Augmented Cyber Reality, Part Three: Data Loss Prevention

Rick Friend Blog

What is cyber security going to look like in the years to come? What are the problems with the current approach and keeping the pace set by today’s threats? The reality is that the challenges with securing the network need to be augmented with a strategy to specifically protect and restrict the organization’s most valued asset – the data. The …

Red River Opens Office in Austin, TX

RRAdministrator Blog

Red River recently expanded its geographic footprint, opening a new office space in the up-and-coming area of East Austin. The space serves as the home for the company’s Storage on Demand program, which provides flexible, scalable storage-as-a-service. In addition to employee workspaces, the office includes collaboration areas, a technology sandbox and will soon house Red River’s Executive Briefing Center. This …

Software Defined Networking Mitigates Risk, Provides Reward

Eric Stuhl Blog

Infinite Attack Surfaces Traditional security architectures generally consist of a perimeter that is hardened, while the internal network is left open and is more trusting. This design is perpetuated mostly by focusing on external threats and is driven by limitations around scaling – placing hardware based security devices between all points would be prohibitively expensive and impossible to maintain in …

Augmented Cyber Reality: Part 1

Paul Krein Blog

Introduction:  Augmented Cyber Reality Paul Krein, CTO Red River It’s all about the data Modern cyber security and Information Technology has become all about the data.  Moving, sharing and especially protecting mission and business data.  However, the pace of demand around protecting our mission and corporate data is straining many security teams.  Information security is the new technology landscape, as …

Has Your Storage Turned into a Three-Ring Circus?

RRAdministrator Blog

There are circus performers who have an easier balancing act than some IT managers responsible for determining the amount of required storage capacity for their department. With needs changing quickly and procurement timelines lengthy, organizations can find themselves tying up unnecessary capital purchasing storage that goes unused if they guess high or scrambling to keep up if they lowball. It’s …

SECURITY INTELLIGENCE: Correlating and Detecting a Threat

Tom Barna Blog, Data Analytics, Network Security 0 Comments

The 2017 data security landscape is more hazardous and risky than any previous year. Organizations are struggling with the reality that the tools they rely on to protect their network and data can’t keep up with today’s advance cyber threats. To combat these more sophisticated cyber threats, organizations must upgrade their monitoring to an equally sophisticated and comprehensive management tool. …

Guest Wireless: Balancing Access and Risk

Bill Halpin Blog, Wireless 0 Comments

Two of the biggest technology requirements are often at odds: security and access. As you open the doors to access by providing wireless Internet – and ability to use personal devices – to contractors, staff and guests, you run the risk of also opening the door to security threats or undermining your established networks and infrastructure. Add in the additional …

IT Takes a Village

Richard Ackerman Blog, Managed Services 0 Comments

Senior Director of Managed Services, Richard Ackerman For many organizations, there’s a skilled engineer or a department head – even a president – who goes to sleep every night with a cell phone by the bed, ready to take a call on the latest IT emergency.  That person never takes a vacation, never turns off their phone, and bears the …

DIVING INTO DEPLOYABLE SOLUTIONS WITH QUENT STRANDBURG

Quent Strandburg Blog, Functional Mobility 0 Comments

A subset of Functional Mobility, Deployable Solutions are currently garnering a lot of attention – for good reason. These flexible, highly-customizable solutions, which tightly integrate data center, network, unified communications, wireless and security technology into a compact ruggedized container or case, are extending media-rich enterprise IT functionality to remote users on the battlefield, in emergency response scenarios and for community-based …

Meet Data Center Evangelist – Mickey Cullop

Mickey Cullop Blog 0 Comments

As you may already know from my previous blogs, I’m Red River’s confirmed data center evangelist for the Federal, Healthcare and Civilian markets. I believe that if we solve larger problems that are affected within the data center, we can ultimately ease the workload and burden on all of the users that interface with those systems. I’ve been in IT …

