Policy-based Networking Made Easy with Cisco’s ISE

Arraya Insights| September 22, 2015

Most things in business are governed by policies. There are detailed sets of rules surrounding everything from PTO usage to intra-office relationships and beyond. Historically, one area that has been tougher to lock down with policies has been the corporate network. Often this stems from poor visibility into the network itself, a misalignment of IT […]

Read More >

Introducing a Hybrid, Scalable Approach to Network Security

Arraya Insights| September 18, 2015

It’s true whether you’re building a house or securing IT: a tool is only as effective as the person or people behind it. Admittedly we don’t have a ton of expertise in construction. However, IT security tools are another story. The topic of security has been on our minds quite a bit. So much so […]

Read More >

Guarding Against Threats to Virtual and Cloud Environments: 3 Tools

Arraya Insights| September 14, 2015

For all the benefits of embracing the Cloud or virtualization – and there are plenty – doing so can open an organization up to a number of new challenges. Not enough to make Cloud or virtualization solutions worth avoiding, but challenges nonetheless. The improvements these solutions offer will likely always make them appealing to organizations. […]

Industry-leader paves the way for secure enterprise mobility

Arraya Insights| September 8, 2015

Securing today’s mobile workforce is a tough job and it keeps getting tougher. As more workers push for new BYOD policies, for more mobility and for more choices in terms of the technology they use to do their jobs, it falls on IT to deliver on all of those wants without exposing the company to […]

Read More >

Combating Malware: Advanced Threats Call for an Advanced Solution

Arraya Insights| September 4, 2015

Malware is everywhere. In fact, take the number of malware events from 2014 – roughly 170 million, according to the 2015 Data Breach Investigations Report by Verizon – and divide that by the number of seconds in a year and the result is an average of five malware events per second. Of course, as the study points […]

Top 5 Reasons You Should Consider Cisco ASA with FirePOWER

Arraya Insights| September 2, 2015

IT has reported a rising number of cyberattacks over the past twelve months. While threats are on the upswing, IT has also gotten pretty good at repelling those attacks during that same period. That’s certainly good news, however, there’s still work to be done to ensure cybercriminals’ persistence doesn’t start to pay off any time […]

Read More >

Improve Network Access Control with Cisco’s ISE Portal Builder

Arraya Insights| August 28, 2015

How’s this for a balancing act? A company’s network must be an impenetrable fortress to the wrong people (hackers and cyber crooks) while being easily accessible and user-friendly to the right ones (employees, guests and all of their devices). That’s the security tightrope today’s IT pros must walk. However, there is a solution: Cisco’s Identity […]

Read More >

What is Advanced Threat Analytics?

Arraya Insights| August 27, 2015

In early August, I happened to be working on some Enterprise Mobility Suite collateral and noticed that the price of it went up about a dollar per user per month. What could account for this change? Well, Advanced Threat Analytics had been added to the Enterprise Mobility Suite. Just to recap, EMS is much more than […]

Read More >

Hackers Find Way to Bypass Windows Security Feature

Arraya Insights| January 21, 2015

Typically the saying “everything old is new again” gives a person a reason to hang on to possibly embarrassing old clothes or CDs. Unfortunately, that saying also has implications in other areas, such as digital security. For example, pros who take their eyes off a threat they thought they’d bested may just have it come […]

Read More >