Richey May Acquires Two I.T. Consulting Firms

Richey May is excited to announce our acquisition of two IT consulting firms, expanding our existing technology services capabilities. Arrow Partnership, a nationwide provider of management and IT consulting services, and Corporate Blue, a cybersecurity and managed IT services firm, have joined the Richey May Technology Solutions brand, a division of Richey May.

The acquisition of these two respected firms allows us to offer the full spectrum of technology solutions under our Richey May Technology Solutions brand to meet the complex needs of our clients. Led by technology experts with decades of cumulative experience in executive IT roles, our team is able to bring you pragmatic, real-world solutions that deliver value to your business. 

Richey May Partners with Amata Solutions

Richey May is excited to announce our partnership with Amata Solutions to bring customized business intelligence tools to mortgage lenders. Richey May has also acquired an interest in the firm, which is led by mortgage industry veterans and provides technology and analytics that enable lenders to make more confident data-informed decisions.

 

 

Experience Delivered.
The experts at Richey May Technology Solutions have been on your side of the desk, so we understand the challenges you face every day – because we’ve faced them, too. Having held executive positions at firms of all sizes, from small companies to global enterprises, our unmatched expertise allows us to offer seasoned, practical and executive advice to solve your most difficult technology, cloud, and cybersecurity problems.
The brightest minds in the industry + the full spectrum of technology services = transformative solutions for your business.

Most Recent Posts

States Step Up to Fill the Privacy Void

The theme in cybersecurity for 2018 has clearly been personal privacy. Laws and regulations have been enacted to protect consumers, particularly in the financial services industry, including the New York Department of Financial Services’ (NYDFS) cybersecurity...

Knowledge-Based Authentication

The vast majority of secure transactions that take place online or elsewhere require a password or some other known secret, such as a high school mascot, favorite color, or pet. These security tokens are “known secrets” that both the user and the authenticator must...

Physical Security Still Matters: Watch Out for Rogue USB Devices

Evolving tactics used by cybercriminals, often highlighted in the news related to large-scale attacks, bring attention to the importance of protecting the companies we work for and ourselves personally. But over time, we tend to forget about other, more low-tech,...

To speak with one of our experts,

please fill out the form and we will

contact you shortly.