Case Study: Enabling Connectivity for Temporary Hospitals

mwadmin Blog, Wireless

To support the need for new temporary hospitals capable of providing Covid-19 testing, Red River partnered with healthcare organizations to deploy our wireless LAN (WLAN) solution to locations across the mid-Atlantic region. This deployment was the first step toward ensuring immediate and secure internet access to these temporary field clinics. Although not always top of mind when erecting a field …

Virtualize, Deploy and Scale End-user’s Applications to the Cloud in Minutes with Red River’s Remote Workforce Assist

mwadmin Blog, Collaboration, Collaboration Technology, Managed Services, Telework

Remote work is increasing every day. Due to COVID-19 and social distancing mandates, employers have had to react fast to transition to a remote workforce. According to a recent study by Gallup, the number of Americans working remote has doubled since mid-March to 62%. However, this quick transition to a remote workforce has not come without its challenges.   Most organizations don’t have the technology infrastructure …

Best Practices to Keep Your Employees Productive While Working from Home 

mwadmin Blog, Collaboration, Managed Services, Networking, Telework, Uncategorized

COVID-19 and social distancing mandates have dramatically changed the way people work. Over the past few weeks, a full or partial remote workforce has become a necessity for most organizations. Working from home has it benefits but it also comes with several disadvantages that can be hard on employees and productivity.  While technology is not a cure-all to all remote work issues, the right tools …

Access, Delivery and Engagement: How Technology Supports Online Learning

mwadmin Blog, Collaboration, Education

By Kevin Steeprow Schools are closing and for how long is anyone’s guess at this point. Many districts are looking for ways to deliver instruction online – often for the first time. Even for those with distance learning options already in place, teachers and administrators have not faced the daunting prospect to move to an all-online scenario. There are many …

Photo of woman with notebook and red square to right with white text inside

Considerations for a Remote Workforce

Lindsay Michael Blog, Cloud, Collaboration, Featured, News

by Kevin Steeprow In 2020, many businesses have the technology in place to allow its workers to be productive outside the office. In fact, 54% U.S. of workers work remotely at least once a month, and 66% of companies allow remote work. However, there’s a big difference between supporting a work-from-home policy and preparing an entire workforce to be remote …

9 Ways Azure Managed Services Are More Efficient than Flying Solo

Lindsay Michael Blog, Cloud

When it comes to an Azure infrastructure, your business doesn’t need to go it alone. If you’re thinking about an Azure deployment, you should also be thinking about enlisting the services of an MSP. An Azure managed services provider will be able to help you leverage Azure in ways that you may not be able to if you’re trying to …

Tech Talk with Kevin Steeprow – Cisco ISE

RRAdministrator Blog, Networking, Tech Talk

Simplify identity management across diverse devices and applications with Cisco ISE Does your network security authorize and authenticate every user or device? Our latest Tech Talk covers the benefits of a policy-based security solution with Cisco ISE.

Technical Insights: Docker at California’s Child Welfare Digital Service

mwadmin Blog, DevOps

By Thomas Ramirez Note: This is part two of a three-part series regarding work we performed at CWDS, and more specifically our experience with code checking through automation. As in the traditional IT (physical hardware) world, most workloads required more than one component. In our architecture, each container holds one application component, complete with whatever libraries and supporting tools are …

Technical Insights: Docker at California’s Child Welfare Digital Service

mwadmin Blog, DevOps

By Thomas Ramirez This is part one of a three-part series regarding work we performed at CWDS and is focused on containers, and more specifically our experience with Docker containers. Note: Containers are a tool and deployment model which make it possible to isolate applications into compact, lightweight execution environments that share an underlying operating system. Typically measured in megabytes, …

Red River is at AFITC 2018!

RRAdministrator Blog

Red River is excited to attend this year’s Air Force Information Technology & Cyberpower Conference (AFITC) in Montgomery, Alabama. This year we have a new booth and feature presentations on security and networking. Our security practice lead Robert Allende joins us from the trade show floor to discuss our new Device Isolation Architecture (XDIA) solution in the video linked here: …

Has Your Storage Turned into a Three-Ring Circus?

RRAdministrator Blog

There are circus performers who have an easier balancing act than some IT managers responsible for determining the amount of required storage capacity for their department. With needs changing quickly and procurement timelines lengthy, organizations can find themselves tying up unnecessary capital purchasing storage that goes unused if they guess high or scrambling to keep up if they lowball. It’s …

5 Ways to Prepare for a Cyberattack

RRAdministrator Blog, Uncategorized

1,579: That’s the number of data breaches in the United States in 2017, exposing close to 179 million records. The number and sophistication of cyberattacks are only growing. Recently, the United States and the U.K. put out a joint warning for Russian cyberattacks against government and private organizations as well as individual homes and offices. It’s not just an attack …

Augmented Cyber Reality, Part Three: Data Loss Prevention

Rick Friend Blog

What is cyber security going to look like in the years to come? What are the problems with the current approach and keeping the pace set by today’s threats? The reality is that the challenges with securing the network need to be augmented with a strategy to specifically protect and restrict the organization’s most valued asset – the data. The …

Red River Opens Office in Austin, TX

RRAdministrator Blog

Red River recently expanded its geographic footprint, opening a new office space in the up-and-coming area of East Austin. The space serves as the home for the company’s Storage on Demand program, which provides flexible, scalable storage-as-a-service. In addition to employee workspaces, the office includes collaboration areas, a technology sandbox and will soon house Red River’s Executive Briefing Center. This …

Software Defined Networking Mitigates Risk, Provides Reward

Eric Stuhl Blog

Infinite Attack Surfaces Traditional security architectures generally consist of a perimeter that is hardened, while the internal network is left open and is more trusting. This design is perpetuated mostly by focusing on external threats and is driven by limitations around scaling – placing hardware based security devices between all points would be prohibitively expensive and impossible to maintain in …

Augmented Cyber Reality: Part 1

Paul Krein Blog

Introduction:  Augmented Cyber Reality Paul Krein, CTO Red River It’s all about the data Modern cyber security and Information Technology has become all about the data.  Moving, sharing and especially protecting mission and business data.  However, the pace of demand around protecting our mission and corporate data is straining many security teams.  Information security is the new technology landscape, as …

SECURITY INTELLIGENCE: Correlating and Detecting a Threat

Tom Barna Blog, Data Analytics, Network Security Leave a Comment

The 2017 data security landscape is more hazardous and risky than any previous year. Organizations are struggling with the reality that the tools they rely on to protect their network and data can’t keep up with today’s advance cyber threats. To combat these more sophisticated cyber threats, organizations must upgrade their monitoring to an equally sophisticated and comprehensive management tool. …

Guest Wireless: Balancing Access and Risk

Bill Halpin Blog, Wireless Leave a Comment

Two of the biggest technology requirements are often at odds: security and access. As you open the doors to access by providing wireless Internet – and ability to use personal devices – to contractors, staff and guests, you run the risk of also opening the door to security threats or undermining your established networks and infrastructure. Add in the additional …