Recent Posts by Scott Whittier

Scott is the Technology Manager for Management and Monitoring Solutions at Rutter Networking Technologies.
Find me on:

Streamlining Windows Updates with SCCM

As I sat down to write this article news broke of yet another major flaw affecting Windows systems. This time it’s a remote code execution vulnerability in Remote Desktop that could be exploited by a hacker via a worm making this a particularly dangerous flaw—view the details of this vulnerability. So it’s time to get patched!

Read More

We need Log Management!

Yes, you heard that right, the boss said, “We need Log Management!” And he’s right but what does he mean? Isn’t that the horribly complex software that is only needed by huge corporations? And why is he saying it now? Did something happen?

Read More

Splunk: Managing and Monitoring in the Cloud vs On-Premise

As data with enterprises and in the cloud grows exponentially, organizations continue to look for ways to harness it and glean diverse insights to help meet business goals. While there are numerous tools for managing and monitoring data, few can provide a universal approach across all data sources, both on-premise and in the cloud.

Read More

Is Your SolarWinds Shelfware?

The definition of “shelfware” from TechTarget:

“Slang for software that a company buys because of a perceived need or demand but never uses; hence, it sits on the shelf.”

This definition should be expanded to include software that was purchased for a legitimate need, implemented to serve that need, and then allowed to stagnate until it’s no longer used or useful. There are many reasons why this stagnation happens:

Read More

Designing a Hybrid Cloud Strategy For Your IT Budget

Gartner recently stated that “organizations will continue to aggressively build and invest in ‘cloud-first’ strategies and architectures.” Much of this comes from the advancements and innovations in cloud services. Applications and solutions that were once a poor fit for the cloud are now finding their way into the “as a service” space. However, just because an application or solution is cloud capable doesn’t mean it is right for you.

Read More

4 Security Risks of Shadow IT

According to Gartner’s Top 10 Cloud Security Predictions, by the year 2020, a third of all successful attacks on businesses will be against their shadow IT resources. Businesses can no longer ignore the risks of shadow IT and must take preventative steps against it.

Read More

Data Center vs. Cloud: 4 Security Myths


Ever since “the cloud” and “as a service” became popular buzzwords in IT, there have been myths about them, particularly when it comes to security.

Read More

Preventing Malware: WSUS vs. SCCM

The Microsoft Windows Security Blog recently made it clear that WannaCrypt ransomware was leaving systems vulnerable to infiltration because of poor patch management. Despite this often-repeated truth, far too many organizations are still leaving vulnerabilities that fall short of preventing malware.

Read More