• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint
      • Network
      • Cloud
      • Application
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Arraya Insights

January 3, 2017 by Arraya Insights

In the wake of the holiday season, now that the bows and wrapping paper have been discarded, people likely have at least a few new high-tech toys to enjoy. It’s safe to assume those new devices vvv-0216-img_0973-304will find their way into their owners’ work routines sooner rather than later.

High-tech items were in high demand this year, according to a study by SquareTrade. It found Americans planned to spend more than $75 billion on electronics in celebration of the season of giving. Put it another way: More than 50% of those who participated in the study said their shopping lists included electronics.

So what did everybody buy? The study also looked at the most popular electronics to give and receive. Unsurprisingly, tablets were a hot item on both lists, but they weren’t the only mobile device to make the cut. The study showed:

  • 37% of people plan to give a tablet
  • 29% of people hope to receive a tablet
  • 24% of people would like to receive a smartphone

Also on the lists were devices such as televisions, gaming consoles, and even headphones. However, it’s less likely any of those devices will become IT’s problem come January.

Enabling and supporting a mobilized workforce

Is your IT team ready for the avalanche of new devices users will be bringing back with them as they return from the holidays? Here are a few helpful pointers to keep in mind on allowing employees to use the devices they want to at work without compromising security:

Tip #1: Just having a policy isn’t enough. It goes without saying that, if you haven’t yet developed a mobile device policy for users to follow, that should be a high priority in 2017. If you do have a policy, regularly circulate it – and where it can be found, e.g., handbook, intranet, etc. – among end users. This keeps it top of mind for veteran staffers and serves as a helpful introduction for new hires. It’s also important to make sure folks actually understand the policy. Small test groups are a good way to solicit feedback, but, if they’re not an option, remember to keep the policy as brief and jargon-free as possible.

Tip #2: Implement tools to support your policy. Once you have a policy that makes sense for IT and for end users, be sure to give it some teeth. There are plenty of secure mobility-enabling, policy-enforcing solutions on the market. These tools can help you secure data through encryption or by setting restrictions on who can access it – and what they can do with it once they have it. Furthermore, it’s critical for IT teams to consider tools which enable them to remotely wipe a device of sensitive info. This is vital in the event a device should go missing or the company parts ways with a device’s owner.

Tip #3: Separate your stuff from theirs. The data may be your responsibility, but the device is theirs. Sandboxing your business’ data and apps allows for the proper (and secure) separation between personal and professional data. That lets users maintain control over their brand new device while IT rests easy knowing the business is protected against being exposed to inadvertent risks by the employee.

Need help with mobility? Here’s where to turn

Struggling with BYOD and the proliferation of personal devices in the workplace? Arraya’s team can help. We’re ready to start a conversation about building BYOD strategies and implementing the tools needed to provide the secure enterprise mobility that’s rapidly becoming a necessity in many of today’s top workplaces.

Visit www.arrayasolutions.com/contact-us/ to open up a line of communication today. Or, catch up with us on social media: Twitter, LinkedIn, and Facebook. While you’re there, follow us to stay in the know about all of our latest special events, blog posts, and industry insights.

December 29, 2016 by Arraya Insights

From the rise of ransomware to the persistence of meddlesome and destructive hackers, the IT world made plenty of headlines in 2016 – and the Arraya Solutions team had front row seats through it all. We desk-calendar-shows-year-two-thousand-sixteen_zyhdnqdddecided to ask the members of our technical practice areas and our Managed Services team for their takes on the biggest stories from 2016. Here’s what they had to say:

Matthew Sekol, Microsoft Practice Manager

The biggest story from Microsoft in 2016 is Digital Transformation. Azure has become more than just a platform to do cool things, it (and Office 365) drive Digital Transformation. Before you think this is just the next latest buzzword, it really isn’t. We’re at an inflection point past the cloud now where the companies that survive are the ones innovating and differentiating themselves with technology. This will be the defining business movement for the next decade.

Jason Kline, Microsoft Cloud Solutions Architect

The biggest story out of Microsoft in 2016 was their investment and improvement in security offerings. In what felt like overnight, Microsoft became a major security player. This in large part is because of a changing digital landscape where identity has become the new security perimeter. Who better to help us protect ourselves than a company fielding billions of authentications a day and delivering security centered around what they learned from that experience?

Thomas York, Director, Delivery and Project Management 

Our Managed Services team saw a massive uptick in managed network (security) opportunities. It was obviously top of mind for many of our customers and prospects during the past year.

Kevin Taggart, Team Lead, Network Services

One of the biggest stories to come out of 2016 in my focus area was Cisco AMP for Endpoints, which is an anti-malware client that can replace conventional AV. Another key development was Cisco’s Defense Orchestrator, which is designed to make it easier to manage security policies across Cisco security tools.

Ron Longley, Data Management Practice Manager

I think the merger of Dell and EMC was the biggest Data Management story of 2016. While we’re still waiting to feel the full impact of this move at Arraya, the early returns have been positive, including the introduction of several new options to VxRail 4.0, the newest version of EMC’s hyperconverged solution. Long term, it’s certainly exciting to see the portfolio growth this union will spur as well as the innovation it drives.

