• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint
      • Network
      • Cloud
      • Application
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Arraya Insights

July 5, 2018 by Arraya Insights

There are plenty of options available to businesses interested in deploying SD-WAN. Cisco alone has three separate offerings in the space, including Meraki (which it acquired in 2012) and Viptela (which it acquired last year). Parsing through reams of digital datasheets breaking down the value of each of these solutions takes time. Even then, after the last .pdf has been closed, researchers may be left with more questions than answers.

In an effort to clear up some of the confusion surrounding SD-WAN use cases, we decided to pick the brains of our in-house team of networking experts. For the purposes of this blog post, we’re going to focus on Cisco’s solution set, specifically two of its Meraki and Viptela offerings. While Cisco’s iWAN is certainly still a viable solution, our team believes most newcomers will enter the Cisco SD-WAN world through one of the following gateways.

Offering A: Meraki MX

First, let’s start with what Meraki MX can do. This solution unites multiple core components of modern networking infrastructure into a single platform, covering security, WAN, switching, wireless, and more. As such, Meraki can easily deliver full stack connectivity to disparate branch locations. In terms of security, Meraki MX supports industry-leading tools such as Cisco AMP and Cisco Snort IPS. Additional security capabilities (URL filtering, etc.) are also built-in to ensure branch employees can safely access company resources.

Capabilities aside, the question remains: What does an ideal Meraki MX use case look like? Here are three examples:

  • Use Case: Organizations placing a premium on simplicity. As mentioned above, Meraki MX is a complete SD-WAN bundle. Proponents of “Lean IT” may see value in its ease of deployment as well as its streamlined, single pane of glass approach to management.
  • Use Case: Organizations seeking integrated security. There’s nothing wrong with bolting security capabilities onto an SD-WAN solution, it’s just not a necessity with Meraki MX. Instead of searching for additional solutions to provide peace-of-mind, IT will be able to get back to business post-deployment.
  • Use Case: Organizations already leveraging Meraki solutions. This final use case sounds simple enough, but it is worth noting. In order to roll out the Meraki MX version of SD-WAN, businesses must have a Meraki-based network already in place to provide the necessary foundation.

Offering B: Viptela

What about Viptela? With Meraki already in the fold, it seemed an odd play for Cisco to go out and spend $610 million to add another SD-WAN offering to its collection. Unless, of course, Viptela filled a capabilities gap – something it certainly seems to do. Among Viptela’s most appealing features is its ability to handle three or more uplinks as well as WAN multicast. It can be used for TCP optimization, WAN acceleration, and in support of network segmentation efforts.

The above rundown is just scratching the surface of what’s possible with Viptela. Diving deeper into its capabilities necessitates a look at its use cases.

  • Use Case: Organizations valuing customization. Viptela is a complex SD–WAN solution able to be molded to address specific needs. It enables fluid network segmentation, service-chaining at Layers 4-7, and more. The result? A solution that opens doors for organizations searching for new ways to optimize their networks.
  • Use Case: Organizations embracing the cloud. Organizations leveraging the cloud should find plenty of help in that regard with Viptela. This solution allows for easier, more efficient management of on-premises and private cloud architectures. Additionally, it provides an avenue for organizations looking to stretch WAN segmentation across on-premises and public cloud architectures.
  • Use Case: Organizations already leveraging Cisco solutions. Much as was the situation with Meraki, Viptela SD-WAN requires an appropriate technological foundation. In this case, organizations using Cisco ISR 4K technology (in addition to those who have already rolled out Viptela and Cisco elsewhere in their environment) would be best suited to make the transition.

Next steps: Where to turn for additional SD-WAN guidance

It’s important to mention that there is plenty of crossover between what Meraki MX and Viptela can do. Both solutions support layer 3 VPN overlays. Each solution can adjust traffic routing based on policies and performance. They’re both highly scalable, covering more than 10,000 sites and they both allow for LTE failover. These are just a few of the areas where Meraki MX and Viptela intersect.

With so much crossover, it may help to see these tools in action to determine the right fit. Arraya’s expert networking team can take organizations on a guided tour of these tools, illustrating capabilities and use cases via interactive solution demos. To schedule yours, visit: https://www.arrayasolutions.com//contact-us/. Also, leave us a comment on this or any of our blogs through social media. Arraya can be found on LinkedIn, Twitter, and Facebook. Once you’ve let us know what you think, follow us to stay updated on our industry insights and special events.