IT WITHOUT BORDERS

Wade VanGuilder Blog, Functional Mobility 0 Comments

Fulfilling the Promise of Deployable Solutions MOVING BEYOND THE BACK OFFICE The men and women of today’s military, government and public sector agencies require extreme flexibility. Far from being constrained to a traditional brick-and-mortar office space, these individuals and teams are in the field, moving freely within the communities they serve, and oftentimes, spread across the globe as they deliver …

Engineering a Connected World with Wade VanGuilder

Wade VanGuilder Blog, Collaboration, Collaboration Technology 0 Comments

With so many advancements in mobility, networking, collaboration and unified communications, Federal agencies and business enterprises can quickly increase their overall effectiveness and capabilities by simply investing in new technology. This is especially true with the latest communication systems, which can have a lasting impact on any business regardless of industry. As Red River’s Senior Director of Technical Services, I’m …

Improve your data center with converged infrastructure [Infographic]

Ed Levens Blog, Cloud 0 Comments

These days, data centers are everywhere and they’re only becoming more prevalent – 87 percent of business with data centers plan to increase spending over the next year, with 1 in every 4 planning to invest within the next fiscal quarter. Converged infrastructure could be that next big investment for data center decision-makers. Let’s take a look at just a few …

Network Data Center

Converged vs. Hyperconverged: Which is Right for Your Organization?

Mickey Cullop Blog 0 Comments

  Converged infrastructure combines compute, storage and networking technologies for data centers. Although the converged components are all housed together, they each retain their independent functional identities. However, vendors pay close attention to enhanced connectivity by validating compatibility before point of purchase. In short, everything works together right out of the box, either as a connected unit or separate modules. …

Why Switch to Converged Infrastructure?

Mickey Cullop Blog 0 Comments

Although converged infrastructure has been around for a while now, it’s still viewed by the data center community as the “young upstart” intent on disrupting legacy architectural models. So, what makes converged infrastructure so enticing? As the Senior Systems Engineer and Red River’s resident converged expert, I can help provide an answer. Suits Many Different Use Cases Converged architectures, which …

Mobile threats at a glance: What’s putting your data at risk?

Michael Edstrom Blog, Functional Mobility 0 Comments

Enterprise mobility doesn’t have to be an antithesis to data security. With some insight into mobile threats and solutions to mitigate those risks, organizations can have the best of both worlds. Devices left unmanaged Mobility is the ultimate productivity tool – it’s the freedom to connect and collaborate wherever and however you want on the devices that align best with your …

WHY BOTHER WITH SUPPORT?

Rebecca McDonald Blog, Support Services 0 Comments

Something’s Rotten in the Data Center When you invest in IT, you expect it to work. It’s all too easy to focus on the benefits new hardware or software solutions promise to deliver, particularly when those shiny, pre-tested, fully-integrated racks are deployed, or you roll out a leading-edge application across your IT environment. But it’s bound to happen. Before too …

Does your strategy for enterprise mobility cover all 3 security bases?

Michael Edstrom Blog, Functional Mobility, Network Security 0 Comments

Mark your calendars: 2015 was the year U.S. business owners learned the hard way their cybersecurity strategies need greater attention. According to a report compiled by the Identity Theft Resource Center, commercial businesses experienced 4 out of every 10 publicly reported breaches across all sectors last year. More alarming, the math seems to indicate an evolution in the nature of enterprise breaches …

A Passion For Support Services

Rebecca McDonald Blog, Support Services 0 Comments

Saying I have a passion for Support Services may be an understatement. After 13 years in the Services field, I would venture a guess that I’ve specialized in Support Services longer than most anyone in the industry – and I absolutely love it.  Support Services is complex and sends nearly everyone running. Not me. I’ve made it my mission to …

Stay prepared for the future with enhanced enterprise mobility

Michael Edstrom Blog, Functional Mobility 0 Comments

The people have spoken, and they want to use their smartphones and tablets during the workday. By 2018, 7 out of 10 on-the-go professionals will regularly use their personal smart devices to conduct business, according to Gartner. That’s a big difference compared to a decade ago when Palm Pilots and BlackBerry phones were corporately owned and strictly regulated. But the …