Robert Whann, Director, Managed Services Operations

The biggest development in 2016, not surprisingly, was the push to leverage Managed Services for two of IT’s biggest focus areas: security and cloud management.

Rajasekar Shanmugam, Team Lead, Network Services

Cloud is the way of the future and the present. Transitioning to the cloud is critical for companies large and small. But not every company is ready to move everyone and everything to the cloud. We want customers to transition to the cloud when and how it makes sense. The Cisco Spark Flex Plan helps us do that. In a single contract, the Cisco Spark Flex Plan lets you choose cloud, on-premises based services, or a little of both. Change your mix at any time; the price stays the same.

  • For meetings, choose from cloud-based Cisco Spark Meetings, WebEx, or the recently announced on-premises Cisco Meeting Server.
  • For calls, choose either Cisco Spark call or a Cisco Unified Communications Manager-based option.

Ryan Benner, Vice President, Enterprise Infrastructure

I’d say the biggest technology story of 2016 was the Dell and EMC merger. We’ve never seen an acquisition of that size before and the end result is a true tech behemoth. The implications of this move remain up in the air, but without a doubt, the impact is going to be far-reaching.

Halim Chtourou, Team Lead, Virtualization

From a product standpoint, VMware’s biggest releases in 2016 included Horizon 7, vSphere 6.5, AirWatch 9.0 and the continued evolution of their Workspace ONE platform. The Horizon platform saw the release of Horizon Air Hybrid Mode – for the management of on-prem desktops and apps through a lone cloud control pane  – and the Blast Extreme Protocol, for an improved user experience. AirWatch 9.0 added unified endpoint management, including support for Windows 10 devices, as well as support for management of wearable devices including augmented reality and virtual reality glasses, sure to be big hits in manufacturing, education, healthcare and other environments. For a roundup on what was new in vSphere 6.5, click here.

Jeremy Rupczyk, Senior Solutions Engineer

The release of Instant Clones definitely was one of the biggest VMware stories in 2016. This feature allows admins to deploy thousands of virtual machines (VMs) in minutes, whereas it could take hours previously. Besides the time-savings, it takes workloads off of vCenter, enabling faster and more efficient VMs.

Also, the introduction of Workspace ONE is worth talking about in the context of last year’s top VMware stories. This solution blends Identity Manager and AirWatch Enterprise Mobility Management to provide employees with secure access to the apps and data they need, from wherever they are, on any device.

Have more to say about the year in tech?

Have any questions about our top takeaways from 2016? Have a few of your own you’d like to share? Our team can be reached at www.arrayasolutions.com/contact-us/. They can also be reached through our social media presence: Twitter, LinkedIn, and Facebook. Be sure to follow us for all of our latest blogs as well as alerts about upcoming special events.

December 28, 2016 by Arraya Insights

I started at Arraya in 2015, finding myself becoming a consultant and leaving IT for the first time in 16 years. In the interview, I asked what the next thing beyond Office 365 was. The context was futuristic display: Cloud computing touchscreen interfacethat, eventually, companies will be moved to Office 365 and that work will dry up. The answer I received was that there’s always something new coming around the corner and that we have to just look for it. It was little comfort then, but turned out to be very prophetic.

From companies as small as 15 people to organizations in the tens of thousands, we do a lot of Office 365 migrations at Arraya. Not everyone is there yet, and we see it progressing steadily over the next few years. Now two years into my tenure here, we’ve already started adding more to our Microsoft portfolio as Microsoft has grown.

There’s always been on-premises and Azure IaaS work, but we’ve added Enterprise Mobility + Security, which extends the identity and security of Active Directory out to the cloud. More recently, we’ve added the Operations Management Suite to our portfolio, helping customers streamline IT analytics and provide data protection with backup and disaster recovery solutions.

We’re at the point again though of asking: “What’s next?”

Say what you want about 2016, but this was the year that the cloud hit the main stage. We saw plenty of companies accept Office 365 as the next evolution of messaging and collaboration without the traditional hesitation that has held them back. Something even more profound happened though. For the first time, the cloud was brought into the mainstream and its potential was solidified to business users.

The potential of the cloud has been known to developers for years. Developers have been unshackled by limitless resources and capabilities that could not be replicated easily on-premises. IT began to see the potential as well with operational, management and security analytics that also could not be done with on-premises technologies.

In 2016, Microsoft started talking about the cloud in a different way. While commodity services for collaboration and IT management are important and have their benefits, that isn’t the real power of the cloud.

Welcome to the year of Digital Transformation.

Satya Nadella laid down the foundation of this to businesses at Ignite way back in May 2015 when he stated that every company will be a digital company. The quick elevator pitch definition is the way companies use technology to differentiate themselves in the marketplace both internally and externally. This is an idea though that can ensure the sustainability of your business, but what does it really mean?