June 29, 2018 by Arraya Insights

Businesses have made cyber security an integral part of their M&A processes – so why are so many issues going unnoticed? Consider one study in which the vast majority (80%) of businesses M&A Cyber Security agreed cyber security had become a critical part of M&A due diligence 1. However, in that same survey, more than one-third of businesses admitted to failing to spot a cyber security problem at a company they acquired until after the ink had dried on the deal.

Perhaps these figures can provide some insight into the results of a separate study, this one conducted by Accenture Strategy. After investigating the 500 largest acquisitions by publicly traded companies over the course of a decade, Accenture found 45% of those deals were struggling to create value two years out 2. When taken together, these two studies indicate a disconnect between what businesses value in terms of cyber security and how they are executing on those values.

No two companies are identical and this includes their approach to IT and IT security. Preventing potentially costly M&A cyber security gaps requires focusing on three specific areas. They are:

  • How IT manages data. Data has become one of a business’s most valuable assets, perhaps second only to its people. Prior to beginning the M&A process, businesses must be clear on each other’s data management process. This includes big-ticket concerns like how they store data, how they back it up, and the security regulations that govern each. Also, it covers comparatively smaller worries such as whether or not they using SharePoint, do they have versioning turned on in it, etc. All of these points need to be hammered out to keep an M&A on track.
  • How IT manages people. M&A engagements can be a breeding ground for Shadow IT. If recently acquired end users don’t like a new system, they may very well look into finding one they do like. Time must be spent working with end users to understand how they do their jobs and how to minimize disruption resulting from the M&A. In addition, take care to blend, adapt, and publicize policies to keep workers from unknowingly exposing the company.
  • How IT manages the way people work. It’s been said that every company has become a technology company. So, before beginning an M&A process, IT will need to take a look at the technologies the other side uses to power every facet of their business, beyond just the security component. This can help identify conflicts, gaps, and duplication of efforts, allowing for a more secure and efficient transition.

Next Steps: Keeping cyber security on the forefront during M&As

M&As are a great opportunity for businesses, but, as evidenced above, they can also open the door to significant risk. As such, businesses must mitigate that risk wherever possible, including by working with a partner who knows where trouble resides. Arraya has distilled our years of experience in this area into an award-winning M&A methodology. Through this innovative approach, our experts can simplify these complex engagements, bringing them to a successful conclusion.

Want to learn more about how Arraya’s M&A methodology can benefit your business? If so, visit: https://www.arrayasolutions.com//contact-us/ to start a dialogue with us. You can also check out our new eBook: Arraya’s Guide to Running (and Finishing) the M&A Marathon. Arraya can be found on LinkedIn, Twitter, and Facebook. Once you’ve let us know what you think, follow us to stay updated on our industry insights and learning opportunities.

Sources:

1 Mergers create greater security risk, CSO Online

2 Sizing Up M&A Value Now, Accenture Strategy

June 19, 2018 by Arraya Insights

Last month, Cisco announced a number of upcoming changes to its collaboration portfolio, including the retirement of its Spark brand and the launch of Webex Teams. Far from marketing housekeeping, the announcements are part of a seismic shift in Cisco’s approach to collaboration. As many of these changes have taken effect, they’ve opened new opportunities for businesses, but also led to some confusion.

We sat down with our in-house subject matter experts to get their thoughts on these changes as well as what businesses can expect as Cisco’s collaboration evolution continues.

Goodbye Spark, hello Webex Teams

In the old days, there was Webex and there was Spark. Webex branded data centers ran Webex meetings. Attendees connected to those meetings via the Webex network. Meanwhile, Spark meetings lived in the public cloud, separate from their Webex counterparts, unless some serious behind the scenes finagling went on. Now, just about three years removed from the launch of Spark, Cisco has dropped that arrangement in favor of something more collaborative.

As of this month, Webex Teams has replaced Spark. As mentioned, this isn’t just a chance for marketing to flex their creative muscles. Now, Webex powers all meetings. It doesn’t matter if attendees join from the Webex Meetings application or from the Teams application. They connect to the same meetings, using the same infrastructure.

