
Celebrating success
We were recently invited to celebrate success at an evening hosted by Megabuyte for 2021/22 award winners and alumni. Redcentric delivered a strong financial performance among its peers throughout the...
We were recently invited to celebrate success at an evening hosted by Megabuyte for 2021/22 award winners and alumni. Redcentric delivered a strong financial performance among its peers throughout the...
If you’re responsible for an IT setup then a firewall (or even more than one) is essential to keeping your data protected against cyber attacks. But what actually is a firewall and how does it...
Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...
Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...
To build an operating model that allows you to respond quickly to business needs, you need to look forward to your roadmap and outside factors. This blog looks at how other customers have built an...
Every year, cybercriminals find and take advantage of a corporate system’s vulnerabilities. They feast on open communication protocols and exposed databases that show no sign of regular security...
A third of UK businesses lose customers after a cyber attack. cDiscover how a data centre an support your cyber security.
Redcentric is honoured to announce that they have been named in Cloudtango’s 2022 Top Enterprise Global100 MSPs. These prestigious lists recognise the top performing Managed Service Providers (MSPs)...
Redcentric plc, a leading UK IT managed services provider, is pleased to announce the acquisition of 7 Elements. 7 Elements is a CREST accredited and award-winning business which provides industry...
Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?
Choosing the right virtual desktop can be hard. We look at four of the most popular platforms, their pros and cons and our recommendations.
Credential stuffing can leave your business vulnerable. We look at the dangers of credential stuffing and what your business can do to stay protected.