If you take away one message from this article, it should be that the cloud is now the vehicle by which companies can solve their business challenges, not just upgrade to the latest platforms.

Companies that leverage cloud-based technologies to solve business problems will be the ones that survive. Whether your company is struggling with communication and needs a better collaboration platform or is facing complex business challenges that impact the bottom line quarter after quarter, the cloud can likely be the answer.

I’m issuing a challenge in 2017 for all IT staff and business owners. This is the year both sides can come together to solve your business challenges through technology. This is the year to shift IT from the endless cycles of upgrades and maintenance to one of business drivers and security. Open up communication channels in your organization and realize that no longer are these challenges insurmountable.

Depending on your organization, this isn’t an easy discussion to start. Arraya Solutions understands the cloud and how you can use it to solve business challenges. We can help you navigate what’s possible in the cloud and balance it against your company’s unique needs. Just reach out to your Arraya rep or mssales@arrayasolutions.com to schedule a meeting.

December 22, 2016 by Arraya Insights

It’s a simple concept, right? You want people to be able to work from anywhere, while securely authenticating them to resources both internal and in the cloud and not storing passwords in a sign-in-computer-key-in-blue-showing-website-login_fyrb2fp_cloud service. You want to do all of that without creating new headaches for IT. It’s a common goal for many organizations, but the process to accomplish it has not been simple. Enter two new features of Azure AD Connect, Microsoft’s connection tool for Azure AD and on-prem AD.

On December 6, Microsoft announced the public preview of two new Azure Active Directory Connect features: Pass-Through Authentication and seamless Single Sign-on (SSO). You might be thinking, “They sound familiar, why is this important?” Well, the names do sound familiar, but these two new features are a huge step forward in the management and security of Azure AD in conjunction with on-prem Active Directory.

Pass-Through Authentication

No longer is it a required part of AD architecture to have passwords stored in Azure AD in order to authenticate domain users in Azure. With Pass-Through Authentication, a user makes a request to Azure for a resource, and their password is checked against the on-prem AD. How is this accomplished? Using a simple setup of the Azure AD Connect tool, which handles the account synchronization between Azure and on-prem AD. Now, instead of doing a password sync to Azure, the tool can directly and securely (via https connection) query the on-prem AD to perform the password check and return the result. At no time is the user’s password cached in Azure. The other great benefit to this new authentication model is AD Federation Services are no longer required to sync Azure with on-prem AD. Removing this step greatly simplifies the process of extending AD into Azure and Office 365! Don’t forget that Office 365 uses Azure AD as its authentication database. By adding one small button to the AD Connect tool, using on-prem AD with Office 365 just became simpler.

Single Sign-On

Single Sign-On has existed in Azure AD for a long time. If you wanted to connect to Salesforce.com, Google, or Facebook, Azure AD could easily tie in, making the end-user experience seamless. But when it came to the largest corporate authentication database in use, Active Directory, this feature didn’t exist. A user in an on-prem AD environment couldn’t access Office 365 without additional prompting for credentials, regardless of the level of account/password synchronization in place. This meant that users of Microsoft’s own products were not getting the same user-friendly experience that was provided to users of third-party systems. Before SSO, the only way to avoid this was to use Azure AD Join, which, while great, is not something every organization is prepared for yet.

Now, Azure SSO for Azure AD Connect simplifies the user experience for single sign-on for Office 365 and Azure-based applications and resources, while also simplifying management and control of the infrastructure. No additional infrastructure is required to provide this service, beyond the simple Azure AD Connect tool. Combine this feature with Pass-Through Authentication and password sync/management in Azure is gone!

Learn more about what’s new in Azure AD

These two new features are another step forward in Microsoft’s security and identity story, which continues to rapidly evolve as the lines between the cloud and on-prem continue to blur. Arraya Solutions can help you with this story, beginning with our Enterprise Mobility + Security Pilot, which includes Azure Active Directory Premium. To discover if EM+S is right for you, reach out to Arraya’s Microsoft team today at mssales@arrayasolutions.com.

They can also be reached through Arraya’s social media accounts: Twitter, LinkedIn, and Facebook.

December 20, 2016 by Arraya Insights

Effective cybersecurity requires a team of systems to pull together, and just like with any team, this one is only as strong as its weakest link. In many networks, that weakest link is Layer 2 of the Two competitors pulling a ropeOSI model, aka, the data link layer. Since the different layers in OSI work independently of each other, if one layer is compromised, it can affect others without them ever knowing something has gone wrong. Considering that impact, Layer 2 is certainly worthy of some extra attention.

The thing is, many organizations already have features in place to mitigate some of the more common attacks levied at Layer 2. These features come standard in certain Cisco switches, they just need to be turned on. Despite that, we still see organizations falling victim to these attacks.

Why? In some cases, organizations simply may not know about the features. Others may have overestimated the time and effort required to activate them.

Securing Layer 2 against common attack types

In truth, there’s no reason to overlook these features. The risk to businesses is far too great. Let’s take you through four common Layer 2 attacks and outline what a business can do to stay safe.