This move isn’t just about simplifying the collaborative experience between platforms, although that is a big part of it. It’s also about imbuing Teams with Webex’s video strengths, as Cisco continues its push to make video a key cog in all remote meetings.

But where does Teams fit in, exactly?

It’s great Webex Meetings is going to play nicely with the new kid in town, but the question remains: Is the world big enough for Webex Meetings and Webex Teams? Just what niche or purpose is Teams going to serve? Before we answer that, let’s take a closer look at what Teams can do.

Teams preserves the topflight chat functionality of legacy Spark and takes it a step further. By blending in Webex-powered video and voice, Teams becomes a more fully-realized version of what Spark was meant to be. The sum of these parts is known simply as a “Team meeting.”

Now that we’ve covered what Webex Teams is at a high level, let’s return to the initial question of where it fits into modern collaboration strategies. Chat has steadily chipped away at email’s status as the preferred workplace collaboration vehicle. This isn’t only true internally, but welcoming outsiders into internal chat applications can prove both time-consuming and, worse, hazardous. Webex Teams houses users in a single cloud, enabling built-in B2B collaboration. More importantly, Teams allows IT to retain control of what is shared and empowers them to act quickly in the event of a leak, ensuring a high level of secure collaboration.

What else is Cisco planning?

The progression from Spark to Webex Teams has rightfully consumed much of the attention as of late. However, it’s far from the extent of the changes Cisco has in store. Let’s take a look at some of the other stories businesses will want to pay attention to moving forward.

Cisco is currently field-testing an expanded version of Webex (formerly Spark) Assistant. Stemming from Cisco’s push into voice-activated AI, Webex Assistant will provide hands-free support during meetings, allowing attendees to mute pesky distractions, locate critical resources and more without lifting a finger. Cisco’s enhanced digital assistant will be widely available this summer.

Also coming soon is Webex Share, which promises to be the dongle key to end all dongle keys. Webex Share transforms ordinary HD televisions into Webex meeting spaces with the help of a small footprint device. Once plugged in, Share enables users to connect to the television and project their screen wirelessly, without the need to track down additional cables or connectors. Webex Share will be generally available this fall.

Next Steps: Explore the future of Cisco collaboration

Looking to learn more about how Cisco’s evolving collaboration toolkit could benefit your organization? Reach out to our team today by visiting: https://www.arrayasolutions.com//contact-us/. As always, you can leave us a comment on this or any of our blogs through social media. Arraya can be found on LinkedIn, Twitter, and Facebook. Once you’ve let us know what you think, follow us to stay updated on our industry insights and learning opportunities.

June 15, 2018 by Arraya Insights

The US government has a long and somewhat spotty record with IT modernization – but that could be about to change. Recently, one of its top offenders, the IRS, released a five-year plan that included, among other provisions, a proposal to begin sun-setting a critical application said to be “the oldest IT system in government.” The application in question is the IRS’s Individual Master File (IMF), a tool tasked with receiving taxpayer data and issuing refunds. That’s a lot to put on the IMF’s almost six-decades-old technical architecture. It remains to be seen whether the agency will actually receive the funding needed to carry out this blueprint. However, one thing seems clear; the IRS has plenty of company among those looking to upgrade their IT in the coming months.

In its IT Industry Outlook 2018, CompTIA predicted the global IT industry to grow at a rate of 5% in 2018. This is based, in part, on IDC’s forecast that global IT spend will top 4.8 trillion this year. Further supporting this growth projection is CompTIA’s IT Industry Business Confidence Index, which hit an all-time high during Q4 of 2018 and, despite a dip; it hovered close to that mark into Q1 of this year. Those figures show the appetite for IT modernization is there.

Without proper planning, however, it’s easy for that enthusiasm to go off the rails quickly. Then, instead of reaping the benefits of IT modernization, businesses could be forced to contend with ballooning expenses, elongating project timelines, unrealized goals – or all of the above.

