Recent Posts by J. Bendonis

J. is the practice manager and senior security architect at Rutter bringing over 20 years of industry experience to his customers
Find me on:

Trust but Verify: How To Handle Managed Hosting Providers

Every company I have worked for has decided to outsource their datacenter to a managed hosting provider, in some manner or another. Some only outsourced their websites, others went all in and had them manage their entire infrastructure. 

Most managed hosting providers will regulate everything from the operating system down the stack to the hardware, the cooling and the electrical for you. Many will use virtualization technology of some kind to help optimize usage and resources for you. They even help companies "right size" their virtualization environment when it goes into their hosting environment. 

Read More

Two Factor Authentication – Buy, Borrow or Loot

Two Factor Authentication (2FA) or Multi-factor Authentication (MFA) is the most common preventative measure that companies and organizations implement as an additional layer of security to the standard username and password login credentials on a website or application. Taking a half-step back, 2FA/MFA can be described as something you know and something you have. 2FA/MFA is currently used on almost every application, from banking websites to SaaS services to video games

Read More

Why Should Your Organization Choose Hybrid Cloud Computing?

Gartner, Inc. predicts that, by 2020, 90 percent of organizations will adopt hybrid infrastructure management. That isn’t a surprising prediction; a hybrid environment can optimize systems based on their unique requirements, which accelerates the delivery of services and applications.

Read More

5 Terrible Ways to Handle Security and Risk Management

If you look at the headlines on any given day, you are going to see at least one news story about a data breach, ransomware, or other computer-related crime. It’s hard for companies to get a handle on their security and risk management because the threat landscape is always changing. From zero-day exploits to state-sponsored attacks, it seems like the deck is stacked in favor of the attacker.

Read More

5 Reasons You Should Be Using Cloud-Managed Wireless Services

Managing wireless networks effectively can be problematic for small to medium-sized businesses (SMBs) in particular with the growing popularity of mobile devices in the workplace and the constant connection needs of Wi-Fi-enabled devices. Cloud-managed wireless isn’t new, but its rapid growth in the last year or two has been directly fueled by companies looking to upgrade their wireless networks and moving to 802.11ac. Here are just five of the many reasons your business should be using cloud-managed wireless services:

Read More

Making the Case for Software Defined Networking and Security


In the world of virtualization, there are many inherent security features that come with a virtual environment natively, but with the rise of Software Defined Networking (SDN), we have a new layer of security which can be easily added to any virtual environment.  SDN strips away the traditional boundaries of IT security and brings them directly to the guest virtual machine.  Through a concept referred to as Micro Segmentation, a central next generation firewall policy can be defined at the interface level of the virtual machine, effectively plugging each server in your environment directly into a firewall, providing protection, both inbound and outbound for all traffic to and from that host.

Read More