MAC Attacks

Anatomy of an Attack: During a MAC attack, a switch’s Content Addressable Memory (CAM) table is targeted. These tables store data such as the MAC addresses available on a port and their associated VLAN parameters. CAM tables have a fixed size, meaning they can only house so much information. Attackers attempt to exploit this during a MAC attack by flooding the CAM with random source MAC and IP addresses. Once the CAM table on a switch reaches its limit, traffic floods out to adjacent switches, filling their CAM tables as well and continuing to overload the network.

Countermeasures: Admins can use switch port security limits to restrict the amount of MACs on an interface. This allows them to set a cap on the number of MAC addresses a port can learn. That cap is up to the admin, provided it won’t overflow the CAM table. Timers can be placed on how long a MAC address will be bound to a port. If a port comes across a MAC address that falls outside of its accepted parameters, it will ignore it. The port will then lock itself down and send out an alert about the malicious traffic.

VLAN Hopping

Anatomy of an Attack: A VLAN Hopping attack takes place in instances where there are multiple VLANs going over one trunk port. The attack itself can occur in one of two ways. The first involves an end station acting as a switch and as a member of multiple VLANs, as opposed to one like a typical access port. This gives it access to all data crossing the VLANs. In the second type, called a Double 802.1Q Encapsulation attack, a second and fraudulent tag is placed on a packet, identifying it as destined for a VLAN other than the one it was meant to be on. This allows it to monitor and interact with the traffic offering on that second VLAN as well as the one it’s supposed to be on.

Countermeasures: There are a number of countermeasures that can be taken at the switch level to prevent the attacks that fall under the designation of VLAN Hopping. For example, admins could require the use of a dedicated VLAN ID for all trunk ports. They could also disable unused ports and house them in an unused VLAN. Disabling auto-trunking on user-facing ports – turning DTP off – can also help.

DHCP Attacks

Anatomy of an Attack: DHCP attacks are a version of a man-in-the-middle attack where a server is set up to act as an intermediary between a client and a DHCP Server. This intermediary could be either a legitimate server that simply has yet to be approved or it could be a rogue server set up by malicious outsiders to intercept sensitive data. In order to keep the ruse going for as long as possible, the rogue server would pass data along to its intended destination after intercepting it.

Countermeasures: Stopping DHCP attacks involving a rogue man-in-the-middle server requires an approach known as “DHCP snooping.” This feature separates requests into two groups: trusted and untrusted sources. Trusted sources are located behind your firewall, including things like your own switches, routers, and servers. Untrusted sources are located outside of that firewall and can include things such as unknown DHCP servers or anything else that could be used by cybercriminals to launch an attack. Requests from untrusted sources are filtered out and that information is stored in a database. Should a request come in from that source again, DHCP snooping will know exactly how to handle it.

Spoofing Attacks

Anatomy of an Attack: Spoofing attacks are just what they sound like: attackers try to act like something they’re not in order to carry out their malicious activities. Spoofing attacks are commonly directed at either MACs or at IPs. Cybercriminals target MACs with a spoofing attack in order to gain network access or to take over the identity of someone already on the network. Meanwhile, IP-targeting spoofing attacks can be used to launch a flood of fraudulent traffic at a switch in an effort to overwhelm it and take it offline.         

Countermeasures: The method for defending against attempts at MAC or IP spoofing is called IP Source Guard. This feature can be activated to monitor for both MAC and IP spoofing, or one or the other. For IP Spoofing, Source Guard will use information contained within the DHCP snooping database to quickly identify known threats, so that feature must already be turned on for this to work. For MAC spoofing, Source Guard must have access to an Option 82-enabled DHCP server, one which router configurations have been altered to support. Once activated, this feature can sniff out IP/MAC spoofing attacks.

Gain a partner in the fight against cyber crime

Want to learn more about these attacks or others which target Layer 2? Arraya’s Network and Security team stands ready to help. Our engineers have decades of experience building, supporting, and securing networks for businesses in all industries. They can walk you through these attacks in more detail and help you gain access to the features and tools you need to ensure your business’ data stays safe.

Start a conversation today by visiting: http://www.arrayasolutions.com/contact-us/. Our team can also be reached through social media: Twitter, LinkedIn, and Facebook. While you’re there, click the Follow button so you can stay in the loop with all of our latest blogs, special events, and industry insights.

December 19, 2016 by Arraya Insights

Recently, Arraya gave folks who were unable to attend Microsoft’s Ignite conference back in September a second chance to immerse themselves in the tech giant’s world. Speakers from both Arrayamini-ignite-microsoft-event and Microsoft were on hand at Microsoft’s Malvern, PA offices to showcase Ignite highlights, upcoming releases, and more. This new event, which was billed as a “Mini Ignite,” ended up being anything but as quite a lot was packed into the half-day session.

Matt Sekol, Arraya’s Microsoft Practice Manager, kicked off the day with a brief presentation on digital transformation and how technology can be used to let a company innovate within itself and help a business stand out in a crowded marketplace.

