We make your work day easier

by providing a full array of traditional and managed IT services to keep your small to midsize business going
We provide a full array of traditional and managed it services for the small to midsize business

Whether under a Managed Service Agreement, Per Project, or as needed. RRK provices a wide array of service to meet your technology needs.

  • Wired Network Connection.svg
    Networks | Design | Installation

    We provide full network design, installation and structured wiring. We pride ourselves on clean and neat installations of you wiring infrastructure making future maintenance and additions a snap. We also provide 24/7 network monitoring. We can see the status and a history of what has been connected to the network and when. With this feature, we can help put your mind at ease that no rogue devices are connected to the network or identify devices that may cause harm or conflict on the network. In addition to management of your networks

  • Wi-Fi Connected.svg
    Wi-Fi | Design | Installation

    From design to installation to management, we can take care of your office or sitewide Wi-Fi needs. We specialize in Business/Enterprise class Wi-Fi networks with all the features you would expect: Guest Networks with web portal sign, Limited Access Networks, fully protected corporate Wi-Fi networks. We also do Point to Point and Point to Multi-Point networks to help connect locations not accessible by traditional wired networks or for specialty situations where a remote location connection is necessary.

  • Shield.svg
    Data Protection | Disaster Recovery

    Data protection and Disaster Recovery uses a hybrid methodology to store system backups both onsite and in the cloud. This approach provides for quick recovery from the local store, as well as, the added protection of offsite storage of backup and recovery file. The service can be applied to workstations and servers alike and provides recovery features such as File-Level Recovery, Bare Metal Recovery, as well as, Virtual Recovery to any in-house or third-party virtual machine provider. For example, if your office space has suffered a catastrophic disaster, we can bring your systems back up in Microsoft’s Azure or Amazon Web Services getting your company back up and running in no time.

  • Stethoscope.svg
    System Health

    Through a series of automated health checks, we provide 24/7 monitoring of your systems. Checks, such as hard disk space, failed login attempts, and service failures, help us understand the system state should issues arise. Checks continuously monitor your system, providing real-time health information to our monitoring “dashboard” allowing us to react more proactively should a problem occur.

  • Buy Upgrade.svg
    Patch Management

    Keeping your software up to date with the latest security updates is crucial when it comes to protecting your system as a whole. With patch management services, we ensure that all the necessary updates are being installed promptly. Patching includes many of the more commonly found software on PCs today such as Adobe Reader, Java, and other 3rd party software and applications. Patches are approved within our system and then released to workstations and servers on a scheduled basis.

  • Laptop Bug.svg

    Through the choice of two different AV engines, we monitor the status of unwanted software, as well as, its removal. We can ensure that scheduled scans are occurring and report on what those scans find and remove.

  • Search Bar.svg
    Web Protection

    This background service helps protect the user from accessing potentially harmful websites which may infect their PC with malware, spyware, and viruses, or spy on the user’s activity. We block a full array of sites from pornography to social media and other questionable sites.

  • Data Protection.svg
    Risk Intelligence

    Sensitive data left exposed on systems pose a significant risk to your customers. Often, companies amass large amounts of confidential personal identification information, including social security numbers, driver's license numbers, credit card information, and more in dispersed persistent storage. Unwanted exposure of this information can result in substantial liability costs. Our Risk Intelligence scans root out sensitive data and potential vulnerabilities no matter where they are stored, and provide actionable insights for sensitive data protection. With this information, we can map out a mitigation plan to help better protect sensitive data and bring your systems into HIPPA and PCI compliance.

  • technical support.svg
    Remote Support Sessions

    This service provides remote access to the user’s system so we can assist with anything that is not working as expected. Remote sessions are interactive, so we can see what the user is doing, and the user can see how to correct the issue. Sessions can be scheduled or, when possible, occur as the first response to a trouble call.

  • File.svg
    Support Desk Portal

    Users with monitored support have full access to our support portal web page. Here they can submit trouble tickets as well as keep track of current and previous support requests. When the user submits a trouble ticket, we are notified and immediately start the resolution process. A complete record of communication and resolution is kept within the system for the user’s review and reference.

Services packaged for your needs
We offer affordable solutions, tailored to meet your needs.

Online Support.svg
Remote Monitoring and Management

This package includes:

  • Monitored System Health
  • Monitored Patch Management
  • Monitored Anti-Virus
  • Monitored Web Protection
  • Monitored Network
  • Remote Support Sessions
  • Support Desk Portal

  • Includes 1 PC/Workstation and up to 4 additional personal computing devices such as Smartphones and Tablets.
  • Unassigned PCs are treated as an additional user.
  • Volume Discounts Apply
Priced per user
Shared Folder.svg
Data Protection and Recovery

This package includes:

  • Monitored Data Protection / Disaster Recovery
  • Encrypted Data Storage
  • File-Level Recovery
  • Bare Metal Recovery
  • Virtual Machine Recovery
  • Support Desk Portal

Data limits and volume discounts may apply.

Optional: Office 365 Mailbox/OneDrive Backup/Restore

Optional: Email Filtering and Archiving

Fixed Price per Server/ Workstation
Laptop Alert.svg
Risk Intelligence Assessment

This package includes:

  • PCI Scan
  • Security Scan
  • Data Breach Scan
Mitigation costs will vary based on the assessments.
Printable description of our services

  • Managed Services

  • Manged Backup Services

  • Risk Intelligence

Let's talk

We would love to hear from you!