Keeping modernization efforts on the right track

Are you one of the companies looking to join the IRS in potentially launching an IT modernization effort this year? Here are four tips to help you get off on the right foot:

  • Start with the “why” in mind. We’ve talked about this concept before on this blog, but starting with the reason behind a proposed upgrade is essential. IT can keep the focus on the “why” by crafting a narrative that demonstrates both a clear problem and the way in which a solution addresses it. This is the only way to win the support of folks whose eyes glaze over during presentations overrun with bits, bytes, and other jargon.
  • Conduct a full readiness assessment. Even the most heralded IT solutions can only live up to that reputation if their surrounding solutions allow them. IT must test to ensure the static pieces of their IT environment will play nicely with whatever latest and greatest solution is coming in. Otherwise, it could set off an unplanned-for chain of improvements and corrections – as well as expenses.
  • Involve stakeholders early on. Replacing one solution with another can certainly have an unexpected impact on the other tools in an IT environment. However, changes can also affect the end users who rely on those technologies. Time should be spent with these stakeholders on nitty-gritty tasks like scheduling minimally-intrusive downtime as well as on higher level, “How your job will be different/easier moving forward” conversations.
  • Split IT modernization efforts into phases. Maybe it’s because approvals for upgrades can be rare. Or, maybe it’s an attempt to treat modernization like removing a Band-Aid. Either way, the temptation is there to try to go big. Good intentions aside, this can lead to projects getting out of hand. Instead, during planning, IT should divide their efforts into manageable phases, allowing the team to maintain greater control.

Next Steps: Don’t pursue IT modernization alone

Another piece of good advice? Engage a partner with experience overseeing IT modernization projects, a team that knows the common pitfalls and how to avoid them. Arraya Solutions can be that partner. Our team has decades of experience overseeing these efforts for organizations of all shapes and sizes. Leaning on that expertise can keep projects on time and on budget.

Want to learn more about how Arraya’s team can help you modernize your IT environment? Visit: https://www.arrayasolutions.com//contact-us/. As always, feel free to leave us a comment on this or any of our blogs through social media. Arraya can be found on LinkedIn, Twitter, and Facebook. Once you’ve let us know what you think, follow us in order to stay updated on our industry insights and learning opportunities.

June 14, 2018 by Arraya Insights

Last week, over 200 technology professionals from across the mid-Atlantic region converged on the Sheraton Valley Forge in King of Prussia, PA for the 2018 Arraya Tech Summit. Now in its fourth year, the Tech Summit has become an annual source of insight into the present and future of IT. The day consisted of more than two dozen courses spanning topics such as data center, cyber security, cloud, and more. Each session was custom-built by Arraya’s engineering team to ensure a “by techs, for techs” experience.

Kicking off the Tech Summit was a keynote address from bestselling author Nate Fick. A former Marine Corps officer, these days Fick serves as a leading voice in cyber security. His address took a no-holds barred look at the state of cyber security today. “A dollar of offense,” declared Fick, “beats a dollar of defense almost every time.” Far from wallowing in doom and gloom, Fick offered the assembled technology professionals practical advice on how to defend their organizations, including by, as he puts it, “turning the map around” and thinking like attackers.

Following Fick’s address, attendees divided up amongst five breakout rooms to dive into the day’s course load. Cyber Security was a hot topic beyond Fick’s address. Sessions such as “You Can’t Patch People – Protecting Users from Themselves,” “Securing the Cloud: Don’t Assume Your Provider is Handling It,” and “Stop Cyber Attacks Cold: An Inside Look at SOC Operations” brought in crowds all day. However, security wasn’t the only subject on attendees’ minds. Courses on hyper converged solutions (“Realizing the Benefits of the Modern Data Center Through Hyper Converged Infrastructure”), Office 365 (“More Than Email: Tools That Maximize the Value of Your Office 365 Investment”), and Disaster Recovery (“Aligning Your Approach to Disaster Recovery with the High-Tech Risks of Today”) also earned plenty of attention.

This year’s event also marked the debut of the official Arraya Tech Summit app. Built by Arraya’s Application Development experts, the Tech Summit app featured course descriptions, schedules, and directions on navigating the Sheraton. The app also included an exclusive survey tied to the day’s unofficial theme: cyber security. Now that the Tech Summit has wrapped, the app will become a portal through which attendees can access presentation information.

Looking back at the 2018 Arraya Tech Summit – and ahead to the future

The day ended with a networking reception so attendees could follow up with presenters, visit sponsors, and network with other IT professionals. During the reception, Arraya CEO Daniel Lifshutz shared his take on the evolution of the Tech Summit and Arraya itself.