“I wanted to encourage today’s attendees to think of everything you hear today against the backdrop of this message of digital transformation. It is how you apply these technologies that drive this innovation,” Sekol noted.

Following his opening presentation, Sekol turned things over to Jason Kline, another member of Arraya’s Microsoft Practice. Kline, who is one of Arraya’s Microsoft Cloud Solutions Architects, spent the bulk of his time covering the new security features that can be found in Windows Server 2016. This included discussing how businesses could benefit from features such as Credential Guard, Device Guard, just in time and just enough administration, among other new developments.

In addition to Windows Server 2016, Kline also touched on improvements made to System Center and Azure’s Advisor preview. This second item is being rolled into Azure subscriptions to give businesses access to best practices and recommendations for handling Azure workloads. The goal being to help businesses consume Azure more effectively.

After Kline, it was Microsoft’s turn at the wheel as they sent three straight speakers to the podium. The first of these was Lee Cox, a Cloud Solution Architect who specializes in developing and delivering cloud architecture with tangible business impacts. Cox’s session was devoted to the how and why behind Microsoft’s hybrid strategy, focusing specifically on Azure Stack.

“Azure Stack is interesting because it gives users the same experience onsite that they may already be used to from working in Azure,” Kline said of Cox’s presentation. “It looks and feels like working in the Azure cloud but it lives on prem.”

Following Cox was Karl Rautenstrauch, a member of the Azure Global Black Belt team with a focus on Hybrid Storage workloads. Rautenstrauch’s session reviewed the ways in which cloud storage can help businesses reduce cost, mitigate risk, and improve time to market. During his presentation, Rautenstrauch laid out how Azure, specifically tools such as Azure Site Recovery, can augment corporate backup and recovery strategies by moving workloads off-prem and into the cloud.

The final Microsoft speaker of the day was Sergey Tsygalnitsky, a Cloud Solution Architect focused on cybersecurity, the impact of digital transformation, and the evolution of cyber threats. Tsygalnitsky’s presentation analyzed how modern cybersecurity risks have grown alongside our reliance on technology – and how Microsoft is uniquely positioned to address those risks.

“Traditionally Microsoft hasn’t been thought of as a security vendor,” Kline said. “However, as Sergey pointed out in his presentation, Microsoft has a full suite of impressive products that are out there changing that perception.”

Tsygalnitsky may have been the final Microsoft speaker of the day, but he wasn’t the final one overall. Instead, the task of closing out the day went to Sekol, who used his time to cover the importance of collaboration in a modern business environment and how Office 365 has been enhanced to make working together easier for end users to do and for admins to manage.

Here’s a quick fly-by of some of these changes:

  • Sekol explored the new Admin Center, which has been revamped to make new features or common tasks easier to find and access.
  • Next up were Outlook upgrades, including the simplified ribbon and toolbar, increased platform flexibility, the next iteration of Modern Attachments, and improved calendar-syncing.
  • Groups and Teams were compared and contrasted, as were the kinds of scenarios that call for one of these toolboxes versus the other.
  • My Analytics, which analyzes a person’s work habits, including emails, meetings, etc., was examined. “This tool sees the behavior patterns in how you work,” Sekol said. “That can be surfaced back to you so you can make the most out of your workday.”

Catch up on the latest news and releases from Microsoft

Say you missed Ignite in September and missed our (not-so) Mini Ignite. It’s entirely possible as Ignite was sold out and seats at Mini Ignite were in such high-demand that the event had to be wait-listed. Does that mean you’re out of luck if you still want a guided tour through everything that’s going on with Microsoft lately?

Not at all. First, click here to take a look at the presentations from Ignite that inspired our team as they put together the agenda for Mini Ignite. Next, email us at MSsales@arrayasolutions.com or visit us at www.arrayasolutions.com/contact-us/ to start a dialogue with the members of our Microsoft Practice.

Of course, our team can also be reached through social media: Twitter, LinkedIn, and Facebook. Be sure to follow us to stay in the know about our upcoming events, our latest blogs, and our take on some of the industry’s biggest hot button topics.

December 16, 2016 by Arraya Insights

During the last year, the Arraya team has had dozens of conversations with manufacturers representing a fairly diverse cross section of the industry. Very often, regardless of their focus, these Big plant for processing scrap metal. Huge factory old metal refiner. Blue roof of the factory building. Exhaust pipes, radiators, cooling industrial units as well as office buildings.companies have reported being plagued by similar sets of technology challenges.

