Blog: Networks

Why Redcentric For Connectivity

MPLS WAN – your questions answered

What is MPLS technology? Multi-protocol Label Switching, or MPLS, is a networking technology that routes traffic intelligently using the shortest path based on “labels” rather than the complex...

Secure remote working

Secure SD-WAN: peace of mind for your network

Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...

Woman working remotely using softphone voice

How to create a digital workspace

Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?

FAQs

PSTN and ISDN switch-off

BT’s plan to decommission PSTN and ISDN lines will come into effect in 2025. To get prepared and to future-proof your infrastructure we’ve pulled together some key information you will need to...

Our Partnership Focus

Becoming technology enabled

Organisations are becoming technology enabled to create the agility necessary to overcome the challenges of digital disruption. Read more here

Why Redcentric IP Telephony

SD-WAN: A Buyer’s Guide

There is a growing buzz around SD-WAN as a network solution. It brings considerable benefits for some use cases but it isn’t a silver bullet for networking.

Why Redcentric For Secure Remote Access

HSCN Secure Remote Access Tokens FAQs

Secure remote access to HSCN services and data provides clinicians critical information to support them to make informed decisions on the move. Get your questions answered below on HSCN secure remote...

Doctor talking to nurse in a hospital

Internet First: FAQs

HSCN is an important transitional step towards the Internet First policy, making digital health and care services available over the internet. In this FAQs article we look at what will this mean for...

Having a different conversation about SD-WAN

Having a different conversation about SD-WAN

One of the issues I have with much of the PR hoopla around SD-WAN is its tendency to major on the cost savings, with the implication that organisations could finally unshackle themselves for good from...

Our Approach

Top 10 questions for choosing a network provider

Proactive management, monitoring, securing and reporting of a complex network are difficult things to get right. Investing in managed network services can appear to be the answer, bringing you better...

Collaboration

Top 10 benefits of using managed IT services

There was a time when organisations only had to concentrate on their core offer: baking cakes, selling furniture, making cars, providing care etc. But over the past three decades, every specialist...

Why Redcentric For Wireless Networking

Common problems with onsite data backup

Many companies are still using traditional backup methods which can cause issues and be ineffective in comparison to online data backup solutions. We look at common issues come with traditional onsite...

Why Redcentric for Support And Maintenance

Using Oracle Data Integrator knowledge modules

This article will review one aspect of the ODI product, the concept of “Knowledge Modules”, and discuss how these can be used to stream-line the ETL development process through the use of...

IT-Security-Image

Top tips for switching data centres

There are many reasons for relocating your IT equipment to a new data centre, varying from a refresh of equipment currently running in-house to dissatisfaction with an existing data centre to a desire...

Why Redcentric for PSN Services

Transitioning from N3 to HSCN

By the end of the decade, the NHS’s N3 wide area network will have passed into IT history: as of 2017, the transition to the next generation Health and Social Care Network (HSCN) will begin....

Why Redcentric IaaS

What is IaaS (Infrastructure as a Service)?

Infrastructure as a Service (IaaS) is best visualised as sitting at the base of a three-tier Cloud computing pyramid that also comprises PaaS (Platform as a Service) in the middle and SaaS (Software...

What is SaaS

What is software as a service (SaaS)?

Software as a Service (SaaS) is best visualised as sitting at the top of a three-tier Cloud computing pyramid that also comprises PaaS (Platform as a Service) in the middle and IaaS (Infrastructure as...

Doctor talking to nurse in a hospital

Why HSCN is better than N3

As of April this year, all health and care organisations will fully transition to the Health and Social Care Network (HSCN), leaving N3 a thing of IT past. For over fifteen years, N3 has provided a...

Why Redcentric For SD-WAN

Top 10 things to know about 21CN

We look at the features and benefits of the BT 21CN network as well as common questions about the service. 1. WHAT IS BT’S 21CN? BT is investing billions of pounds in changing out the various UK...

Why SD-WAN is Good Business

SD-WAN Benefits: Why it’s good business

I’ve been asked a couple of times recently whether our support for SD-WAN is a bit like turkeys voting for Christmas? After all, Redcentric has built a business on managed networking and the...

Why Redcentric For Cloud Migration

Did you know? Interesting data and storage facts

As an IT professional with a particular interest in data and Cloud services, I often stumble across nuggets of information that grab my attention. I’m sure I’m not alone in my fondness for facts...

Why Redcentric for HCSN

Infrastructure transformation across the NHS

Combining LDRS, STPS and the Nhs Five Year Forward View As the NHS continues its program of digital transformation, technology strategies also have to change and mould in order to adhere to the...

Firewalls Explained: Types of Firewalls

Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...

Why Redcentric for Security Monitoring & Analytics

DDoS attack: how can one affect your business?

DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...

redcentric

Redcentric

0800 983 2522 sayhello@redcentricplc.com