“When (Arraya CTO) David Bakker and I started Arraya Solutions roughly 19 years ago, we never envisioned an event like this,” Lifshutz said. “At the time, we were focused on creating an organizational culture and mission that blended technological expertise with a strong emphasis on customer service. Four years ago, we decided to try this and we’ve been blown away by the reception to it.”

Bakker added: “The Tech Summit gets bigger and better every year. We owe a lot of that to the hard work of our engineering and marketing teams. It’s also because of our attendees. It’s not easy for techs to spend a day out of the office, but our attendees are passionate about IT. They see value in what we’re doing here. Without them, none of this would be possible.”

Now that the main Tech Summit event has concluded, the Arraya team is taking it on the road. The Central PA Tech Summit will take place this Fall in Harrisburg, PA and will feature a subset of the 25 featured breakout sessions that were delivered last week. Details will be released in the coming weeks. Make sure to check https://www.arrayasolutions.com//events for the latest event information.

June 5, 2018 by Arraya Insights

People can be a business’s greatest asset, but they can also be its biggest cyber security liability. Cyber criminals are drawn to the path of least resistance and, when compared to today’s highly advanced security solutions, that’s often what users represent. Unfortunately, users have done little to diminish that reputation. Instead, many have developed bad habits that have only served to make them even more appealing targets.

Using data collected in Dell Technologies’ End User Security Survey, our team has compiled a list of nine all too common cyber security worst practices.

  • Accessing confidential data over public Wi-Fi. The risks of connecting to unsecured public Wi-Fi are plentiful and yet the message hasn’t connected with users. Despite the ease with which attackers can use these services to execute man-in-the-middle attacks, users continue to lean on public Wi-Fi. In fact, in Dell’s survey, 46% of respondents admitted to not just using public Wi-Fi, but using it to access company data.
  • Conducting work via personal email. IT teams can restrict the flow of information into and out of their company over corporate email. Personal email, however, is a different story. Yet, very nearly half (49%) of those surveyed said they conduct business using their personal accounts. This effectively shuts out those in IT tasked with keeping users and company data secure.
  • Emailing confidential data to those outside the company. Employees’ bad email behavior goes beyond blurring the lines between personal accounts and business workloads. Just under half (45%) acknowledged emailing sensitive files outside the organization. Even though controls exist for managing how data is handled, the risk of misuse remains high.
  • Taking information with them when they go. Far too often, when an employee leaves a company, he or she doesn’t do so empty-handed. Instead, 35% say it is routine to take data with them when they leave. While the exact nature of the data exiting end users are helping themselves to wasn’t specified, employers would likely prefer it to stay in-house.
  • Putting their faith (and company data) in over-the-counter cloud. For some users, Shadow IT has become a way of life. More than half (56%) said they use publicly available tools including Dropbox and Google Drive for storage and collaboration. It’s unknown whether or not they are aware of the dangers of this approach.
  • Seeing security as “somebody else’s problem.” First the good news: According to Dell’s research, 65% of employees see security as their duty. They believe it is up to them to educate themselves on threats and behave responsibly. What enters this into the domain of cyber security worst practices is the fact that 35% still see themselves as removed from their company’s security challenges.
  • Suffering from security overconfidence. Confidence is good, but too much can be hazardous. Dell’s study found just 22% of employees are worried that, someday, they might cause a cyber-attack or some other security disaster. In truth, any employee, regardless of position or age, could become a victim.
  • Failing to take training to heart. The majority of those Dell surveyed (63%) are required by their employers to attend cyber security readiness training. However, some are struggling to apply those lessons. Just under one-in-five (18%) engaged in unsafe behaviors post-training without realizing what they were doing was wrong. Furthermore, 24% knew their actions were unsafe, but carried on anyway.
  • Putting gut feelings ahead of policy. Far too often, employees are choosing to go with their guts instead of sticking to policies. Some 23% of those surveyed said they would share company data if the risk was low but the benefit was high. Others said they would share confidential data if they believed it would help them (22%) or the recipient (13%) do their job better.

Next Steps: Turning around cyber security worst practices

You can patch your systems, but you can’t patch your users. All you can do is give them the tools and support they need to navigate today’s cyber security climate. Want to learn how? Join us on June 7th for our annual Arraya Solutions Tech Summit. Now in its fourth year, the Tech Summit is a full day of deep dives into the technologies and trends shaping IT. We’ll cover disciplines such as data center, cyber security, cloud, and more. Members of our technical team present each session, guaranteeing a day “by techs, for techs.” This year, we’ve included a session titled “You Can’t Patch People – Protecting Users from Themselves.” During this session, attendees will learn how to better prepare their end users for today’s attack vectors.