The frequency with which these issues come up inspired us to put together a post to help manufacturers start finding solutions. With that in mind, here are six of the most common technology difficulties as reported by today’s manufacturers:

  • Securing the manufacturing network. It’s difficult to start any technology conversation without having it detour through cybersecurity. Considering the cost of downed equipment, it’s no surprise organizations are looking more closely at topics like availability and uptime, especially as they relate to cybersecurity risks. Developing and executing a strategy to keep those risks out is essentially a full time job on top of IT’s other responsibilities.
  • Connecting equipment – old and new. As new machines are brought in, they must be connected to the corporate network. Meanwhile, older machines must be retrofitted with the latest technology to provide consistent access to data. Conversations around these projects tend to have a very large scope and few organizations have in-house expertise in every piece of them. If the right outside experts aren’t brought to the table, it can lead to dangerous blind spots.
  • Managing the proliferation of mobile devices on the plant floor. Clipboards are out, tablets and other mobile devices are in. This transition has been driven by the need for real time analysis, increased efficiency in data entry, and more collaboration between line workers, QA, shift supervisors, etc. The advantages offered by high-tech clipboard replacements are numerous, but they do require manufacturers to take another look at what they need from wireless networks in terms of performance and security.
  • Providing remote access to machine-builders. Typically, no one knows a piece of equipment better than the company that made it. So, should something break on the production floor, the machine-builder is likely the best place to turn to get it corrected. Leveraging the specialized know-how of a machine-builder by enabling remote access to a machine can move this process along, saving valuable time. Once created, that entry point will need to be secured against hacker-induced downtime, intellectual property theft, and more.
  • Increasing visibility into the entire product lifecycle. Minimizing the damage inflicted by quality issues necessitates catching and remedying them as early and as thoroughly as possible. If something goes wrong with a product, manufacturers need a stockpile of sensor-collected data concerning which supplier provided the component parts, which machine built a product, etc. This must be analyzed quickly to isolate and identify other potentially-affected lines and runs, keeping those products out of customers’ hands.
  • Supporting Overall Equipment Effectiveness (OEE) initiatives. There was a time when machines could be serviced on a calendar-basis, e.g., every six months. In today’s OEE-focused climate, predictive maintenance is a must. Manufacturers must be able to track data concerning when their equipment is busiest and when the wear-and-tear is the worst and adjust maintenance schedules accordingly. This goes a long way toward ensuring optimum performance and efficiency for the duration of a machine’s life cycle.

Reap the benefits of a connected business

Do the above challenges sound familiar? At Arraya, we work every day with manufacturers of all sizes and specialties to help them overcome those obstacles and more using Internet of Things (IoT) and Connect Manufacturing-powered solutions. We’ve assisted a variety of customers on their journeys, including the largest single-site manufacturer of its type as well as the largest privately-held manufacturer of its type. In each case, IoT and Connected Manufacturing technologies provided the highly-secure connections, access, and data the companies needed to enhance their quality and efficiency scores.

Is your organization experiencing a challenge that’s not on our list? Interested in starting a conversation on Connected Manufacturing or IoT? Reach out to our Manufacturing Practice today at www.arrayasolutions.com/contact-us/. Our team has the experience and the knowledge to work with you to minimize obstacles and bring your goals within reach.

Also, keep up with our latest blogs and industry insights, as well as ensure you’re among the first to know about our special events, by following us on social media: Twitter, LinkedIn, and Facebook.

December 9, 2016 by Arraya Insights

Dell EMC’s VxRail appliance isn’t even a year old yet, but it’s already had a major effect on the world of hyper-converged infrastructure. With 123% quarterly growth and more than 3800 nodes Woman in computer room thinkingdeployed in 90+ countries, VxRail and its subsequent updates clearly have caught on with businesses looking to optimize their VMware environments.

Here at Arraya, we’ve long touted VxRail as a smart path to a more efficient and modern data center. Our opinion hasn’t wavered with the debut of VxRail 4.0, which was unveiled at Dell EMC World back in mid-October. In fact, this latest release has reinforced our view of the solution’s value.

So, what’s new in VxRail 4.0? Or to put it another way, if your business doesn’t number among those who’ve already embraced VxRail, why start now?

The best of what’s new from VxRail 4.0

Let’s dig in to this new offering from Dell EMC to answer those questions and more.

  • Reaping the benefits of the Dell and EMC merger. The combined might of Dell EMC is on full display with VxRail 4.0. This new release adds Dell PowerEdge servers into the mix, expanding the types of environments that can benefit from VxRail. The newly-extended portfolio of solutions now includes:
    • G Series – A general purpose appliance sporting up to four nodes in a lone 2U chassis, available in all-flash or hybrid configurations.
    • V Series – A VDI-optimized appliance with one node per 2U chassis, the V Series is meant for graphics-heavy deployments and is available in all flash or hybrid configurations.
    • S Series – A storage-dense appliance with one node per 2U chassis, the S Series is meant to contend with virtual apps such as SharePoint, Exchange, or to support big data and analytics capabilities. The S Series is only available in hybrid configurations.
    • P Series – An appliance with one node per 2U chassis designed to support performance intensive environments, such as databases. The P Series is available in either an all-flash or hybrid configuration.
    • E Series – An entry-level appliance with one node per 1U chassis, the E Series makes sense for organizations on a budget looking to support small or remote deployments with either hybrid or all-flash configurations.
  • Start small and scale up as needed. VxRail isn’t just more flexible in terms of what you can use it for, it’s also more flexible in terms of how you get started. VxRail 4.0 now offers three-node entry point, which allows businesses to start with just three nodes while giving them the option to scale up to 64 nodes per cluster. This makes it easier and more affordable for organizations to jump on board. VxRail is based on vSphere and Virtual SAN software and built on Intel’s Broadwell processors, meaning that scalability is non-disruptive. The “pay-as-you-grow” approach enables technology investments to grow naturally, as the business does, without the need for a lot of upfront planning and prognostication.
  • Stay confident your data will be there when you need it. VxRail appliances are supported by a variety of proven backup and recovery applications, ensuring business continuity. This safety net includes VMware Data Protection, which is deployed as a virtual appliance with 8TB capacity, and features the vCenter web client management customers already know. There’s also RecoverPoint for VMs, which provides vSphere protection at a granular level. If the built-in options aren’t enough, businesses can extend VxRail’s backup and recovery capabilities with Data Protection Suite and Data Domain/Data Domain Virtual Edition.    

