Celebrating a Microsoft Milestone at RKON! 🎉 RKON earned another Microsoft solutions partner designation for Digital & App Innovation. This accomplishment highlights our ongoing commitment to delivering secure and innovative solutions that meet the evolving needs of our clients. Our recently earned designations include: 🔹Digital & App Innovation (Azure) 🔹Security (Specialist: Identity and Access Management) 🔹Modern Work (Specialist: Adoption and Change Management) 🔹Infrastructure (Azure) Swipe through the carousel to view our official Microsoft partner badges and see how RKON’s expertise supports digital transformation and business growth. #RKON #MicrosoftSolutionsPartner #CloudInnovation #Cybersecurity #ModernWork
RKON
IT Services and IT Consulting
Chicago, Illinois 16,221 followers
Since 1998, RKON has focused on providing intelligent #QuietIT solutions to private equity and enterprise firms.
About us
Since 1998, RKON has delivered IT Transformation helping private equity and enterprise firms achieve Quiet IT from vision to execution. We believe IT should seamlessly serve the business strategy versus getting in the way of execution. Our team at RKON has developed a refined approach, through years of experience, that delivers a clear vision of a scalable, agile, secure, cost optimized and low risk end state. To achieve this end state, RKON provides IT solutions in three stages, first building an advisory practice that sends the strategy in the right direction, an execution practice ensuring that vision is turned into reality and a management practice the keeps the vision on track as IT evolves to serve the business. Because of our record in providing best-in-class IT solutions and our staff of respected and extremely knowledgeable professionals, RKON has been recognized by Crain’s Fast Fifty, CRN Growth 150, Inc. 5000 and Inc. Magazine’s list of 500 fastest-growing private companies. RKON’s trusted advisors deliver strategic guidance, advanced technical knowledge and realistic assessments to give your organization the competitive advantage it requires in today’s environment of rapidly evolving technologies. Here at RKON, we understand that our client’s success starts with our organizational cohesion. Recognized by Computerworld as one of the 100 Best Places to Work in IT, RKON is focused on developing an organization that fosters creativity, innovation and cooperation across all levels. This approach plays an integral role in providing our clients the quality IT solutions they require. We encourage and reward an environment that promotes imagination, innovation and collaboration – where our intelligent IT solutions grow from the bright minds of the RKON team. Build your organization’s IT infrastructure with RKON and realize the unrestricted possibilities of Quiet IT.
- Website
-
http://www.rkon.com
External link for RKON
- Industry
- IT Services and IT Consulting
- Company size
- 51-200 employees
- Headquarters
- Chicago, Illinois
- Type
- Privately Held
- Founded
- 1998
- Specialties
- Managed Cloud Services, Professional Services, Mobile Security Solutions, Virtualization, Iaas, Mobility Management, Security, Vulnerability Management, Disaster Recovery, Perimeter Security, Saas, Data Migration, SIEM, Managed Service Center Operations, Private Equity IT Transformation, and Private Equity Managed Services
Locations
-
Primary
328 S. Jefferson
Suite 450
Chicago, Illinois 60661, US
Employees at RKON
-
Joe Knape
Cross-functional Leadership | Technology Advisor | Information Security | Threat Intelligence | Vulnerability Management | Cloud Security | Risk…
-
Kevin Creed
Senior Technology Leader | Strategy | Transformation | Growth | Delivery & Execution | Strategic Initiatives | Cybersecurity | M&A | Program &…
-
Bruce A Bothwell
Managing Director at RKON
-
Larry Fitzgerald
Managing Director, Private Equity Advisory Services at RKON
Updates
-
Identity and Access Management risk management solutions streamline SOC 2 compliance by aligning directly with the five trust service criteria: security, availability, confidentiality, processing integrity, and privacy. Key controls include MFA, RBAC, least privilege, SSO, centralized logging, and real-time anomaly detection, all of which reduce unauthorized access and simplify audits. A practical path to readiness: 🔹Assess current IAM maturity and identify gaps in authentication, authorization, and monitoring. 🔹Automate provisioning, de‑provisioning, role assignment, and access reviews to minimize human error. 🔹Integrate IAM across cloud, SaaS, and on‑prem environments for centralized governance. 🔹Conduct regular access reviews with audit-friendly reporting and dashboards. 🔹Maintain clear documentation of controls, policies, and monitoring for auditors. Business outcomes extend beyond compliance: stronger security posture, faster audit cycles, improved operational efficiency, and increased customer trust. 🔗Read more: https://hubs.la/Q03Fx9kB0 📩Ready for an identity and access management audit? Connect with RKON today: https://hubs.la/Q03FwLs60
-
-
Great team outing aboard the 2025 HDI Chicagoland Boat Cruise Networking Event! #RKONStrong
-
-
When a North American food and industrial ingredients manufacturer set out to improve its data governance, the challenges quickly became clear: 🔹 Technology-focused efforts without people & process alignment stalled progress 🔹 Concerns over Microsoft Copilot adoption and potential data leaks raised urgency 🔹 Limited internal expertise created barriers to building a sustainable framework That’s where RKON stepped in. By centering the governance strategy around Microsoft Purview and implementing role-based data classification, access controls, and tailored security policies, our team helped the organization: ✅ Gain visibility and control over sensitive data in Microsoft 365 ✅ Build a governance framework to safely adopt Microsoft Copilot ✅ Reduce risk of sensitive data exposure ✅ Strengthen compliance and protect intellectual property This food company went from uncertainty about governance to full confidence in its ability to innovate securely. With the right partnership and approach, what started as a challenge became a long-term competitive advantage. At RKON, we help businesses take control of their data so they can unlock technology safely and strategically. #DataGovernance #MicrosoftPurview #MicrosoftCopilot #Cybersecurity #RKON