Our Tech Summit is free, but registration is required. Visit: https://events.arrayasolutions.com/ to secure your spot today! Also, you can stay in the know about our latest Tech Summit news, industry insights, and future learning opportunities by following us on social media: LinkedIn, Twitter, and Facebook.

June 4, 2018 by Arraya Insights

Arraya Tech Summit Is June 7th circled on your calendar? It should be! That’s the date of the Arraya Tech Summit! Now in its fourth year, the Tech Summit has grown into our flagship event. If you haven’t joined us for a Tech Summit, it’s a full day of deep dives into the tools and trends shaping IT. This includes data center, cyber security, cloud, and more. Each of the day’s nearly two dozen breakout sessions will be presented by a member – or members – of our technical team, guaranteeing a “by techs, for techs” atmosphere. There’s also a keynote, networking opportunities and more. With so much going on, it can be tough for Tech Summit veterans and rookies alike to decide what to do next.

That’s where this post comes in. Even though you don’t have to pay to attend the Tech Summit, we realize it’s not exactly free. Time is a precious commodity these days, particularly for those in IT. So, if you’re going to invest a day with us, we want to make sure it’s time well spent. Here’s our best insider advice on how to do just that.

Insider Tip #1: Think hard and think ahead during registration

If you’ve already registered, skip ahead to our next tip. After the typical “getting to know you” registration inquiries waits a question that can have a substantial impact on your Tech Summit experience. Under “Other Information,” we invite registrants to identify the eight session topics that interest them most from a list of nearly two dozen choices. Take time to really consider the list, which includes topics like Analytics, Cloud Security, etc. While the majority of sessions will only be held once during the Tech Summit, a select group will be held twice and we use this question to help us determine which ones to repeat. If there’s something you think you want to see, check that box! Our experts agree, if your sessions are repeated, it makes planning your day that much easier.

Insider Tip #2: Make use of our new Arraya Tech Summit app

Forgive us for paraphrasing a nearly decade old ad campaign, but the Arraya Tech Summit? There’s an app for that. Our internal app dev team has been hard at work building out a new tool to provide attendees with course descriptions, a layout of the Sheraton Valley Forge hotel – our Tech Summit HQ – and much more. Our event survey will also live on the app so, at the end of the day, you can use it to let us know what you thought of the Tech Summit. The link to our new app should be in registrants’ inboxes soon!

Insider Tip #3: Get there early to catch our opening keynote

The keynote address is always a must-see Tech Summit moment and this year’s promises to be no exception. Nate Fick, a former Recon Marine officer now navigating the wilds of corporate America will kick off the day. Nate is a leading voice in the cyber security arena, specializing in the prevention of corporate hacking and data breaches. His unique approach to today’s top security problems involves “turning the map around” on attackers. To put it another way, Nate excels at viewing a business from the eyes of a potential hacker. Nate’s presentation begins at 9 a.m., so be sure to arrive on time to avoid missing any of his insights.

Insider Tip #4: Take advantage of networking opportunities

Even though each of our breakout sessions will end with a Q&A session, there’s not always time to get to every question. Or, it may not be possible for presenters to get too deep into specifics in order to accommodate questions from others. However, sprinkled throughout the day will be plenty of chances to connect with our experts in a more personal setting. In addition to a break for lunch and the cocktail reception, there are also additional morning and afternoon breaks. These free moments are great times to discuss questions or concerns more in depth. Of course, these breaks are also a good time to visit the exhibitor booths and check out what industry leaders like Cisco, Dell EMC and VMware have in store.

Insider Tip #5: Make it a social occasion

The Tech Summit is good on your own, but it’s better with a crowd! If you can come with a few members of your team, you can divide and conquer, taking in sessions that occur simultaneously and sharing notes later. You can also make it a social event by taking part in the conversation online. All day, Arraya’s LinkedIn and Twitter accounts will be recapping the action, sharing quotes and memorable moments from the day. You can keep up by following us on either site and monitoring #ArrayaTechSummit. Join in on the conversation by using that hashtag to share your own favorite moments or to submit questions to our team!