A by the numbers look at VxRail 4.0

Our team has already seen the benefits our customers have enjoyed as a result of their VxRail deployments and we see even bigger and better things coming from VxRail 4.0. When combined with the features highlighted above, the following numbers show why we’re so confident:

  • 250x more configuration options
  • 25% less expensive entry
  • 2x the flash storage
  • 40% better CPU performance

If you’d like to learn more about VxRail 4.0, or you’d like to start a dialogue with the Arraya team of data management experts, please visit: www.arrayasolutions.com/contact-us/. Our award-winning team will be more than happy to discuss your goals and objectives to help you find the right solution for your business.

Want to keep up with our latest blogs and industry insights, as well as ensure you’re among the first to know about our special events? The best way to do so is to follow us on social media: Twitter, LinkedIn, and Facebook.

December 7, 2016 by Arraya Insights

It’s hard to believe, but in just a few short weeks, we’re all going to have to get used to writing and saying 2017. Before we do, we’ve still got some time to say goodbye to 2016. This past year has Desk Calendar Representing Year Two Thousand Seventeenbeen historic for Arraya. We spent another year continuing to grow and advance as a company and we had many memorable moments along the way.

It’s impossible to talk about 2016 highlights without first mentioning Arraya’s two flagship events: the Tech Summit and our Open House. Back in June, we held our biggest Tech Summit yet, packing in more classes and learning opportunities for attendees. Then, on a unseasonably beautiful day in late October, we welcomed customers to our corporate headquarters for a day of tech-talk and relationship-building during our Open House.

These two events couldn’t be more different, and yet, they complement each other so well. The structured, engineering-focused Tech Summit and the more relaxed, relationship-driven Open House speak perfectly to what my business partner David Bakker and I have sought to create. When we first started Arraya, we envisioned a company capable of not only straddling the boundary between the tech side and the human side, but one which delivered world-class service in each area. The parallel success of these events is a testament to the legitimacy of our vision as something customers demand.

That vision was further validated by the diverse collection of industry awards and recognition we compiled this past year. Among the highlights regarding our technical know-how: We are extremely proud to have been named Partner of the Year for the Americas East Region by Cisco at their annual Partner Summit. We also are honored to have received Dell EMC’s Partner Services Quality Award and to be named to three CRN lists: Solution Provider 500, Tech Elite 250, and the Managed Service Provider 500.

As for our people skills, we were once again named as one of Philly.com’s Top Workplaces based on feedback provided by our employees. This is a feat we hope to repeat for a third time come the new year as we believe the way our employees feel about Arraya has a direct impact on the way our customers see us.

Arraya’s emphasis on giving back was in full-force during 2016. I’m always blown away by the generosity of Arraya’s team members in terms of the time, energy, and financial support they’re willing to give to a great cause. For another year, we were well-represented at the Muckfest (supporting MS research) and the Simon Says Run 5K (supporting the prevention of sudden cardiac arrest in children). These events are an excellent opportunity to bond as a team while doing good for our community.

What does the future hold for Arraya?

Last year wasn’t just a great year for Arraya, it was our best ever. Despite the success, I’m not hesitant to let 2016 go. Instead, I see even more great things coming our way in 2017. Driving that will be our increasing commitments to areas such as Security, IoT, Hybrid Cloud and our award winning M&A in-a-Box solution. These areas have already been a big part of Arraya’s past and – considering the value they provide and their growing importance in today’s business landscape – we see them as being a big part of our future, as well.

In acknowledging Arraya’s success over the last 12 months, I’d be remiss not to mention the role our customers, our strategic partners, and our team members have played. To our partners, thank you for your commitment to innovation which, in turn, allows us to provide our customers with solutions that are truly best of breed. To our employees, thank you for your hard work and dedication. And to our customers, thank you for sharing in our passion for technology and enabling us to do what we love.

We look forward to working with all of you toward another excellent year in 2017!

