Digital Transformation in 2017

Arraya Insights Arraya Insights| December 28, 2016

I started at Arraya in 2015, finding myself becoming a consultant and leaving IT for the first time in 16 years. In the interview, I asked what the next thing beyond Office 365 was. The context was that, eventually, companies will be moved to Office 365 and that work will dry up. The answer I […]

Don’t Bother Managing Passwords in Azure AD

Arraya Insights Arraya Insights| December 22, 2016

It’s a simple concept, right? You want people to be able to work from anywhere, while securely authenticating them to resources both internal and in the cloud and not storing passwords in a cloud service. You want to do all of that without creating new headaches for IT. It’s a common goal for many organizations, […]

Read More >

An Inside Look at Arraya’s Mini Microsoft Ignite Event

Arraya Insights Arraya Insights| December 19, 2016

Recently, Arraya gave folks who were unable to attend Microsoft’s Ignite conference back in September a second chance to immerse themselves in the tech giant’s world. Speakers from both Arraya and Microsoft were on hand at Microsoft’s Malvern, PA offices to showcase Ignite highlights, upcoming releases, and more. This new event, which was billed as […]

Read More >

Security Now: Using Azure MFA Server to Protect Existing Resources

Michael Pocock Michael Pocock| November 14, 2016

Lately it has been hard not to notice news about accounts being hacked. The number of major companies that have been hacked has grown extremely long. When an average person hears about hacking, images of people hiding in the shadows with laptops, rapidly typing lines of code and fighting firewalls come to the front of […]

Read More >

Exchange 2007 Nears End of Life: What Comes Next?

Arraya Insights Arraya Insights| November 2, 2016

Five short months are all that remain until Exchange Server 2007 goes end of life. As the April 11, 2017 expiration date for Exchange extended support nears, businesses still using it face a fork in the road. They can assume the risks of using outdated and unsupported technology and press on with Exchange 2007 (not […]

Identity is the New Security Perimeter

Arraya Insights Arraya Insights| October 26, 2016

Today we live in a post-information age. One where people and businesses are driven to a new way of communicating, working, and well… living. A large amount of the credit for this change can be attributed to the internet and apps, both web and mobile. Convenience was a big driver for the success of these […]

Read More >

Don't Leave Securing Email to End Users

Arraya Insights Arraya Insights| October 19, 2016

Regardless of who you vote for on November 8th, one occurrence in the campaign has shaken every email administrator to their core, namely the WikiLeaks dump of John Podesta’s emails. While  the details of how the hack occurred are scarce, clearly Podesta’s entire mailbox was accessed and subsequently dumped. The only detail known is that […]

Read More >

3 Overlooked Microsoft Tools That Can Better Secure Emails

Arraya Insights Arraya Insights| October 17, 2016

Experts estimate that 2.4 million emails were sent every second last year. Take that figure and stretch it across an eight-hour workday and that comes to roughly 69 billion emails between the hours of 9-5 each day. That is a lot of email. Each one of those 69 billion messages isn’t just an opportunity for […]

Remove the Fog of Unknown Cloud Applications

Arraya Insights Arraya Insights| October 13, 2016

As a technology professional, security has always been at the forefront of my thought process. I’ve been interested in security since I started in the industry in 2007. Back then, security was present, but much less complex than it is today. Most companies had the majority of their IP and other resources locked in an […]

Read More >

Why the Cloud Means No More Security Excuses

Arraya Insights Arraya Insights| October 11, 2016

A new study from NIST suggests that security fatigue could be putting businesses at risk. There is something futile in an end user’s attempt to keep your computing environment safe. After all, what could a non-technical knowledge worker possibly do to protect themselves and the company’s data against a hacker? The fatigue and frustration comes […]

Read More >