Insider Tip #6: The conversation doesn’t have to end when the day does

Tech Summit conversations don’t have to end when the event does. Instead, we encourage attendees to reach out to us and schedule a follow up meeting. These meetings are a great way to tailor the lessons learned during the Tech Summit directly to your organization’s needs. You can book your follow up during the Tech Summit or you can contact your Arraya Account Executive afterward.

Next Steps: Join us for the 2018 Arraya Tech Summit

Now that you’re ready to optimize your day, if you haven’t already, register for our 2018 Arraya Tech Summit. You can do so by visiting: https://events.arrayasolutions.com/. This year’s Tech Summit starts at 8:30 a.m. on 6/7 at the Sheraton Valley Forge in King of Prussia, PA. See you there!

June 1, 2018 by Arraya Insights

Arraya Insights Radio

Episode 8: Dell Technologies World 2018: Top Stories and Takeaways

Earlier this month, Arraya Solutions made the trek to Las Vegas for Dell Technologies World 2018 and came back just bursting with new insights regarding what’s here and what’s coming next from the Dell Technologies family, including our strategic partners Dell EMC and VMware. On this month’s episode, the Arraya Insights Radio crew discuss the top takeaways from the conference, paying particular attention to how those items will impact businesses.

Host: Thomas York (Director, Quality and Operational Excellence)

Guest: Ron Longley (Practice Manager, Data Center)

Further Reading:

  • Dell Technologies World 2018 Recap: 4 Need-to-Know Stories, by Arraya Insights
  • 5 Things Businesses Demand From End User Computing & How to Deliver Them, Arraya Insights
  • What We Learned About vSphere 6.7 at VMware EMPOWER: 5 Keys, Arraya Insights
  • Arraya Insights Radio: Simplifying the Complexities of Data Center Modernization, by Arraya Insights
  • Dell EMC Announces Key Unity, VNX EOL Dates: What Comes Next, by Arraya Insights

Theme Music: “I Don’t Remember (Yesterday)” by Hygh Risque

May 24, 2018 by Arraya Insights

Larger organizations are often seen as the ideal use case for SD-WAN technology – and they have flocked to it. In fact, almost three-quarters (74%) of mid-to-enterprise sized businesses acknowledged exploring SD-WAN in lab trials during 2017, according to a recent IHS Markit study. The prediction from IHS is that many of those businesses will soon move from testing to deploying SD-WAN. While the benefits are certainly there for those with a more robust headcount and budget, small to mid-sized businesses (SMBs) can still benefit from SD-WAN. In fact, SD-WAN can be a savvy play both technologically and economically for organizations of all sizes.

Let’s review some of the more common drivers behind SD-WAN adoption, none of which is size-restricted.

  • “We need to be more secure!” Cyber criminals aren’t picky. They’ll target one bigger company or a bunch of SMBs based on which option promises the path of least resistance. SD-WAN can make that path trickier by encrypting traffic as it travels across the WAN. Furthermore, it can enable micro-segmentation efforts. Through these security moves, SD-WAN can limit the damage a cyber crook can do if he or she breaches an organization’s exterior defenses.
  • “We need more control over our network!” As SMBs and enterprises grow more connected and more mobile, their networks are being taxed at a never before seen rate. SD-WAN solutions can grant IT greater control over the traffic crisscrossing their networks. IT can increase or decrease bandwidth as needed. This ensures IT has an active hand in network performance and keeps applications and tools functioning at a high-level.
  • “We need to embrace IoT!” The Internet of Things (IoT) is opening doors in terms of insights into process efficiency, organizational wellbeing, and more. Failing to take advantage of these new capabilities can put businesses at a severe disadvantage. SD-WAN can be the reliable, flexible foundation upon which IoT is rolled out. It can help prioritize and process the data churned up by these deployments, giving employees more efficient access to data.
  • “We need to be ready for anything.” SMB, enterprise, no matter the size, unplanned outages are always painful. As malware strands designed to destroy not steal become more prevalent, IT must work even harder to make sure their network will be there when called upon. In the event of an outage affecting a specific area, SD-WAN can reroute network traffic to still-available WAN links, allowing business to continue as issues are remedied.
  • “We need to rein in our technology spend!” Reining in technology spend and investing in new solutions seem to be at odds. However, SD-WAN delivers connectivity via the internet as opposed to often costlier multiprotocol label switching (MPLS). More affordable access plus greater data efficiency means optimal network performance and budgetary efficiency.