December 5, 2016 by Arraya Insights

The end of support dates for a pair of popular VMware offerings came and went not that long ago. Businesses who’ve already upgraded – or at least have plans in place to do so – should have littleArrows Pointing Up On Laptop Shows Progress And Improvement to worry about. For those who have yet to set this process in motion, we’re going to take you through what is no longer being supported and what your upgrade path looks like. This way we can help you avoid the security and performance issues that can strike now that VMware has sent its final patches and updates for the following solutions.

vSphere 5.0 and 5.1

August 24, 2016 marked the end of general support date for both vSphere 5.0 and 5.1. These solutions had a strong run for roughly half a decade, however, the end is here. If you haven’t upgraded your vSphere 5.0 or 5.1 deployments quite yet, Arraya’s Virtualization Team can help.

Just over a month ago, VMware debuted the most recent addition to the vSphere family: vSphere 6.5. It’s true that, if under current support and subscription, customers can upgrade directly from a 5.x license to a 6.x license. However, with older versions – such as 5.0 and 5.1 – a multi-step process will be necessary (5.0 to 5.5 to 6.5, etc.). Hopping from one upgrade level up to the next would also be required in cases where certain additional features are in play, such as Site Recovery Manager or in the event of certain aging hardware dependencies.

Why vSphere 6.5?

The advantages of upgrading off of unsupported versions of vSphere are clear. What about upgrading all the way up to 6.5? What about this latest solution makes it a worthwhile landing point for businesses running previous versions?

– A simplified, more efficient vCenter experience. As part of vSphere 6.5, the vCenter Server Appliance has undergone a number of enhancements designed to make it more foundational. Features such as host management and Update Manager, which used to call for interfacing with multiple components, can now be performed by the vCenter Server Appliance itself. This eliminates the need to build and maintain complex environments and can result in a 2x increase in scalability and a 3x increase in overall performance. Besides the reduced management complexity and performance gains, it can cut expenses as IT will no longer be on the hook for purchasing multiple licenses from additional vendors.

– Intelligent, hands-free failover. The vCenter Server Appliance now features active/passive configuration with a third component acting as a witness. This set up allows failover to be executed and vCenter to be back up and running within five minutes of an incident. This will all take place without intervention from IT.

– Outage prevention. vSphere 6.5 also has the ability to perform Proactive High Availability. This detects when a host is in danger of failing and reallocates VMs accordingly. This stands in contrast to older methods which required a host to fully fail before failover would be initiated.

– Modern user interface. One particularly anticipated change coming to vSphere 6.5 is the new HTML 5-based user interface for its web client. This was done in order to make the graphical display easier to navigate and more user-friendly. Follow that thread to its conclusion and you get one more way in which vSphere 6.5 is designed to put time back in the hands of admins.

– Enhanced VM security. In vSphere 6.5, admins will be able to perform encryption at the VM level, including setting policies for VMs in motion and at rest. Also new is the ability to encrypt vMotion data. Previously, the best practice for securing vMotion data was to keep it on an isolated network. The ability to encrypt makes this more complex arrangement unnecessary.

– In-depth change tracking. Also new in terms of security are vSphere 6.5’s enhanced logging capabilities. Logs now provide additional data covering the changes made to a system. In addition to tracking changes, admins will also have access to who made the change and a full look at any settings that were altered in the process. This provides a level of insight that can prove extremely valuable during audits.

– Enhanced host profile management. vSphere’s host profiles feature has long made it easier to maintain consistent configuration across multiple hosts. Significant enhancements have been made to make host profiles easier to manage. The profile editor now has a search function and the ability to mark configuration items as favorites, and settings can now be copied from one profile to another. Compliance checks have been enhanced with additional details of how the host configuration differs from the profile. Remediation is now significantly faster with DRS integration when maintenance mode is required and parallel remediation of multiple hosts when it is not.

Horizon View 5.x

Another big VMware offering to reach end of support is Horizon View 5.x, which did so on September 14, 2016. The most logical upgrade path for View 5.x is to move to 7.x. Organizations can make the move to this most recent version directly, provided their VMware subscription and support agreements are still active.

What’s new with Horizon View 7.x? There’s actually quite a bit. In the time that’s passed since 5.x’s release, VMware has expended a great deal of energy and innovation on View. Rather than break down the full list of new features here, the members of our Virtualization Practice are available to present them to you and your team. To schedule a meeting with one of our VMware experts, please visit us at: http://www.arrayasolutions.com/contact-us/.

Start executing your VMware upgrade strategy

At Arraya, we won’t even start an upgrade without first performing a detailed audit of customers’ IT environments in terms of storage arrays, server firmware, etc. The idea behind this check is to ensure a customer’s environment is up to the task of supporting the upgrade. If we turn up possible issues, our engineers will work with the customer to determine how to best get the customer safely to its goal. The full complement of Arraya’s IT knowledge is ready to jump into an engagement should an issue arise that necessitates the attention of someone outside our Virtualization Practice.

Ready to start a conversation? Visit us at http://www.arrayasolutions.com/contact-us/ or reach out to us via social media: Twitter, LinkedIn, or Facebook. While there, be sure to follow us to keep up with our blog posts, special events, and industry insights.

Primary Sidebar

Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234    
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}