Feeds

Redcentric set to swallow InTechnology MS - sources

Managed services feeding frenzy as shark snaps up shark

Secure remote control for conventional and virtual desktops

A For Sale sign has been pitched outside the HQ of UK firm InTechnology Managed Services for months and it seems CEO Peter Wilkinson is just days away from announcing a buyer.

According to our sources, managed services outfit Redcentric has struck a deal with the Harrogate-based public company, whose shares are available to buy but are not listed on the London Stock Exchange.

InTechnology was a pioneer in web-based storage services – the vBak service launched in 2000 and was well ahead of its time. Over the years it diversified to sell network, hosting, data, voice and partner services.

Customers include the University of Oxford, Cumberland Building Society, Heathrow Air Ambulance, Park Resorts, the CBI, Teletext and recruitment firm Kelly Services.

It had an enterprise infrastructure distie biz but this was sold to DNS in 2006, a subsidiary of US distributor Arrow ECS. The DNS brand was subsequently dropped in favour of Arrow

Sources tell us that entrepreneurial Yorkshireman Wilkinson wants to concentrate on his other business ventures, Mobile Tornado and managed telehealth services operation InHealthcare.

In the year to March 2013, InTechnology MS grew revenues by £10m year-on-year to £41.7m. Group operating profit declined to £1.3m from £2.4m caused largely by a £900k cost of data centre depreciation, and start up losses in the digital health business. EBITDA came in at £8m versus the £7.4m posted in fiscal '12.

Redcentric itself was spun out of IT infrastructure biz Redstone earlier this year - both stocks are traded on AIM - and is a pure play managed services provider, which includes the Maxima acquisition made last year.

The transferred operation turned over £31m in the year to 31 March 2013 and recorded an operating loss of £1.4m, versus £25, in sales and an operating loss of £252k in the previous financial year.

Wilkinson and Redcentric did not respond to calls for comment. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.