At [RE]DESIGN_IT, we remove obstacles to progress by focusing on what's absolutely essential. Our methodology begins with understanding your organizations competitive advantage in the marketplace and the critical business information associated with it.  Our assessment process uncovers the data type, where it resides, application profiles, workflows, dependancies and user access rights. The gap analysis process will provide recommendations on securing these assets while also creating a business continuance and disaster recovery plan. In taking inventory of whats essential, we can determine what technology services should stay, migrate to a cloud service provider or be retired.  We are focused on creating a plan that delivers maximum business value at the lowest total cost. To achieve success, we must [RE]DESIGN for Trust, Efficiency, Remediation and Innovation. The time has come to enable digital leadership in your organization. 

Areas of Expertise


System Architecture, Infrastructure Design, Support, and Integration

End-to-End Technology stack build-outs, conversion/migration, and support

Converged, Hyper-converged, and Web Scale Infrastructure

Software Defined, scale-out, and SAN/NAS storage

Business Continuance Design, Deploy & Manage

Data Protection Design, Deploy & Manage

Hyper-converged and converged solutions

IP, and FC network architecture

Mail and Collaboration

Web Applications



Managed and Professional Services

Systems and applications monitoring and support

Support contract and renewal management

Remote infrastructure management

Office and personnel relocation

Asset management



Virtual desktop architecture, implementation, and maintenance

Virtualized data center health check

Hypervisor Setup and Configuration

Physical to Virtual Migration

Application Virtualization


Networking and Collaboration

Unified and cloud hosted communication

Video conferencing and telepresence

LAN/WAN design and deployment


Cyber-Security Architecture, Planning, and Support

End-point protection - anti-malware, OS/app-server hardening, policy enforcement

Physical security - cameras, DVR, access, alarms, data center cage security

Network security - firewalls, IPS/IDS, SIEM, proxies, wireless security

Cyber Intel - behavioral analysis, intel gathering and sharing

Penetration testing, auditing and assessments

Policy development and implementation

Encryption and key management

Identity and Access Management

Application Security



Cloud consulting and cloud readiness assessments

Cloud management, automation, and operations

IaaS migration or hybrid cloud

SaaS migration or hybrid setup


Big Data

Machine learning and artificial intelligence

Location based database analytics

Industrial Internet


Financial Services

Operating or capital lease structures

Vendor agnostic financing support

On-demand infrastructure scaling

Deferred payment options


Technology Briefings

360 Snapshot

Short design-thinking engagement providing a snap shot view of your organization’s objectives, state of the current environment and efficiencies, and areas of opportunity to modernize with technology.

Digital Leadership Summit

In-depth assessment of existing Enterprise Services (data center, cloud, disaster recovery, network, security, IT operations, voice and wireless) followed by strategic recommendations and a technology roadmap centered on achieving organizational goals.