SECURITY INTELLIGENCE: Correlating and Detecting a Threat

Tom Barna Blog, Data Analytics, Network Security 0 Comments

The 2017 data security landscape is more hazardous and risky than any previous year. Organizations are struggling with the reality that the tools they rely on to protect their network and data can’t keep up with today’s advance cyber threats. To combat these more sophisticated cyber threats, organizations must upgrade their monitoring to an equally sophisticated and comprehensive management tool. …

Guest Wireless: Balancing Access and Risk

Bill Halpin Blog, Wireless 0 Comments

Two of the biggest technology requirements are often at odds: security and access. As you open the doors to access by providing wireless Internet – and ability to use personal devices – to contractors, staff and guests, you run the risk of also opening the door to security threats or undermining your established networks and infrastructure. Add in the additional …

IT Takes a Village

Richard Ackerman Blog, Managed Services 0 Comments

Senior Director of Managed Services, Richard Ackerman For many organizations, there’s a skilled engineer or a department head – even a president – who goes to sleep every night with a cell phone by the bed, ready to take a call on the latest IT emergency.  That person never takes a vacation, never turns off their phone, and bears the …

DIVING INTO DEPLOYABLE SOLUTIONS WITH QUENT STRANDBURG

Quent Strandburg Blog, Functional Mobility 0 Comments

A subset of Functional Mobility, Deployable Solutions are currently garnering a lot of attention – for good reason. These flexible, highly-customizable solutions, which tightly integrate data center, network, unified communications, wireless and security technology into a compact ruggedized container or case, are extending media-rich enterprise IT functionality to remote users on the battlefield, in emergency response scenarios and for community-based …

Meet Data Center Evangelist – Mickey Cullop

Mickey Cullop Blog 0 Comments

As you may already know from my previous blogs, I’m Red River’s confirmed data center evangelist for the Federal, Healthcare and Civilian markets. I believe that if we solve larger problems that are affected within the data center, we can ultimately ease the workload and burden on all of the users that interface with those systems. I’ve been in IT …

IT WITHOUT BORDERS

Wade VanGuilder Blog, Functional Mobility 0 Comments

Fulfilling the Promise of Deployable Solutions MOVING BEYOND THE BACK OFFICE The men and women of today’s military, government and public sector agencies require extreme flexibility. Far from being constrained to a traditional brick-and-mortar office space, these individuals and teams are in the field, moving freely within the communities they serve, and oftentimes, spread across the globe as they deliver …

Engineering a Connected World with Wade VanGuilder

Wade VanGuilder Blog, Collaboration, Collaboration Technology 0 Comments

With so many advancements in mobility, networking, collaboration and unified communications, Federal agencies and business enterprises can quickly increase their overall effectiveness and capabilities by simply investing in new technology. This is especially true with the latest communication systems, which can have a lasting impact on any business regardless of industry. As Red River’s Senior Director of Technical Services, I’m …

Improve your data center with converged infrastructure [Infographic]

Ed Levens Blog, Cloud 0 Comments

These days, data centers are everywhere and they’re only becoming more prevalent – 87 percent of business with data centers plan to increase spending over the next year, with 1 in every 4 planning to invest within the next fiscal quarter. Converged infrastructure could be that next big investment for data center decision-makers. Let’s take a look at just a few …

Network Data Center

Converged vs. Hyperconverged: Which is Right for Your Organization?

Mickey Cullop Blog 0 Comments

  Converged infrastructure combines compute, storage and networking technologies for data centers. Although the converged components are all housed together, they each retain their independent functional identities. However, vendors pay close attention to enhanced connectivity by validating compatibility before point of purchase. In short, everything works together right out of the box, either as a connected unit or separate modules. …

Why Switch to Converged Infrastructure?

Mickey Cullop Blog 0 Comments

Although converged infrastructure has been around for a while now, it’s still viewed by the data center community as the “young upstart” intent on disrupting legacy architectural models. So, what makes converged infrastructure so enticing? As the Senior Systems Engineer and Red River’s resident converged expert, I can help provide an answer. Suits Many Different Use Cases Converged architectures, which …

Mobile threats at a glance: What’s putting your data at risk?

Michael Edstrom Blog, Functional Mobility 0 Comments

Enterprise mobility doesn’t have to be an antithesis to data security. With some insight into mobile threats and solutions to mitigate those risks, organizations can have the best of both worlds. Devices left unmanaged Mobility is the ultimate productivity tool – it’s the freedom to connect and collaborate wherever and however you want on the devices that align best with your …

WHY BOTHER WITH SUPPORT?

Rebecca McDonald Blog, Support Services 0 Comments

Something’s Rotten in the Data Center When you invest in IT, you expect it to work. It’s all too easy to focus on the benefits new hardware or software solutions promise to deliver, particularly when those shiny, pre-tested, fully-integrated racks are deployed, or you roll out a leading-edge application across your IT environment. But it’s bound to happen. Before too …

Does your strategy for enterprise mobility cover all 3 security bases?

Michael Edstrom Blog, Functional Mobility, Network Security 0 Comments

Mark your calendars: 2015 was the year U.S. business owners learned the hard way their cybersecurity strategies need greater attention. According to a report compiled by the Identity Theft Resource Center, commercial businesses experienced 4 out of every 10 publicly reported breaches across all sectors last year. More alarming, the math seems to indicate an evolution in the nature of enterprise breaches …

A Passion For Support Services

Rebecca McDonald Blog, Support Services 0 Comments

Saying I have a passion for Support Services may be an understatement. After 13 years in the Services field, I would venture a guess that I’ve specialized in Support Services longer than most anyone in the industry – and I absolutely love it.  Support Services is complex and sends nearly everyone running. Not me. I’ve made it my mission to …

Stay prepared for the future with enhanced enterprise mobility

Michael Edstrom Blog, Functional Mobility 0 Comments

The people have spoken, and they want to use their smartphones and tablets during the workday. By 2018, 7 out of 10 on-the-go professionals will regularly use their personal smart devices to conduct business, according to Gartner. That’s a big difference compared to a decade ago when Palm Pilots and BlackBerry phones were corporately owned and strictly regulated. But the …

Businessman Working on Laptop in Airport

Microsoft Office 365 – The Benefits and Challenges

Richard Ackerman Blog 0 Comments

Recently, Office 365 has been garnering a lot of attention for being a reliable service for businesses to organize their operations. Allowing companies to access business emails, documents, and collaboration tools from any location. Office 365 offers access to your most critical business applications from your smartphone, tablet, laptop, or desktop. But does it truly live up to all its …

Surveillance Camera and Young Man with Hooded Sweatshirt

A Discussion on Security ‘Matters’ – Advancing Safety with Video Surveillance

Paul Cohn Blog 0 Comments

Welcome back to our blog series on modern physical security solutions and technology. If you recall from our discussion last week when we outlined the 4 major areas of physical security, I mentioned that video surveillance is one of the most requested and employed security solutions. The use of video for threat detection and loss prevention is universally applied to …

urban city street CCTV with traffic light trail background

A Discussion on Security ‘Matters’ – The 4 Areas Of Physical Security

Paul Cohn Blog 0 Comments

After working with various organizations across America to develop physical security solutions, I have seen the dire need for more proactive security measures for commercial and federal agencies. While there is a new focus on cyber attack prevention, organizations must protect against physical security breaches. Luckily for companies with security concerns, physical security technology continues to improve at a tremendous rate. So …