-
Managing digital identity is often the key to ensuring a merger or acquisition goes smoothly. How an organization combines or separates user access, directory services, and legacy systems determines whether a deal proceeds efficiently or runs into costly setbacks. With the right planning and expertise, identity issues can be managed up front, allowing deals to stay on track. Here’s what really matters: 🔹 Integrating directories and aligning identities during a merger is far more than a box to check. When done correctly, it accelerates the entire process. When overlooked, it leads to delays and added expenses. 🔹 Legacy applications and permissions can complicate things further. If identities are not properly separated during a divestiture, the process slows down and costs climb. 🔹 Leaving identity consolidation until after closing forces organizations to maintain two environments, which increases complexity and drains value from the transaction. RKON has the experience to turn identity management into a strategic advantage. Whether you need to federate directories or untangle legacy systems, our team helps keep deals moving, reduce risk, and control costs. If a merger, acquisition, or divestiture is in your future, let’s discuss how your business can stay ahead with the right identity strategy: https://hubs.la/Q03Cw2j00 #MergersAndAcquisitions #IdentityManagement #RKON #DigitalTransformation #BusinessValue
-
At RKON, we are seeing identity security take center stage across organizations. Identity is now the new perimeter, covering both people and the non-human identities that are part of every modern environment. Despite years of progress, many companies still find themselves reacting to threats after they occur. The question we often hear is: how can you become more proactive? Tools like Identity Threat Detection and Response (ITDR), SIEM, and SOAR are changing the game. They let organizations move from after-the-fact response to real-time action and fast adaptation. These technologies help spot risks as they happen, improve coordination across security tools, and ultimately allow teams to act before damage is done. We believe the market is quickly moving in this direction, and we are helping our clients make the shift to proactive identity security every day. Is your team still reactive, or are you ready to get ahead of threats? Reach out to RKON to start the conversation: https://hubs.la/Q03BVll60 #IdentitySecurity #CyberSecurity #RKON #ProactiveSecurity
-
At RKON, we are closely following the new trends that shape cybersecurity and Identity & Access Management (IAM). One of the most significant developments we see today is the rapid adoption of passwordless authentication. Why is this important? 🔹Stronger Security: Traditional passwords are reused far too often, which increases risk. Moving to passwordless authentication eliminates that vulnerability. 🔹Enhanced User Experience: IAM solutions can sometimes create barriers for users. Removing passwords makes the process much smoother and more efficient. 🔹Less Human Error: People tend to use the same password across multiple platforms. By taking that element out of the equation, passwordless authentication helps improve security overall. As passwordless authentication continues to grow in popularity, balancing strong security with easy access is no longer just a goal; it is quickly becoming the standard. RKON is dedicated to helping businesses thrive by implementing the newest IAM solutions. Interested in how passwordless authentication can help your organization? Let’s connect! https://lnkd.in/dDqiNAFn #Cybersecurity #IAM #RKON #Passwordless #Innovation #DigitalTransformation
-
RKON offers practical, hands-on management for the Netskope SASE platform. Our team handles everything from initial setup and ongoing policy updates to user behavior analytics and continuous support. What we do: 🔹Monitor tenant health, manage SCIM integrations, and handle daily policy updates across SWG, NPA, CFW, DNS, DLP, and client settings. 🔹Perform regular checks and updates for Netskope Private Access, and respond quickly to connection issues or app tagging. 🔹Oversee gateway connectivity and firewall changes for Netskope BWAN L3, and address VPN outages through our NOC. 🔹Work with your team to review application use, analyze user behavior trends, and provide feedback on unidentified app traffic. 🔹Customize Data Loss Prevention rules, adapt configurations, and aim to reduce false positives. 🔹Support Secure Web Gateway by adjusting app tags and provisioning new instances as needed. 🔹Offer 24/7 premium support, with direct escalation to Netskope experts and help from security professionals with over 25 years of experience. With RKON, your Netskope environment is managed by people who understand the importance of reliability, responsiveness, and practical problem-solving. 🔗 Get more information: https://hubs.la/Q03B4RT00 #RKON #Netskope #ManagedServices #Cybersecurity #SASE
-
Strong security starts with strong identity controls. At RKON, we see a clear pattern: weak organizational practices around identity and data controls often lead to security gaps that put sensitive information at risk. Today’s business environment demands more than just traditional safeguards. Organizations need to: 🔹Strengthen identity controls across all platforms 🔹Integrate essential security tools like SIEM and SOAR for improved visibility 🔹Continuously review internal data access so only the right team members can see the right information Our approach at RKON guides companies through these challenges so they can reduce risks and protect their most valuable data assets. Let’s talk about practical steps your organization can take to protect information and improve security at every level. #Cybersecurity #DataProtection #IdentityManagement #RKON