Next Steps: Discover the technologies behind SMB SD-WAN success stories

These are just some of the ways SMBs can use SD-WAN to solve their IT challenges. Want to learn more about the technology behind those use cases? Join us on June 7th for our annual Arraya Solutions Tech Summit. Now in its fourth year, the Tech Summit is a full day of deep dives into the tools and trends shaping IT. It covers disciplines such as data center, cyber security, cloud, and more. Members of our technical team will present each session, guaranteeing a “by techs, for techs” event.

This year, we’ve included a session titled “Building a More Secure, More Connected Organization with SD-WAN.” During this session, attendees can cut though vendor promises, taking a technologically-oriented look at SD-WAN. Our experts will document the how behind SD-WAN’s ability to optimize existing or new WAN links, deliver greater application resilience and performance, and cut operational costs.

While the Tech Summit is free, we do require registration. Please visit: https://events.arrayasolutions.com/ to secure your spot today! Also, you can stay in the know about our latest Tech Summit news, industry insights, and future learning opportunities by following us on social media: LinkedIn, Twitter, and Facebook.

May 22, 2018 by Arraya Insights

Rolling out a multifactor authentication (MFA) solution such as the one offered by Duo is a good way to reinforce a cyber security weak point: end users. That is, of course, unless users find this added security to be a productivity roadblock. Should that happen, they may attempt to circumvent it or petition upper management to torpedo the initiative.

Rather than end up back at the mercy of end users’ password prowess, IT must create harmony between them and an MFA solution. Here’s how you can lean on features built in to Duo MFA to accomplish just that:

  • Give users the freedom to choose.
    Secure doesn’t have to mean rigid. Duo allows users to select one of four device types to use as their authentication platform. Passcodes can be relayed via mobile phones, tablets, landlines, or security keys. The more freedom users have, the more likely they are to find an approach to MFA that fits them.
  • Make sure they have a backup at the ready.
    A lost or otherwise unavailable authentication device can send user blood pressure boiling. However, Duo lets users add an unlimited number of authentication devices to their account. This ensures if a primary – or even secondary – device is missing, users can still access the account they need.
  • Enable ‘One-Touch’ authentication.
    Entering in a lengthy MFA passcode can be a source of user frustration in and of itself. Duo Push ditches the code, using the Duo Mobile app to send push notifications directly to a user’s device. Once they’ve downloaded the app, all users need to do to authenticate is tap “Approve” when the logon request pops up on their screen.
  • Allow them to onboard and off-board devices.
    Despite the important role they play in users’ everyday lives, mobile devices come and go. Duo’s self-service capabilities enable end users to manage the flow of devices into and out of their lives, without roping in the support desk. Whether they lose a device or simply replace it, they’ll be able to delete the old one as an authentication option and add in a new one. Note: In order to do this, users will need at least one additional device set up to authenticate so that they can approve the transition.
  • Let them expand their horizons.
    Users want to be more self-reliant. They’d much rather at least attempt to solve an issue before passing it off to support – and this goes beyond onboarding and off-boarding devices. Duo features a comprehensive Knowledge Base to allow users to track down the root cause of issues. Fostering independence allows for faster resolution and lets users to feel more in control of and more comfortable with MFA.
  • Adjust policies based on end user work habits.
    Users are accustomed to doing things a certain way. As long as that certain way isn’t inviting in undue threats, IT can adjust Duo to accommodate them. Duo features a customizable slate of end user policies, including operating system restrictions, settings to prevent access from devices without a passcode-protected lock screen, etc. MFA admins should work with end users to catalog their preferences and, if possible, amend policies to ensure a positive experience.

Next Steps: More secure and user-friendly with MFA

Want to learn more about Duo and how MFA can help you build a more secure and user-friendly environment? Visit: https://www.arrayasolutions.com//contact-us/. As always, leave us a comment on this or any of our blogs through social media. Arraya can be found on LinkedIn, Twitter, and Facebook. Once you’ve let us know what you think, follow us to stay updated on our industry insights and learning opportunities.

Primary Sidebar

Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234    
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}