning more about how to optimize your SharePoint environment? Reach out to us at https://www.arrayasolutions.com//contact-us/. Also, let us know what you think of this blog by way of social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date with our industry insights and unique IT learning opportunities.

June 19, 2019 by Arraya Insights

Ever since its debut, Cisco’s Collaboration Flex Plan has been a hot topic of conversation between Arraya team members and our customers. Given the amount of chatter it has inspired, we decidedDave Finnegan collaboration flex plan licensing to sit down with David Finnegan, an Enterprise Architect on our Collaboration team, in order to get his insights into Collaboration Flex Plan and the value it holds for customers.

Cisco Collaboration Flex Plan Q&A

Arraya Insights: What is Cisco’s Collaboration Flex Plan and how is it different from the way collaboration licensing works today?

David Finnegan: Flex is a single subscription that combines on-premises or cloud-based collaboration services into a single license. It allows customers to mix and match between cloud, premises, hosted and hybrid deployment options. Traditional UC licensing is a perpetual license model with a service contract for upgrades and support.

AI: Collaboration licensing can be complex enough already, will this add even more complexity to it? 

DF: When organizations purchase Flex licensing as an Enterprise Agreement, it covers all of their needs. Simply determine the number of knowledge workers (users that use a phone and computer as part of their job). It includes everything else.

AI: It’s not just licensing that’s complex. Organizations rely on a variety of Cisco collaboration solutions. Can Collaboration Flex Plan meet the diverse needs of such user bases?   

DF: Yes, Flex licensing covers Calling, Meetings, Teams and Call Center solutions. All of the collaboration products fall into one of those four options. Organizations have the choice of what to deploy and where to deploy it.

AI: Will Collaboration Flex Plan cover the Cisco tools customers are already using in their environment?

DF: Yes, Flex Calling licensing deployed on premises provides all of the tool/products that a company might already have deployed and possibly more that they have not yet utilized.

AI: Is it fair to assume that Collaboration Flex Plan is intended specifically for larger organizations, with a TON of end users?

DF: Calling and Meetings enterprise agreements both have different minimum thresholds for the number of knowledge workers. The calling EA is a minimum of 250 knowledge workers and the meeting EA is 40 knowledge workers or 15% of the total knowledge worker count. So, if you are below this threshold, you can start with a name user license.

AI: In general, technology budgets are stretched thin. Can Collaboration Flex Plan help rein in costs?

DF: When we quote Flex subscriptions, we often find that we can get more value for our customers or sometimes they even end up saving money.

AI: Organizational growth can be unpredictable. Would Collaboration Flex Plan be able to keep pace?

DF: Flex licensing enterprise agreements include a built-in 20% growth for total number of knowledge workers within your organization. If you happen to exceed that, first, congratulations on the awesome business growth. Next, we will update the contract to reflect the true number of users. From there, you get another 20% built-in.

AI: Some organizations aren’t prepared to go full-cloud quite yet. Does the Collaboration Flex Plan work for organizations that are part cloud, part on-prem? What about all on-prem?

DF: Nothing about Flex says you have to move to the cloud. Also, as a note, Cisco is not going to stop its investment and development in on premises communication systems.

AI: What happens when a new version of a solution is released? Will customers remain tied to the older version?

DF: Flex covers major and minor upgrades as well as TAC support just like your SWSS contract today. If you move to the cloud, upgrades happen automatically and those concerns become a thing of the past.

AI: Some organizations’ collaboration needs aren’t set in stone. If something changes, say I need to add calling to the mix, will Collaboration Flex Plan be able to change with me?

DF: Nothing to worry about here. Organizations can modify their contracts midterm to add additional services or change deployment location. It’s flexible, you might say.

Next Steps: Gain further insights into Cisco’s Collaboration Flex Plan

Our thanks to David for explaining the ins and outs of Collaboration Flex Plan. Still have questions? Please visit https://www.arrayasolutions.com//contact-us/. From there, you’ll connect to one of our Collaboration experts who will be able to provide even more insights into Collaboration Flex Plan and how it could impact your organization.

We want to hear from you! Leave us a comment on this or any of our blog posts by way of social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

Primary Sidebar

Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}